Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR)

Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) Certification Training Course Overview

Enroll for the 5-day Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) - 300-215 certification training course from Koenig Solutions accredited by Cisco. The  Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) - 300-215 course is associated with the Cisco CyberOps Professional Certification. The Cisco® Certified CyberOps Professional certification gives you knowledge and skills beyond simple firewalls and antivirus software and enables you to become a skilled CyberOps professional. To earn your Cisco Certified CyberOps Professional certification, you must pass the core exam, 350-201 Performing CyberOps Using Cisco Security Technologies (CBRCOR), and the concentration exam 300-215 Conducting Forensic Analysis and Incident Response Using Cisco Technologies for CyberOps (CBRFIR).

Through a blend of hands-on labs and interactive lectures, you will learn knowledge of forensic analysis and incident response fundamentals, techniques, and processes. The course Conducting Forensic Analysis and Incident Response.

Target Audience:

  • Security Operations Center — Security Analyst
  • Computer Network Defense — Analyst
  • Computer Network Defense — Infrastructure Support Personnel
  • Future Incident Responders and Security Operations Center (SOC) personnel
  • Students beginning a career entering the cybersecurity field
  • IT personnel looking to learn more about the area of cybersecurity operations
  • Cisco Channel Partners

Learning Objectives

After completing this course, you will be able to:

  • Incident response process and playbooks
  • Advanced incident response
  • Threat intelligence
  • Digital forensics concepts
  • Evidence collection and analysis
  • Principles of reverse engineering

 

This course prepares you for Exam 300-215.

Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) (Duration : 40 Hours) Download Course Contents

Live Virtual Classroom Fee For Both Group Training & 1-on-1 Training On Request
Group Training Date On Request
1-on-1 Training (GTR)
4 Hours
8 Hours
Week Days
Week End

Start Time : At any time

12 AM
12 PM

GTR=Guaranteed to Run
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request
Special Solutions for Corporate Clients! Click here Hire Our Trainers! Click here

Course Modules

Module 1: Fundamentals
  • Analyze the components needed for a root cause analysis report
  • Describe the process of performing forensics analysis of infrastructure network devices
  • Describe antiforensic tactics, techniques, and procedures
  • Recognize encoding and obfuscation techniques (such as, base 64 and hex encoding)
  • Describe the use and characteristics of YARA rules (basics) for malware identification, classification, and documentation
  • Describe the role of:
  • Describe the issues related to gathering evidence from virtualized environments (major cloud vendors)
Module 2: Forensics Techniques
  • Recognize the methods identified in the MITRE attack framework to perform fileless malware analysis
  • Determine the files needed and their location on the host
  • Evaluate output(s) to identify IOC on a host
  • Determine the type of code based on a provided snippet
  • Construct Python, PowerShell, and Bash scripts to parse and search logs or multiple data sources (such as, Cisco Umbrella, Sourcefire IPS, AMP for Endpoints, AMP for Network, and PX Grid)
  • Recognize purpose, use, and functionality of libraries and tools (such as, Volatility, Systernals, SIFT tools, and TCPdump)
Module 3: Incident Response Techniques
  • Interpret alert logs (such as, IDS/IPS and syslogs)
  • Determine data to correlate based on incident type (host-based and network-based activities)
  • Determine attack vectors or attack surface and recommend mitigation in a given scenario
  • Recommend actions based on post-incident analysis
  • Recommend mitigation techniques for evaluated alerts from firewalls, intrusion prevention systems (IPS), data analysis tools (such as, Cisco Umbrella Investigate, Cisco Stealthwatch, and Cisco SecureX), and other systems to responds to cyber incidents
  • Recommend a response to 0 day exploitations (vulnerability management)
  • Recommend a response based on intelligence artifacts
  • Recommend the Cisco security solution for detection and prevention, given a scenario
  • Interpret threat intelligence data to determine IOC and IOA (internal and external sources)
  • Evaluate artifacts from threat intelligence to determine the threat actor profile
  • Describe capabilities of Cisco security solutions related to threat intelligence (such as, Cisco Umbrella, Sourcefire IPS, AMP for Endpoints, and AMP for Network)
Module 4: Forensics Processes
  • Describe antiforensic techniques (such as, debugging, Geo location, and obfuscation)
  • Analyze logs from modern web applications and servers (Apache and NGINX)
  • Analyze network traffic associated with malicious activities using network monitoring tools (such as, NetFlow and display filtering in Wireshark)
  • Recommend next step(s) in the process of evaluating files based on distinguished characteristics of files in a given scenario
  • Interpret binaries using objdump and other CLI tools (such as, Linux, Python, and Bash)
Module 5: Incident Response Processes
  • Describe the goals of incident response
  • Evaluate elements required in an incident response playbook
  • Evaluate the relevant components from the ThreatGrid report
  • Recommend next step(s) in the process of evaluating files from endpoints and performing ad-hoc scans in a given scenario
  • Analyze threat intelligence provided in different formats (such as, STIX and TAXII)
Download Course Contents

Request More Information

Course Prerequisites

There are no formal prerequisites for Cisco Certified CyberOps Professional, but you should have a good understanding of the exam topics before taking the exam.

Candidates often also have three to five years of experience implementing enterprise networking solutions.

 

FAQ's


Yes, fee excludes local taxes.