CFR: Reconnaissance, Attack, and Post-Attack Analysis
Skills:
Network Security70%
In this course, you'll continue developing your cybersecurity practitioner skills by implementing threat modeling and assessing the impact of reconnaissance and social engineering. Then, you'll assess the impact of a variety of different attack categories—system hacking attacks, web-based attacks, malware, hijacking and impersonation, denial-of-service (DoS) incidents, threats to mobile security, and threats to cloud security. You'll also analyze post-attack techniques like command and control (C2), persistence, lateral movement and pivoting, data exfiltration, and anti-forensics.
This is the second course in a multi-course Specialization.
All of the courses in this Specialization require that you purchase the CFR-410 LogicalLABS, which are interactive, browser-based virtual labs that simulate the activity environment. These labs are already set up with the data files, networking, and system configurations required to perform the activities. With the coupon code provided in the first course for 25% off, the labs cost approximately $60. If you already purchased the labs for the first course, you're all set.
Watch on Coursera ↗
(saves to browser)
Sign in to unlock AI tutor explanation · ⚡30
More on: Network Security
View skill →Related AI Lessons
⚡
⚡
⚡
⚡
The Hidden Risk in Emergency Evacuation Plans Nobody Talks About
Medium · Cybersecurity
3 Key Takeaways on Why Cybersecurity Product Management Matters More Than Ever
Medium · Cybersecurity
The Coding Challenge That Came for Your development Directory: Anatomy of a Job Interview Infostealer
Dev.to · Alex Chen
I Watched an AI Hack a Home Network in Under 10 Minutes
Medium · Cybersecurity
🎓
Tutor Explanation
DeepCamp AI