CYB-400 Cybersecurity Operations Incident Response & Digital Forensics

(AIUS-CYB-400-V2.AE1)
Lessons
Lab
TestPrep
Get A Free Trial

Skills You’ll Get

1

Introduction

  • CompTIA
  • The Cybersecurity Analyst+ Exam
  • What Does This Course Cover?
  • Objectives Map for CompTIA CySA+ Exam CS0-003
  • Setting Up a Kali and Metasploitable Learning Environment
2

Today's Cybersecurity Analyst

  • Cybersecurity Objectives
  • Privacy vs. Security
  • Evaluating Security Risks
  • Building a Secure Network
  • Secure Endpoint Management
  • Penetration Testing
  • Reverse Engineering
  • Efficiency and Process Improvement
  • The Future of Cybersecurity Analytics
  • Summary
  • Exam Essentials
  • Lab Exercises
3

System and Network Architecture

  • Infrastructure Concepts and Design
  • Operating System Concepts
  • Logging, Logs, and Log Ingestion
  • Network Architecture
  • Identity and Access Management
  • Encryption and Sensitive Data Protection
  • Summary
  • Exam Essentials
  • Lab Exercises
4

Malicious Activity

  • Analyzing Network Events
  • Investigating Host-Related Issues
  • Investigating Service- and Application-Related Issues
  • Determining Malicious Activity Using Tools and Techniques
  • Summary
  • Exam Essentials
  • Lab Exercises
5

Threat Intelligence

  • Threat Data and Intelligence
  • Threat Classification
  • Applying Threat Intelligence Organizationwide
  • Summary
  • Exam Essentials
  • Lab Exercises
6

Reconnaissance and Intelligence Gathering

  • Mapping, Enumeration, and Asset Discovery
  • Passive Discovery
  • Summary
  • Exam Essentials
  • Lab Exercises
7

Designing a Vulnerability Management Program

  • Identifying Vulnerability Management Requirements
  • Configuring and Executing Vulnerability Scans
  • Developing a Remediation Workflow
  • Overcoming Risks of Vulnerability Scanning
  • Vulnerability Assessment Tools
  • Summary
  • Exam Essentials
  • Lab Exercises
8

Analyzing Vulnerability Scans

  • Reviewing and Interpreting Scan Reports
  • Validating Scan Results
  • Common Vulnerabilities
  • Summary
  • Exam Essentials
  • Lab Exercises
9

Responding to Vulnerabilities

  • Analyzing Risk
  • Managing Risk
  • Implementing Security Controls
  • Threat Classification
  • Managing the Computing Environment
  • Software Assurance Best Practices
  • Designing and Coding for Security
  • Software Security Testing
  • Policies, Governance, and Service Level Objectives
  • Summary
  • Exam Essentials
  • Lab Exercises
10

Building an Incident Response Program

  • Security Incidents
  • Phases of Incident Response
  • Building the Foundation for Incident Response
  • Creating an Incident Response Team
  • Classifying Incidents
  • Attack Frameworks
  • Summary
  • Exam Essentials
  • Lab Exercises
11

Incident Detection and Analysis

  • Indicators of Compromise
  • Investigating IoCs
  • Evidence Acquisition and Preservation
  • Summary
  • Exam Essentials
  • Lab Exercises
12

Containment, Eradication, and Recovery

  • Containing the Damage
  • Incident Eradication and Recovery
  • Validating Data Integrity
  • Wrapping Up the Response
  • Summary
  • Exam Essentials
  • Lab Exercises
13

Reporting and Communication

  • Vulnerability Management Reporting and Communication
  • Incident Response Reporting and Communication
  • Summary
  • Exam Essentials
  • Lab Exercises
14

Performing Forensic Analysis and  Techniques for Incident Response

  • Building a Forensics Capability
  • Understanding Forensic Software
  • Conducting Endpoint Forensics
  • Network Forensics
  • Cloud, Virtual, and Container Forensics
  • Post-Incident Activity and Evidence Acquisition
  • Forensic Investigation: An Example
  • Summary
  • Exam Essentials
  • Lab Exercises

1

Today's Cybersecurity Analyst

  • Creating a Firewall Rule
  • Setting Up a Honeypot on Kali Linux
2

System and Network Architecture

  • Installing Docker
  • Viewing the Windows File Registry
  • Installing the AD FS Role
  • Examining PKI Certificates
3

Malicious Activity

  • Confirming the Spoofing Attack in Wireshark
  • Performing a DoS Attack with the SYN Flood
  • Using Social Engineering Techniques to Plan an Attack
  • Using Performance Monitor
  • Performing a Memory-Based Attack
  • Using Command-line Tools
  • Analyzing Malware Using Virustotal
  • Using TCPdump to Capture Packets
  • Enabling Logging for Audited Objects
  • Examining Audited Events
  • Capturing a Packet Using Wireshark
4

Threat Intelligence

  • Examining MITRE ATT&CK
5

Reconnaissance and Intelligence Gathering

  • Footprinting a Website
  • Performing an Intense Scan in Zenmap
  • Using Shodan to Find Webcams
  • Using Recon-ng to Gather Information
  • Identifying Search Options in Metasploit
  • Performing Reconnaissance on a Network
  • Scanning the Local Network
  • Using the hping Program
  • Making Syslog Entries Readable
  • Performing Zone Transfer Using dig
  • Using the netstat Command
  • Using the whois Program
  • Using nslookup for Passive Reconnaissance
6

Designing a Vulnerability Management Program

  • Using OWASP ZAP
  • Consulting a Vulnerability Database
  • Conducting Vulnerability Scanning Using Nessus
  • Performing Vulnerability Scanning Using OpenVAS
  • Performing Session Hijacking Using Burp Suite
  • Using Nikto
7

Analyzing Vulnerability Scans

  • Exploiting LFI and RFI Vulnerabilities
  • Exploiting a Website Using SQL Injection
  • Conducting CSRF Attacks
  • Defending Against a Buffer Overflow Attack
  • Understanding Local Privilege Escalation
  • Performing a MITM Attack
  • Detecting Rootkits
  • Attacking a Website Using XSS Injection
8

Incident Detection and Analysis

  • Creating a Forensic Image with FTK Imager
9

Performing Forensic Analysis and  Techniques for Incident Response

  • Using EnCase Imager
  • Observing an MD5-Generated Hash Value
  • Analyzing Forensics with Autopsy
  • Observing a SHA256-Generated Hash Value
  • Cracking Passwords Using Cain and Abel
  • Completing the Chain of Custody
  • Finding Hard Drives on the System

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

Related Courses

All Courses
scroll to top