CCNP CyberOps Forensic Analysis & Incident Response CBRFIR

CCNP CyberOps Forensic Analysis & Incident Response CBRFIR

Be the first line of defense with  Cisco CyberOps Professional Certification.

Protect, detect, and defend against cybersecurity threats

Meet that demand and confirm your abilities as an Information Security analyst in incident response roles, cloud security, and other active defense security roles.

Course Overivew

  • The Conducting Forensic Analysis and Incident Response Using Cisco Technologies for CyberOps (CBRFIR) v1.0 course helps build your Digital Forensics and Incident Response (DFIR) and cybersecurity knowledge and skills.
  • The course prepares you to identify and respond to cybersecurity threats, vulnerabilities, and incidents.
  • Additionally, you will be introduced to digital forensics, including the collection and examination of digital evidence on electronic devices and learn to build the subsequent response threats and attacks.
  • Students will also learn to proactively conduct audits to prevent future attacks.
  • The Conducting Forensic Analysis and Incident Response Using Cisco Technologies for CyberOps (CBRFIR) v1.0 course also prepares you to take the 300-215 CBRFIR exam.

 

  • This course will help you:
  • Develop an understanding of various cybersecurity threat and vulnerabilities
  • Establish a framework for proactively responding to cybersecurity threat and vulnerabilities
Read More
Read Less
Course Benefits:

Module 1: Fundamentals

 

  • Analyze the components needed for a root cause analysis report
  • Describe the process of performing forensics analysis of infrastructure network devices
  • Describe antiforensic tactics, techniques, and procedures
  • Recognize encoding and obfuscation techniques (such as, base 64 and hex encoding)
  • Describe the use and characteristics of YARA rules (basics) for malware identification, classification, and documentation
  • Describe the role of:
  • Describe the issues related to gathering evidence from virtualized environments (major cloud vendors)

 

Module 2: Forensics Techniques

  • Recognize the methods identified in the MITRE attack framework to perform fileless malware analysis
  • Determine the files needed and their location on the host
  • Evaluate output(s) to identify IOC on a host
  • Determine the type of code based on a provided snippet
  • Construct Python, PowerShell, and Bash scripts to parse and search logs or multiple data sources (such as, Cisco Umbrella, Sourcefire IPS, AMP for Endpoints, AMP for Network, and PX Grid)
  • Recognize purpose, use, and functionality of libraries and tools (such as, Volatility, Systernals, SIFT tools, and TCPdump)

 

Module 3: Incident Response Techniques

  • Interpret alert logs (such as, IDS/IPS and syslogs)
  • Determine data to correlate based on incident type (host-based and network-based activities)
  • Determine attack vectors or attack surface and recommend mitigation in a given scenario
  • Recommend actions based on post-incident analysis
  • Recommend mitigation techniques for evaluated alerts from firewalls, intrusion prevention systems (IPS), data analysis tools (such as, Cisco Umbrella Investigate, Cisco Stealthwatch, and Cisco SecureX), and other systems to responds to cyber incidents
  • Recommend a response to 0 day exploitations (vulnerability management)
  • Recommend a response based on intelligence artifacts
  • Recommend the Cisco security solution for detection and prevention, given a scenario
  • Interpret threat intelligence data to determine IOC and IOA (internal and external sources)
  • Evaluate artifacts from threat intelligence to determine the threat actor profile
  • Describe capabilities of Cisco security solutions related to threat intelligence (such as, Cisco Umbrella, Sourcefire IPS, AMP for Endpoints, and AMP for Network)

 

 Module 4: Forensics Processes

  • Describe antiforensic techniques (such as, debugging, Geo location, and obfuscation)
  • Analyze logs from modern web applications and servers (Apache and NGINX)
  • Analyze network traffic associated with malicious activities using network monitoring tools (such as, NetFlow and display filtering in Wireshark)
  • Recommend next step(s) in the process of evaluating files based on distinguished characteristics of files in a given scenario
  • Interpret binaries using objdump and other CLI tools (such as, Linux, Python, and Bash)

 

