Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110



Similar documents
MS Information Security (MSIS)

Bellevue University Cybersecurity Programs & Courses

IT Networking and Security

Defending against modern threats Kruger National Park ICCWS 2015

CompTIA Security+ (Exam SY0-410)

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7

Security+ P a g e 1 of 5. 5-Day Instructor Led Course

Security + Certification (ITSY 1076) Syllabus

Practitioner Certificate in Information Assurance Architecture (PCiIAA)

KEY TRENDS AND DRIVERS OF SECURITY

Cybersecurity Health Check At A Glance

IBM Security QRadar Vulnerability Manager

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Hackers are here. Where are you?

External Supplier Control Requirements

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

IT Networking and Security

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Professional Services Overview

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

Information Security Basic Concepts

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

Logging In: Auditing Cybersecurity in an Unsecure World

A COMPLETE APPROACH TO SECURITY

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

McAfee - Overview. Anthony Albisser

Intel Security Certified Product Specialist Security Information Event Management (SIEM)

EA-ISP-012-Network Management Policy

EC-Council. Certified Ethical Hacker. Program Brochure

Hackers are here. Where are you?

McAfee Security Architectures for the Public Sector

EC-Council Certified Security Analyst (ECSA)

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.

Microsoft Technologies

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

The Protection Mission a constant endeavor

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com

Chapter 1 The Principles of Auditing 1

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

NASCIO 2015 State IT Recognition Awards

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Secure by design: taking a strategic approach to cybersecurity

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Core Solutions of Microsoft Exchange Server 2013

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

Extreme Networks Security Analytics G2 Vulnerability Manager

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Information security controls. Briefing for clients on Experian information security controls

How To Protect Your Network From Attack From A Network Security Threat

The Next Generation of Security Leaders

GOVERNANCE AND SECURITY BEST PRACTICES FOR PAYMENT PROCESSORS

Bachelor of Information Technology (Network Security)

How To Buy Nitro Security

CCNA Security 2.0 Scope and Sequence

Allegany College of Maryland. 239 Cisco Networking 2 * Offered Fall semester and

Big Data, Big Risk, Big Rewards. Hussein Syed

PENETRATION TESTING GUIDE. 1

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

Overview TECHIS Carry out risk assessment and management activities

Security Services. 30 years of experience in IT business

Logical Operations Master Mobile Application Developer (MMAD) Exam MAD-110

Enterprise Cybersecurity: Building an Effective Defense

BUILD YOUR CYBERSECURITY SKILLS WITH NRB

Certified Information Security Manager (CISM)

Implementing Cisco IOS Network Security v2.0 (IINS)

Intel Security Certified Product Specialist Data Loss Prevention Endpoint (DLPe)

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

CISCO IOS NETWORK SECURITY (IINS)

Automation Suite for. 201 CMR Compliance

Introduction to Cybersecurity Overview. October 2014

Report on CAP Cybersecurity November 5, 2015

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Windows Server 2003 End of Support. What does it mean? What are my options?

Unit 3 Cyber security

Perspectives on Cybersecurity in Healthcare June 2015

Access FedVTE online at: fedvte.usalearning.gov

Attachment A. Identification of Risks/Cybersecurity Governance

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

The Information Assurance Process: Charting a Path Towards Compliance

SECURITY OVERVIEW FOR MY.ENDNOTE.COM. In line with commercial industry standards, Thomson Reuters employs a dedicated security team to protect our

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Rational AppScan & Ounce Products

CloudCheck Compliance Certification Program

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

Enterprise Computing Solutions

Enterprise Cybersecurity: Building an Effective Defense

Transcription:

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110 Exam Information Candidate Eligibility: The CyberSec First Responder: Threat Detection and Response (CFR) exam requires no fee, supporting documentation, or other eligibility verification measures for you to be eligible to take the exam. Simply purchase an exam voucher here, then Logical Operations will send you an email containing the information you need to register to take the exam through Castle Worldwide. If your voucher came bundled with your CFR training program, you will receive this information from your trainer or training administrator. Once you complete the candidate registration form that you ll need to fill out through Castle, you will receive a notice to schedule from Castle within 2 business days. At that time, you can schedule a testing session. By redeeming your exam voucher, you agree to our Candidate Agreement. Exam Prerequisites While Logical Operations (LO) requires no formal prerequisites for you to register for and schedule a CFR exam time, LO strongly recommends you possess the following knowledge, skills, and experience prior to preparing for the exam: At least two years of experience in computer network security technology or a related field. The ability to recognize information security vulnerabilities and threats in the context of risk management. A working knowledge of common computer operating systems. A working knowledge of the concepts and operational frameworks of common assurance safeguards in computing environments (including, but not limited to: basic authentication and authorization, resource permissions, and anti-malware mechanisms). A working knowledge of common networking concepts, such as routing and switching. A working knowledge of the concepts and operational frameworks of common assurance safeguards in network environments (including, but not limited to: firewalls, intrusion prevention systems [IPSs], and virtual private networks [VPNs]). Page 1 of 5

