TrueschoTruescho
All Courses
CFR: Reconnaissance, Attack, and Post-Attack Analysis
Coursera
Course
Unknown

CFR: Reconnaissance, Attack, and Post-Attack Analysis

CertNexus

This course focuses on threat modeling, various cyberattack types, and post-attack analysis techniques.

Unknown4 weeksEnglish

About this Course

In this course, you'll continue developing your cybersecurity practitioner skills by implementing threat modeling and assessing the impact of reconnaissance and social engineering. Then, you'll assess the impact of a variety of different attack categories—system hacking attacks, web-based attacks, malware, hijacking and impersonation, denial-of-service (DoS) incidents, threats to mobile security, and threats to cloud security. You'll also analyze post-attack techniques like command and control (C2), persistence, lateral movement and pivoting, data exfiltration, and anti-forensics. This is the second course in a multi-course Specialization. All of the courses in this Specialization require that you purchase the CFR-410 LogicalLABS, which are interactive, browser-based virtual labs that simulate the activity environment. These labs are already set up with the data files, networking, and system configurations required to perform the activities. With the coupon code provided in the first course for 25% off, the labs cost approximately $60. If you already purchased the labs for the first course, you're all set

What You'll Learn

  • Analyze reconnaissance threats and various cyberattack types
  • Assess post-attack techniques including command and control
  • Understand data exfiltration and anti-forensic methods
  • Apply threat modeling in cybersecurity contexts

Prerequisites

  • Basic computer and internet skills
  • Ability to read instructions in English and perform exercises

Instructors

B

Bill Rosenthal

Topics

Security
Information Technology
Threat Modeling
Cyber Security Assessment
Distributed Denial-Of-Service (DDoS) Attacks
Cybersecurity
Cloud Security
Threat Management
Mobile Security
Exploitation techniques

Course Info

PlatformCoursera
LevelUnknown
PacingUnknown
PriceFree

Skills

الأمن السيبراني
تكنولوجيا المعلومات
نمذجة التهديدات
تقييم الأمن السيبراني
هجمات حجب الخدمة الموزعة
أمن السحابة
إدارة التهديدات
Threat Management
Mobile Security
Exploitation techniques

Start Learning Now