Module 5: Incident Response Processes

  • Describe the goals of incident response
  • Evaluate elements required in an incident response playbook
  • Evaluate the relevant components from the ThreatGrid report
  • Recommend next step(s) in the process of evaluating files from endpoints and performing ad-hoc scans in a given scenario
  • Analyze threat intelligence provided in different formats (such as, STIX and TAXII)
  • Analyze the components needed for a root cause analysis report
  • Apply tools such as YARA for malware identification
  • Recognize the methods identified in the MITRE attack framework
  • Leverage scripting to parse and search logs or multiple data sources such as, Cisco Umbrella, Sourcefire IPS, AMP for Endpoints, AMP for Network, and PX Grid
  • Recommend actions based on post-incident analysis
  • Determine data to correlate based on incident type (host-based and network-based activities)
  • Evaluate alerts from sources such as firewalls, intrusion prevention systems (IPS), data analysis tools (such as, Cisco Umbrella Investigate, Cisco Stealthwatch, and Cisco SecureX), and other systems to respond to cyber incidents and recommend mitigation
  • Evaluate elements required in an incident response playbook and the relevant components from the ThreatGrid report
  • Analyze threat intelligence provided in different formats (such as, STIX and TAXII)
  • SOC analysts, Tiers 1–2
  • Threat researchers
  • Malware analysts
  • Forensic analysts
  • Computer telephony integration (CTI) analysts
  • Incident response analysts
  • Security operations center engineers
  • Security engineers
Download
Course
Brochure

Prerequisites

This course is available at :

Classroom Training

Cairo
Giza
Onsite

Online Training

Virtual Interactive Instructor LED
Self-Paced Training

WHY CHOOSE CLS

Experience

We have been in the market since 1995, and we kept accumulating experience in the training business, and providing training for more than 100,000 trainees ever since, in Egypt, and the MENA region.

Premium Facilities

CLS facilities are well-equipped with strong hardware and software technologies that aid both students and trainers lead very effective smooth training programs.

Customer Support

We provide our clients with the best solutions, customized to their specific needs and goals. Our team is highly qualified to answer whatever questions you have.

Global Accredited

CLS is an authorized and accredited partner by technology leaders. This means that our training programs are of the highest quality source materials.

Up To Date

We keep tabs on every change in the market and the technology field, so our training programs will always be updated up to the World-class latest standards, and adapted to the global shape-shifting job market.

Certified Instructors

We select the best instructors, who are certified from trustworthy international vendors. They share their professional experience with the Trainees, so they can have a clear hands-on experience.

Over 200,000 Gradutes From CLS

Play Video
Amr Mostafa
An employee of the Security Department at the Ministry of Electricity

I`m attending now CEH Training with Eng Mohamed Hamdy ,CISSP Training with Eng Mohamed Gohar, I really learned a lot from him , everything here in CLS  is very satisfying including facilities .

Play Video
Lamiaa Medhat
CIO

We took a series of courses as the digital Transformation Unit of the ministry . we just finished CRISC Certification Training with DR Adel Abdel Meneim . Thank you CLS for all your efforts, we really appreciate it

Play Video
Ahmed Salah
Senior Cyber Security Engineer

Me and my colleagues are working in a government Organization, We took a no. of cyber security trainings with CLS starting with CEH and CISSP. we liked every thing the instructors, the stuff and whole environment

Play Video
Ferras Hassan
Head of the Programming Department at Bashayer Energy Company

I`m attending ASP.NET Core with MVC Training with Eng Mohamed Hesham , I really learned a lot from him , everything here in CLS  is very satisfying including facilities .Thanks you all team.

Play Video
Mohamed Ahmed Ali
Systems management specialist

Qualifying the cadres of digital transformation units in government agencies moving to the administrative capital .Thanks CLS

Play Video
Zeinab Salah
Software Developer at Bashayer Energy Company

I`m attending ASP.NET Core with MVC Training with Eng Mohamed Hesham , I really learned a lot from him , everything here in CLS  is very satisfying including facilities .Thanks you all team.

Play Video
Ibrahim Khalaf
IT Infrastructure and Security Manger

I`m attending now CRISC Training with DR Adel Abdel Meneim , I really learned a lot from him , everything here in CLS  is very satisfying including facilities , locations and the team.

Play Video
Samar Shams ElDin
Programmer at Bashayer Energy Company

I`m attending ASP.NET Core with MVC Training with Eng Mohamed Hesham , I really learned a lot from him , everything here in CLS  is very satisfying including facilities .Thanks you all team.

Student Application For

CCNP CyberOps Forensic Analysis & Incident Response CBRFIR
Full Name *
Email *
Phone *
Full Phone
Training Location *
Additional Request

Business Application For

CCNP CyberOps Forensic Analysis & Incident Response CBRFIR
Full Name *
Company Name *
Job Title *
Number of Employees
Email *
Phone *
Full Phone
Training Location *
Additional Request