Test IT Course

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum iaculis massa nec velit commodo lobortis. Quisque diam lacus, tincidunt vitae eros porta, sagittis rhoncus est. Quisque sed justo a erat lobortis gravida.

  Course & Exam Voucher

$1,250.00

Clear

Master Incident Response at Your Own Pace

Lunarline-SCS’s CyberSec First Responder™ (CFR) is a self-directed, self-paced Computer Based Training (CBT) program that equips students with the skills needed to fight back against modern cyber threats. This course will teach students how to:

  • Assess information security risk in computing and networking environments
  • Collect cyber threat intelligence
  • Analyze the cybersecurity threat landscape
  • Respond to and investigate cybersecurity threats
  • Analyze data collected from security event logs
  • Assess and defend against post-attack techniques

Upon successfully completing this course, students will understand how to effectively prepare for, defend against and respond to successful cyber attacks.

Meet DoD Requirements and Contribute to National Defense

To secure a cybersecurity position with the US Department of Defense (DoD), candidates must meet certain training and certification requirements. The Lunarline CFR CBT course supports a certification that is part of the DoD 8570 Baseline and meets 8140/8570 training requirements.

Through a partnership with CertNexus, all Lunarline CFR-CBT students who complete the course receive a voucher to take the CyberSec First Responder Certification Exam. Successful exam takers earn the CFR certification and qualify at the Cyber Security Service Professional (CSSP) level in the Analyst, Infrastructure Support, Incident Responder and Auditor roles.

  • Module 1 – Data Collection and Analysis – Focuses on quantitative and qualitative techniques for analyzing and interpreting incident data.
  • Module 2 – Vulnerability Assessment – Covers how to conduct and analyze scan results and prepare post remediation actions.
  • Module 3 – The Incident Response Process – Provides an overview of the incident response process and industry best practices for preparation, response and remediation.
  • Module 4 – Incident Response, Methods, Tools and Techniques – Prepares students to execute disciplined techniques and use modern tools to prepare for and respond to advanced cyber incidents.
  • Module 5 – Threats and Attacks – Provides an historical look at threat trends with the intent of helping students contribute to a comprehensive defense of their organizations.

Securely Provision (SP)

Securely Provision (SP)

All-Source Analyst
All Source-Collection Manager
All Source-Collection Requirements Manager
Authorizing Official/Designating Representative
Cyber Crime Investigator
Cyber Defense Analyst
Cyber Defense Forensics Analyst
Cyber Defense Incident Responder
Cyber Intel Planner
Cyber Operator
Cyber Ops Planner
Cyber Policy and Strategy Planner
Cyber Workforce Developer and Manager
Executive Cyber Leadership
Exploitation Analyst
Information Systems Security Developer
Program Manager
Security Architect
Security Control Assessor
System Administrator
Systems Security Analyst
Systems Requirements Planner
System Testing and Evaluation Specialist
Threat/Warning Analyst
Vulnerability Assessment Analyst

For more questions, contact us anytime at xxxxxxx@xxxxxxx.xxxx

Or write us here and we’ll contact you.

    Course Overview

    Training Format
    Online Course

    Applicable Certification
    Link Goes Here

    Target Candidate

    The CyberSec First Responder™ (CFR) exam is designed for individuals with between 3 and 5 years of
    experience working in a computing environment as part of a CERT/CSIRT/SOC who desire or are required to protect critical information systems before, during, and after an incident which may be a cybersecurity attack.

    Course Modules

    • Module 1 – Data Collection and Analysis
    • Module 2 – Vulnerability Assessment
    • Module 3 – The Incident Response Process
    • Module 4 – Incident Response, Methods, Tools and Techniques
    • Module 5 – Threats and Attacks
    • Module 7 – Understanding the RMF Core Package

    Related Courses

    Course Testimonials