Disclosure: when you buy through links on our site, we may earn an affiliate commission.

Conducting Forensic Cisco & CyberOps Technologies (CBRFIR)

Cisco : Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR)
0.0
0.0/5
(0 reviews)
793 students
Created by

9.5

CourseMarks Score®

10.0

Freshness

N/A

Feedback

8.6

Content

Platform: Udemy
Language: English
Next start: On Demand

Top Cisco Certified CyberOps Professional courses:

Detailed Analysis

CourseMarks Score®

9.5 / 10

CourseMarks Score® helps students to find the best classes. We aggregate 18 factors, including freshness, student feedback and content diversity.

Freshness Score

10.0 / 10
This course was last updated on 12/2021.

Course content can become outdated quite quickly. After analysing 71,530 courses, we found that the highest rated courses are updated every year. If a course has not been updated for more than 2 years, you should carefully evaluate the course before enrolling.

Student Feedback

We analyzed factors such as the rating (0.0/5) and the ratio between the number of reviews and the number of students, which is a great signal of student commitment.

New courses are hard to evaluate because there are no or just a few student ratings, but Student Feedback Score helps you find great courses even with fewer reviews.

Content Score

8.6 / 10
Video Score: 7.5 / 10
Detail Score: 8.8 / 10

The top online course contains a detailed description of the course, what you will learn and also a detailed description about the instructor.

Extra Content Score: 9.5 / 10

Tests, exercises, articles and other resources help students to better understand and deepen their understanding of the topic.

This course contains:

0 article.
0 resource.
0 exercise.
3 tests or quizzes.

Table of contents

Description

Exam Description: Conducting Forensic Analysis and Incident Response Using Cisco Technologies for
CyberOps v1.0 (CBRFIR ) is a 90-minute exam that is associated with the Cisco CyberOps
Professional Certification. This exam tests a candidate’s knowledge of forensic analysis and incident
response fundamentals, techniques, and processes. The course Conducting Forensic Analysis and
Incident Response Using Cisco Technologies for CyberOps helps candidates to prepare for this exam.
The following topics are general guidelines for the content likely to be included on the exam. However,
other related topics may also appear on any specific delivery of the exam. To better reflect the contents
of the exam and for clarity purposes, the guidelines below may change at any time without notice.
20% 1.0 Fundamentals
1.1 Analyze the components needed for a root cause analysis report
1.2 Describe the process of performing forensics analysis of infrastructure network devices
1.3 Describe antiforensic tactics, techniques, and procedures
1.4 Recognize encoding and obfuscation techniques (such as, base 64 and hex encoding)
1.5 Describe the use and characteristics of YARA rules (basics) for malware identification,
classification, and documentation
1.6 Describe the role of:
1.6.a hex editors (HxD, Hiew, and Hexfiend) in DFIR investigations
1.6.b disassemblers and debuggers (such as, Ghidra, Radare, and Evans Debugger) to
perform basic malware analysis
1.6.c deobfuscation tools (such as, XORBruteForces, xortool, and unpacker)
1.7 Describe the issues related to gathering evidence from virtualized environments (major
cloud vendors)
20% 2.0 Forensics Techniques
2.1 Recognize the methods identified in the MITRE attack framework to perform fileless
malware analysis
2.2 Determine the files needed and their location on the host
2.3 Evaluate output(s) to identify IOC on a host
2.3.a process analysis
2.3.b log analysis
2.4 Determine the type of code based on a provided snippet
2.5 Construct Python, PowerShell, and Bash scripts to parse and search logs or multiple data
sources (such as, Cisco Umbrella, Sourcefire IPS, AMP for Endpoints, AMP for Network,
and PX Grid)
2.6 Recognize purpose, use, and functionality of libraries and tools (such as, Volatility,
Systernals, SIFT tools, and TCPdump)
2020 Cisco Systems, Inc. This document is Cisco Public. Page 2
30% 3.0 Incident Response Techniques
3.1 Interpret alert logs (such as, IDS/IPS and syslogs)
3.2 Determine data to correlate based on incident type (host-based and network-based
activities)
3.3 Determine attack vectors or attack surface and recommend mitigation in a given
scenario
3.4 Recommend actions based on post-incident analysis
3.5 Recommend mitigation techniques for evaluated alerts from firewalls, intrusion
prevention systems (IPS), data analysis tools (such as, Cisco Umbrella Investigate, Cisco
Stealthwatch, and Cisco SecureX), and other systems to responds to cyber incidents
3.6 Recommend a response to 0 day exploitations (vulnerability management)
3.7 Recommend a response based on intelligence artifacts
3.8 Recommend the Cisco security solution for detection and prevention, given a scenario
3.9 Interpret threat intelligence data to determine IOC and IOA (internal and external
sources)
3.10 Evaluate artifacts from threat intelligence to determine the threat actor profile
3.11 Describe capabilities of Cisco security solutions related to threat intelligence (such as,
Cisco Umbrella, Sourcefire IPS, AMP for Endpoints, and AMP for Network)
15% 4.0 Forensics Processes
4.1 Describe antiforensic techniques (such as, debugging, Geo location, and obfuscation)
4.2 Analyze logs from modern web applications and servers (Apache and NGINX)
4.3 Analyze network traffic associated with malicious activities using network monitoring
tools (such as, NetFlow and display filtering in Wireshark)
4.4 Recommend next step(s) in the process of evaluating files based on distinguished
characteristics of files in a given scenario
4.5 Interpret binaries using objdump and other CLI tools (such as, Linux, Python, and Bash)
15% 5.0 Incident Response Processes
5.1 Describe the goals of incident response
5.2 Evaluate elements required in an incident response playbook
5.3 Evaluate the relevant components from the ThreatGrid report
5.4 Recommend next step(s) in the process of evaluating files from endpoints and
performing ad-hoc scans in a given scenario
5.5 Analyze threat intelligence provided in different formats (such as, STIX and TAXII)

