Companies Home Search Profile

CyberSec First Responder (CFR-310)

Focused View

ITProTV

13:16:56

286 View
  • 01 - CyberSec first responder.mp4
    05:12
  • 01 - Threat targets.mp4
    13:19
  • 02 - Threat actors.mp4
    15:51
  • 03 - Threat motives.mp4
    15:33
  • 04 - Threat intentions.mp4
    16:07
  • 05 - Attack phases.mp4
    14:05
  • 06 - Attack vectors.mp4
    09:50
  • 07 - Technique criteria.mp4
    15:26
  • 08 - Impact of attacks.mp4
    15:22
  • 09 - Footprinting.mp4
    18:52
  • 10 - Network and port scanning.mp4
    11:15
  • 11 - Vulnerability scanning.mp4
    20:02
  • 12 - Penetration testing.mp4
    15:16
  • 13 - Web app scanning.mp4
    15:04
  • 14 - Enumeration.mp4
    18:11
  • 01 - Exploitation frameworks.mp4
    19:27
  • 02 - Client-side attacks.mp4
    13:51
  • 03 - Server-side attacks.mp4
    16:32
  • 04 - Mobile threats.mp4
    18:00
  • 05 - Web attacks.mp4
    19:56
  • 06 - Password attack.mp4
    23:58
  • 07 - Wireless attacks.mp4
    17:39
  • 08 - Social engineering.mp4
    18:42
  • 09 - Man-in-the-middle.mp4
    18:46
  • 10 - Malware.mp4
    14:57
  • 11 - Out-of-band attacks.mp4
    07:59
  • 12 - Denial-of-service.mp4
    16:16
  • 01 - Command and control.mp4
    15:53
  • 02 - Data exfiltration.mp4
    10:31
  • 03 - Pivoting.mp4
    11:45
  • 04 - Lateral movement.mp4
    18:13
  • 05 - Persistence.mp4
    13:07
  • 06 - Keylogging.mp4
    11:32
  • 07 - Anti-forensics.mp4
    17:15
  • 08 - Cover your tracks.mp4
    13:20
  • 01 - Threat research and incident prep.mp4
    10:49
  • 01 - Network data collection and analysis.mp4
    13:41
  • 02 - Host data collection and analysis.mp4
    16:47
  • 03 - Anomaly detection.mp4
    13:17
  • 04 - Indicators of compromise.mp4
    16:26
  • 05 - Log analysis tools.mp4
    15:57
  • 01 - Containment.mp4
    12:44
  • 02 - Assent discovery.mp4
    09:23
  • 03 - Windows incident response tools.mp4
    22:58
  • 04 - Linux incident response tools.mp4
    18:15
  • 05 - Incident response process.mp4
    17:02
  • 06 - Incident response preparation.mp4
    19:07
  • 07 - Compliance and standards.mp4
    16:58
  • 08 - Framework and best practices.mp4
    08:49
  • 09 - Forensic concepts.mp4
    17:48
  • 01 - Commonly vulnerable areas.mp4
    13:29
  • 02 - Vulnerability assessments.mp4
    16:22
  • Description


    It’s time to get ready for the CyberSec First Responder CFR-310 certification exam. Getting certified validates your abilities to deploy and manage network defense and incident response methods, tactics, and procedures according to established industry standards. In this easy-to-follow cert prep course, join experts from ITProTV to get a comprehensive overview of the skills you need to know to go out and crush the CFR-310 exam.

    Explore the full scope of effective cybersecurity response: monitoring and detecting security incidents in information systems and networks; executing standardized responses to such incidents; evaluating your organization's security and infrastructure risks; collecting and analyzing relevant cybersecurity intelligence; and remediating and reporting incidents as they occur. Follow along to learn the current best practices for incident response techniques and tools, building your awareness to assess common vulnerabilities and recover from threats and attacks.

    Note: This course was created by ITProTV. We are pleased to host this content in our library.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    ITProTV provides online training for IT professionals in every stage of their careers. With training that's more like a talk show, IT pros watch more and learn more with an affordable, convenient, better-than-classroom experience. ITProTV features a two-host format, 20-minute episodes, and high-definition video, creating online learning that is binge-worthy.
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 52
    • duration 13:16:56
    • Release Date 2023/09/21

    Courses related to Cyber Security