You can obtain this level of skill and knowledge by taking the following Logical Operations courses or by passing the associated exams: CompTIA A+: A Comprehensive Approach (Exams 220-901 and 220-902) CompTIA Network+ (Exam N10-006) CompTIA Security+ (Exam SY0-401) Once you have obtained the recommended level of skill and knowledge, LO also strongly recommends that you prepare for the CFR exam by taking Logical Operations CyberSec First Responder: Threat Detection and Response course. Exam Specifications Number of Items: 126 Duration: 180 minutes Exam Options: Online or in person (Castle Worldwide) Item Formats: Multiple Choice/Multiple Response/True-False Exam Description Target Candidate: This exam is designed for cybersecurity practitioners who perform job functions related to protecting and defending information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. The exam focuses on the knowledge, ability, and skills necessary to provide for the restoration of those information systems in a cybersecurity context including protection, detection, investigation, reaction, response, and auditing capabilities. Domain % of Examination 1.0 Assessing Information Security Risk 10% 2.0 Creating an Information Assurance Lifecycle Process 7% 3.0 Analyzing Threats to Computing and Network Environments 19% 4.0 Designing Secure Computing and Network Environments 15% 5.0 Operating Secure Computing and Network Environments 5% 6.0 Assessing the Security Posture Within a Risk Management 10% Framework 7.0 Collecting Cybersecurity Intelligence Information 5% 8.0 Analyzing Cybersecurity Intelligence Information 5% 9.0 Responding to Cybersecurity Incidents 7% 10.0 Investigating Cybersecurity Incidents 10% Page 2 of 5

11.0 Auditing Secure Computing and Network Environments 7% Total 100% Objectives: Domain 1: Assessing Information Security Risk - Identify the Importance of Risk Management - Assess Risk - Mitigate Risk - Integrate Documentation into Risk Management Domain 2: Creating an Information Assurance Lifecycle Process - Evaluate Information Assurance Lifecycle Models - Align Information Security Operations to the Information Assurance Lifecycle - Align Information Assurance and Compliance Regulations Domain 3: Analyzing Threats to Computing and Network Environments - Identify Threat Analysis Models - Assess the Impact of Reconnaissance Incidents - Assess the Impact of Systems Hacking Attacks - Assess the Impact of Malware - Assess the Impact of Hijacking and Impersonation Attacks - Assess the Impact of DoS Incidents - Assess the Impact of Threats to Mobile Security - Assess the Impact of Threats to Cloud Security Page 3 of 5

Domain 4: Designing Secure Computing and Network Environments - Information Security Architecture Design Principles - Design Access Control Mechanisms - Design Cryptographic Security Controls - Design Application Security - Design Computing Systems Security - Design Network Security Domain 5: Operating Secure Computing and Network Environments - Implement Change Management in Security Operations - Implement Monitoring in Security Operations Domain 6: Assessing the Security Posture Within a Risk Management Framework - Deploy a Vulnerability Management Platform - Conduct Vulnerability Assessments - Conduct Penetration Tests on Network Assets - Follow Up on Penetration Testing Domain 7: Collecting Cybersecurity Intelligence Information - Deploy a Security Intelligence Collection and Analysis Platform - Collect Data from Security Intelligence Sources Domain 8: Analyzing Cybersecurity Intelligence Information - Analyze Security Intelligence to Address Incidents - Use SIEM Tools for Analysis Page 4 of 5

Domain 9: Responding to Cybersecurity Incidents - Deploy an Incident Handling and Response Architecture - Perform Real-Time Incident Handling Tasks - Prepare for Forensic Investigation Domain 10: Investigating Cybersecurity Incidents - Create a Forensics Investigation Plan - Securely Collect Electronic Evidence - Identify the Who, Why, and How of an Incident - Follow Up on the Results of an Investigation Domain 11: Auditing Secure Computing and Network Environments - Deploy a Systems and Processes Auditing Architecture - Prepare for Audits - Perform Audits Geared Toward the Information Assurance Lifecycle Continuing Education Requirements The CyberSec First Responder: Threat Detection and Response (CFR) certification is valid for 3 years from the time the certification is granted. You must re-take the most up-to-date version of the exam prior to the 3-year period s end to maintain a continuously valid certification. You can purchase a voucher to take the exam by clicking here. Page 5 of 5