CyberSec First Responder (CFR)5.
Topic E: Assess The Impact Of Dos Incidents Topic F: Assess The Impact Of
Threats To Mobile Security Topic G: Assess The Impact Of Threats To Cloud
Security Module: 05 - Analyzing
Post-Attack Techniques Topic A: Assess Command And Control Techniques Topic B:
Assess Persistence Techniques Topic C: Assess Lateral Movement And Pivoting
Techniques Topic D: Assess Data Exfiltration Techniques 5. Topic E: Assess
Anti-Forensics Techniques Module 06 -
Evaluating The Organization’s
Security Posture Topic A: Conduct Vulnerability Assessments Topic B: Conduct
Penetration Tests On Network Assets Topic C: CyberSec First Responder (CFR)Follow Up On Penetration Testing Module: 07 - Collecting Cybersecurity Intelligence
Topic A: Deploy A Security Intelligence Collection And Analysis Platform Topic
B: Collect Data from Network-Based Intelligence Sources Topic C: Collect Data
From Host-Based Intelligence Sources Module: 08 - Analyzing Log Data Topic A: Use
Common Tools To Analyze Logs Topic B: Use Seem Tools For Analysis Topic C:
Parse Log Files with.