This training course covers network defense and incident response methods, tactics, and procedures aligned with key industry frameworks, including NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination, as well as NIST 800.171r2 (Protecting Controlled Unclassified Information). It is ideal for individuals responsible for monitoring and detecting security incidents in information systems and networks and executing standardized responses. The course introduces tools, tactics, and procedures for managing cybersecurity risks, defending assets, identifying common threats, evaluating organizational security, collecting and analyzing cybersecurity intelligence, and remediating and reporting incidents. This comprehensive approach equips professionals with the skills needed to defend their organization's cybersecurity. Additionally, the training aids in preparing for the CertNexus CyberSec First Responder (Exam CFR-410) certification examination. Specific prerequisites are required, which can be reviewed through the linked files: CFR Prerequisites and CertNexus Exam Blueprints.
In this training course, you will identify, assess, respond to, and protect against security threats and operate a system and network security analysis platform. You will:
This training course is designed primarily for cybersecurity practitioners preparing for or who currently perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. It is ideal for those roles within federal contracting companies and private sector firms whose mission or strategic objectives require the execution of Defensive Cyber Operations (DCO) or DoD Information Network (DoDIN) operation and incident handling. This training course focuses on the knowledge, ability, and skills necessary to provide for the defense of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes.
In addition, the training course ensures that all members of an IT team—regardless of size, rank, or budget— understand their role in the cyber defense, incident response, and incident handling process.
This training course and subsequent certification (CFR-410) meet all requirements for personnel requiring DoD directive 8570.01-M position certification baselines:
Assessing Cybersecurity Risk
Analyzing the Threat Landscape
Analyzing Reconnaissance Threats to Computing and Network Environments
Analyzing Attacks on Computing and Network Environments
Analyzing Post-Attack Techniques
Assessing the Organization's Security Posture
Collecting Cybersecurity Intelligence
Analyzing Log Data
Performing Active Asset and Network Analysis
Responding to Cybersecurity Incidents
Investigating Cybersecurity Incidents