Close
COURSE LIST / COURSE BY TECHNOLOGY VENDORS / CISCO

CBRFIR - Conducting Forensic Analysis and Incident Response Using Cisco Technologies for CyberOps v1.0

Course Summary:

The Conducting Forensic Analysis and Incident Response Using Cisco Technologies for CyberOps (CBRFIR) v1.0 training is a 5-day training consisting of a series of lectures and videos that build your Digital Forensics and Incident Response (DFIR) and cybersecurity knowledge and skills. The training prepares you to identify and respond to cybersecurity threats, vulnerabilities, and incidents. Additionally, you will be introduced to digital forensics, including the collection and examination of digital evidence on electronic devices and learn to build the subsequent response threats and attacks. Students will also learn to proactively conduct audits to prevent future attacks. The Conducting Forensic Analysis and Incident Response Using Cisco Technologies for CyberOps (CBRFIR) v1.0 training also prepares you to take the 300-215 CBRFIR exam.

Course Duration:


Course Content:

Demo videos

  • Explore Adversarial Techniques, Tactics, and Common Knowledge (ATT&CK), Common Attack Pattern Enumeration and Classification (CAPEC), and National Institute of Standards and Technology (NIST) Common Weakness Enumeration Specification (CWE), and Common Vulnerabilities and Exposures (CVE) Frameworks
  • Explore Available Incident-Related Information
  • Examine Network Diagrams
  • Examine Logs
  • Examine Response Data Formats
  • Discover Sources of Evidence in the Network
  • Discover Sources of Evidence at Endpoints
  • Discover Sources of Evidence in the Cloud
  • Discover Syslog Facilities and Severity Levels
  • Explore Gathered Intelligence
  • Explore AccessData Forensic Toolkit (FTK) and Autopsy
  • Explore Hex Encoding
  • Explore Disassemblers and Debuggers
  • Explore Deobfuscation Tools
  • Explore Native Windows Tools Used in Digital Forensics and Incident Response
  • Explore Native Linux Tools
  • Explore Wireshark
  • Create and Use a Yet Another Recursive Acronym (YARA) Rule
  • Examine the Threat-Hunting Process
  • Perform Data Acquisition
  • Acquire Data from the Cloud
  • Acquire Data Acquisition from Files, Disk, and Drive
  • Analyze RAM and Fileless Malware Data
  • Analyze Network Data
  • Correlate Data from Different Sources
  • Use Scripting for Forensics
  • Analyze Web Application Logs
  • Contain the Attack
  • Remediate an Incident
  • Analyze the Evidence and Propose the Solution