K Labs mette a tua disposizione i propri Trainers Certificati, i Laboratori Didattici, i Simulatori di Esame, il proprio Test Center e un Tutor a te dedicato per la preparazione all'esame.
Grazie al nostro supporto la percentuale di candidati che ottengono la certificazione al primo tentativo è prossima al 100%.
K Labs mette a tua disposizione i propri Trainers Certificati, i Laboratori Didattici, i Simulatori di Esame, il proprio Test Center e un Tutor a te dedicato per la preparazione all'esame.
Grazie al nostro supporto la percentuale di candidati che ottengono la certificazione al primo tentativo è prossima al 100%.
DURATION
5 days
OBJECTIVES
In this course, you will simulate, analyze, and address attacks on computing and network environments. You will:
Get oriented to your tools and environment.
Exploit vulnerabilities in software.
Exploit vulnerabilities related to system access, networking, data, and file configurations.
Analyze attacks using passive and active methods.
Implement security protections to minimize the impact of attacks
WHO SHOULD ATTEND
This course is designed for cybersecurity professionals who want to expand their practical skills in the three aforementioned modes. The target student is also someone who has taken the CyberSec First Responder® (Exam CFR-410) course and wants to dive deeper into the methods and tactics used to defend against a range of cyber threats. This course is also designed to assist students in preparing for the CFR-A credential, available through the CHOICE platform. The skills covered in this course also complement the security theory that is covered in more conceptually oriented programs, such as Certified Information Systems Security Professional (CISSP®). For CFR-A candidates who are also considering the CISSP certification, we have provided a bonus study guide on the CHOICE platform. Log in to your CHOICE course screen for more information.
TOPICS
Lesson 1: Getting Oriented to Your Tools and Environment
Lesson 2: Exploiting Soware Vulnerabilies
Lesson 3: Exploiting System Vulnerabili
Lesson 4: Analyzing Attacks
Lesson 5: Protecting Assets