You will learn

Requirements

This course is for

• All Levels

How much does the Conducting Forensic Cisco & CyberOps Technologies (CBRFIR) course cost? Is it worth it?

The course costs $12.99. And currently there is a 76% discount on the original price of the course, which was $54.99. So you save $42 if you enroll the course now.

Does the Conducting Forensic Cisco & CyberOps Technologies (CBRFIR) course have a money back guarantee or refund policy?

YES, Conducting Forensic Cisco & CyberOps Technologies (CBRFIR) has a 30-day money back guarantee. The 30-day refund policy is designed to allow students to study without risk.

Are there any SCHOLARSHIPS for this course?

Currently we could not find a scholarship for the Conducting Forensic Cisco & CyberOps Technologies (CBRFIR) course, but there is a $42 discount from the original price ($54.99). So the current price is just $12.99.

Who is the instructor? Is Salem Salem a SCAM or a TRUSTED instructor?

Salem Salem has created 73 courses that got 203 reviews which are generally positive. Salem Salem has taught 39,645 students and received a 4.0 average review out of 203 reviews. Depending on the information available, Salem Salem is a TRUSTED instructor.
salem Salem
Salem Salem  is a software engineer with extensive experience and management skills and works for a hi-tech telecommunication company . the company developers and sell solution that enable service providers to efficiently delivery high quality voice and data services over broadband access networks while leveraging investment in their network infrastructure . as a senior software engineer     

9.5

CourseMarks Score®

10.0

Freshness

N/A

Feedback

8.6

Content

Platform: Udemy
Language: English
Next start: On Demand

Students are also interested in

Review widget (for course creators):

Conducting Forensic Cisco & CyberOps Technologies (CBRFIR) rating
Code for the widget (just copy and paste it to your site):
<a href="https://coursemarks.com/course/conducting-forensic-cisco-cyberops-technologies-cbrfir/" target="_blank" title="Conducting Forensic Cisco & CyberOps Technologies (CBRFIR) on Coursemarks.com"><img border="0" src="https://coursemarks.com/widget/95.svg" width="200px" alt="Conducting Forensic Cisco & CyberOps Technologies (CBRFIR) rating"/></a>