This series will help students to understand the anatomy of cyber-attacks. Individuals will gain the skills needed to serve their organizations before, during, and after a breach. A CyberSec First Responder is the first line of defense against cyber-attacks. Students will prepare to analyze threats, design secure computing and network environments, proactively defend networks, and respond/investigate cybersecurity incidents.
Career Path: This series is designed for information assurance professionals who perform job functions related to the development, operation, management, and enforcement of security capabilities for systems and networks. This certification could lead to a job as a security administrator, network administrator, or system administrator.
Example Training Video (Not From This Course)
The exam focuses on the knowledge, ability, and skills necessary to provide for the restoration of information systems. It focuses on restoration within a cybersecurity context including protection, detection, investigation, reaction, response, and auditing capabilities. To learn more about this certification exam Click Here.
Vendor: Logical Operations
Certification Exam Details:
To purchase courseware, labs, exam vouchers and more, Click Here.
Available CEUs for Course Series Completion: 14
Students can earn up to 14 CEUs for fully completing this course series. This information will be displayed on the certificate of completion.
Learn on-demand from top instructors who are industry subject matter experts. Our highly certified expert instructors possess a superior understanding of the subject matter in their fields and have the ability to convey this knowledge in an effective, engaging, and professional manner to a wide audience.
Certificate of Completion
Upon completion of a series of courses you can earn a certificate of completion from Learning247. Certificates of Completion will display your full name, course completed, as well as the date of completion. Students have the ability to print this out or save it digitally to showcase your accomplishment.
Many of the in-depth theories and processes discussed in our courses can be learned most efficiently through the detailed PowerPoint slides presented. These visuals are accompanied by an instructor voice-over to provide our students with a clear, efficient, and complete presentation of concepts.
The immersive demonstrations in our training are a way for the instructor to present how to perform a task on-screen in front of the student. This feature gives the student the power to see tasks performed by a professional in the intended environment as many times as they would like, without purchasing expensive software.
Once a course is completed, test your knowledge by taking our course review quiz! Students have the ability to retake any review quizzes as many times as they wish to ensure they understand the material or to improve upon their scores.
Upon full completion of a training series, students can take a Series Final Exam, these exams are designed to test the students knowledge on all material trained within a series of courses. Students have the ability to retake any final exam as many times as they wish to ensure they understand the material or to improve upon their score.
With our universal course player, you can learn from your computer, tablet as well as mobile devices. Keep up with your training on the go!
Each course comes with a printable workbook that makes it easy to take notes as you learn. They also include a review quiz answer key, complete with answer explanations.
Need to train your Team? Contact Us for Discounts on Multiple Subscription Purchases.
- Course 01 - Assessing Information Security Risk- 1hr 3m
- Course 02 - Analyzing the Threat Landscape - 23m
- Course 03 - Analyzing Reconnaissance Threats to Computing and Network Environments - 56m
- Course 04 - Analyzing Attacks on Computing and Network Environments - 1hr 34m
- Course 05 - Analyzing Post-Attack Techniques - 1hr 1m
- Course 06 - Evaluating the Organization’s Security Posture - 53m
- Course 07 - Collecting Cybersecurity Intelligence - 1hr 14m
- Course 08 - Analyzing Log Data - 1hr 21m
- Course 09 - Performing Active Asset and Network Analysis - 1hr 39m
- Course 10 - Responding to Cybersecurity Incidents - 1hr 12m
- Course 11 - Investigating Cybersecurity Incidents - 34m