Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Software Development Tools No-Code Development
Business
Entrepreneurship Communication Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certifications Network & Security Hardware Operating Systems & Servers Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Paid Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement & Gardening Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition & Diet Yoga Mental Health Martial Arts & Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Learning Teacher Training Test Prep Other Teaching & Academics
Web Development JavaScript React Angular CSS Node.Js PHP HTML5 Vue JS
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Amazon AWS Cisco CCNA Microsoft AZ-900 AWS Certified Developer - Associate
Microsoft Power BI SQL Tableau Data Modeling Business Analysis Business Intelligence MySQL Qlik Sense Blockchain
Unity Unreal Engine Game Development Fundamentals C# 3D Game Development C++ Unreal Engine Blueprints 2D Game Development Virtual Reality
Google Flutter Android Development iOS Development React Native Swift Dart (programming language) Mobile App Development Kotlin SwiftUI
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting Canva InDesign Character Design Procreate Digital Illustration App
Life Coach Training Neuro-Linguistic Programming Personal Development Personal Transformation Life Purpose Mindfulness Meditation Sound Therapy CBT Cognitive Behavioral Therapy
Entrepreneurship Fundamentals Business Fundamentals Freelancing Business Strategy Startup Business Plan Online Business Blogging Home Business
Digital Marketing Social Media Marketing Marketing Strategy Internet Marketing Google Analytics Copywriting Email Marketing YouTube Marketing Podcasting

IT & SoftwareIT CertificationsCisco Certified CyberOps Professional

Conducting Forensic Cisco & CyberOps Technologies (CBRFIR)

Cisco : Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR)
Rating: 0.0 out of 50.0 (0 ratings)
793 students
Created by Salem Salem
Last updated 12/2021
English

Description

Exam Description: Conducting Forensic Analysis and Incident Response Using Cisco Technologies for

CyberOps v1.0 (CBRFIR ) is a 90-minute exam that is associated with the Cisco CyberOps

Professional Certification. This exam tests a candidate's knowledge of forensic analysis and incident

response fundamentals, techniques, and processes. The course Conducting Forensic Analysis and

Incident Response Using Cisco Technologies for CyberOps helps candidates to prepare for this exam.

The following topics are general guidelines for the content likely to be included on the exam. However,

other related topics may also appear on any specific delivery of the exam. To better reflect the contents

of the exam and for clarity purposes, the guidelines below may change at any time without notice.

20% 1.0 Fundamentals

1.1 Analyze the components needed for a root cause analysis report

1.2 Describe the process of performing forensics analysis of infrastructure network devices

1.3 Describe antiforensic tactics, techniques, and procedures

1.4 Recognize encoding and obfuscation techniques (such as, base 64 and hex encoding)

1.5 Describe the use and characteristics of YARA rules (basics) for malware identification,

classification, and documentation

1.6 Describe the role of:

1.6.a hex editors (HxD, Hiew, and Hexfiend) in DFIR investigations

1.6.b disassemblers and debuggers (such as, Ghidra, Radare, and Evans Debugger) to

perform basic malware analysis

1.6.c deobfuscation tools (such as, XORBruteForces, xortool, and unpacker)

1.7 Describe the issues related to gathering evidence from virtualized environments (major

cloud vendors)

20% 2.0 Forensics Techniques

2.1 Recognize the methods identified in the MITRE attack framework to perform fileless

malware analysis

2.2 Determine the files needed and their location on the host

2.3 Evaluate output(s) to identify IOC on a host

2.3.a process analysis

2.3.b log analysis

2.4 Determine the type of code based on a provided snippet

2.5 Construct Python, PowerShell, and Bash scripts to parse and search logs or multiple data

sources (such as, Cisco Umbrella, Sourcefire IPS, AMP for Endpoints, AMP for Network,

and PX Grid)

2.6 Recognize purpose, use, and functionality of libraries and tools (such as, Volatility,

Systernals, SIFT tools, and TCPdump)

2020 Cisco Systems, Inc. This document is Cisco Public. Page 2

30% 3.0 Incident Response Techniques

3.1 Interpret alert logs (such as, IDS/IPS and syslogs)

3.2 Determine data to correlate based on incident type (host-based and network-based

activities)

3.3 Determine attack vectors or attack surface and recommend mitigation in a given

scenario

3.4 Recommend actions based on post-incident analysis

3.5 Recommend mitigation techniques for evaluated alerts from firewalls, intrusion

prevention systems (IPS), data analysis tools (such as, Cisco Umbrella Investigate, Cisco

Stealthwatch, and Cisco SecureX), and other systems to responds to cyber incidents

3.6 Recommend a response to 0 day exploitations (vulnerability management)

3.7 Recommend a response based on intelligence artifacts

3.8 Recommend the Cisco security solution for detection and prevention, given a scenario

3.9 Interpret threat intelligence data to determine IOC and IOA (internal and external

sources)

3.10 Evaluate artifacts from threat intelligence to determine the threat actor profile

3.11 Describe capabilities of Cisco security solutions related to threat intelligence (such as,

Cisco Umbrella, Sourcefire IPS, AMP for Endpoints, and AMP for Network)

15% 4.0 Forensics Processes

4.1 Describe antiforensic techniques (such as, debugging, Geo location, and obfuscation)

4.2 Analyze logs from modern web applications and servers (Apache and NGINX)

4.3 Analyze network traffic associated with malicious activities using network monitoring

tools (such as, NetFlow and display filtering in Wireshark)

4.4 Recommend next step(s) in the process of evaluating files based on distinguished

characteristics of files in a given scenario

4.5 Interpret binaries using objdump and other CLI tools (such as, Linux, Python, and Bash)

15% 5.0 Incident Response Processes

5.1 Describe the goals of incident response

5.2 Evaluate elements required in an incident response playbook

5.3 Evaluate the relevant components from the ThreatGrid report

5.4 Recommend next step(s) in the process of evaluating files from endpoints and

performing ad-hoc scans in a given scenario

5.5 Analyze threat intelligence provided in different formats (such as, STIX and TAXII)

Who this course is for:

  • All Levels

Instructor

Salem Salem
salem Salem
Salem Salem
  • 4.0 Instructor Rating
  • 237 Reviews
  • 39,824 Students
  • 73 Courses

Salem Salem  is a software engineer with extensive experience and management skills and works for a hi-tech telecommunication company . the company developers and sell solution that enable service providers to efficiently delivery high quality voice and data services over broadband access networks while leveraging investment in their network infrastructure . as a senior software engineer     

Top companies choose Udemy Business to build in-demand career skills.
NasdaqVolkswagenBoxNetAppEventbrite
  • Udemy Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Investors
  • Impressum Kontakt
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Accessibility statement
Udemy
© 2022 Udemy, Inc.