Academy


This program will provides the fundamental knowledge and skills required that will enable participants to effectively detect, identify, and respond to malicious activities involving data systems. Additionally, the candidate will have the foundational knowledge to deal with a changing threat landscape and will be able to perform root cause analysis, determine scope, accurately report results, and recommend remediation actions.


At the end of the program, the participants will be able to :

  1. Assess information security risk in computing and network environments
  2. Analyze the cybersecurity landscape
  3. Analyze reconnaissance threats to computing and network environments
  4. Analyze attacks on computing and network environments
  5. Analyze post-attack techniques on computing and network environments
  6. Evaluate an organization’s security posture within a risk management framework
  7. Collect cybersecurity intelligence
  8. Analyze data collected from security and event logs
  9. Perform active analysis on assets and networks
  10. Apply their knowledge and skills for their personal development and professional and healthy work, founded on sound values and ethics.

The Logical Operations CyberSec First Responder (CFR-210) exam target audience should have at least 2-5 years of experience working in a networking environment as a first responder.


This program is 5 days of intensive training class.


There are no formal prerequisites for this program, just strongly recomments that the participants have a knowledge and skills in information security risk in computing and network environments.


Number of Items : There are 100 questions given in the examination in a form of Multiple Choice, Multiple Response and Drag-and-Drop.

Duration of Exam: 120 minutes (Note: Published exam times include the 5 minutes you are allotted for reading and signing the Candidate Agreement and the 5 minutes you are allotted for the Pearson VUE testing system tutorial.)

Passing Score : Between 62% and 69% depending on the exam form. Forms have been statistically equated based on question difficulty levels.


CISSP® Certification will be awarded upon successfully passing the exam from (ISC)2.


  1. Various Threats and Classify Threat Profiles
  2. Purpose and Use of Attack Tools and Techniques
  3. Purpose and Use of Post Exploitation Tools and Tactics
  4. Purpose and Use of Social Engineering Tactics
  5. Threat Landscape Research and Use Data to Prepare for Incidents
  1. Purpose and Characteristics of Various Data Sources
  2. Appropriate Tools to Analyze Logs
  3. Regular Expressions to Parse Log Files and Locate Meaningful Data
  1. Windows Tools to Analyze Incidents
  2. Linux-Based Tools to Analyze Incidents
  3. Methods and Tools Used for Malware Analysis
  4. Common Indicators of Potential Compromise
  1. Importance of Best Practices in Preparation for Incident Response
  2. Incident Response Process
  3. Importance of Concepts that are Unique to Forensic Analysis
  4. General Mitigation Methods and Devices

Scroll to Top