Conducting Forensic Analysis and Incident Response Using Cisco Technologies for CyberOps (CBRFIR) v1.0

Duration: 5 Days (40 Hours)

Conducting Forensic Analysis and Incident Response Using Cisco Technologies for CyberOps (CBRFIR) v1.0 Course Overview:

What you’ll learn in this course
The Conducting Forensic Analysis and Incident Response Using Cisco Technologies for CyberOps (CBRFIR) v1.0 course is a 5-day training consisting of a series of lectures and videos that build your Digital Forensics and Incident Response (DFIR) and cybersecurity knowledge and skills. The course prepares you to
identify and respond to cybersecurity threats, vulnerabilities, and incidents.
Additionally, you will be introduced to digital forensics, including the collection and examination of digital evidence on electronic devices and learn to build the subsequent response threats and attacks. Students will also learn to
proactively conduct audits to prevent future attacks.
The Conducting Forensic Analysis and Incident Response Using Cisco Technologies for CyberOps (CBRFIR) v1.0 course also prepares you to take the 300-215 CBRFIR exam.

How you’ll benefit
This course will help you:
● Develop an understanding of various cybersecurity threat and vulnerabilities
● Establish a framework for proactively responding to cybersecurity threat and vulnerabilities

Who should enroll
This course is designed for the following roles:
● SOC analysts, Tiers 1–2
● Threat researchers
● Malware analysts
● Forensic analysts
● Computer Telephony Integration (CTI) analysts
● Incident response analysts
● Security operations center engineers
● Security engineers

Technology areas
● Network security
● Security analysis


After taking this course, you should be able to:
● Analyze the components needed for a root cause analysis report
● Apply tools such as YARA for malware identification
● Recognize the methods identified in the MITRE attack framework
● Leverage scripting to parse and search logs or multiple data sources such as, Cisco Umbrella, Sourcefire IPS, AMP for Endpoints, AMP for Network, and PX Grid
● Recommend actions based on post-incident analysis
● Determine data to correlate based on incident type (host-based and network-based activities)
● Evaluate alerts from sources such as firewalls, Intrusion Prevention Systems (IPS), data analysis tools
(such as, Cisco Umbrella Investigate, Cisco Stealthwatch, and Cisco SecureX), and other systems to responds to cyber incidents and recommend mitigation

● Evaluate elements required in an incident response playbook and the relevant components from the
ThreatGrid report
● Analyze threat intelligence provided in different formats (such as, STIX and TAXII)

● Introducing Incident Response and Forensic Analysis
● Describing Digital Forensics and Incident Response (DFIR) Guidelines and Associations
● Examining Threats and Vulnerability Frameworks
● Describing the Analytical Mindset
● Preparing for Incident Response and Responding to Threats
● Identifying Sources of Evidence
● Gathering Intelligence
● Examining Digital Forensics and Incident Response Tools
● Describing Detection and Analysis
● Describing Investigation and Detection
● Describing Digital Forensics
● Describing Breach Containment and Eradication
● Describing Post-Incident Activities

● Explore Adversarial Techniques, Tactics, and Common Knowledge (ATT&CK), Common Attack Pattern
Enumeration and Classification (CAPEC), and National Institute of Standards and Technology (NIST)
Common Weakness Enumeration Specification (CWE), and Common Vulnerabilities and Exposures (CVE)
● Explore Available Incident-Related Information
● Examine Network Diagrams
● Examine Logs
● Examine Response Data Formats
● Discover Sources of Evidence in the Network
● Discover Sources of Evidence at Endpoints
● Discover Sources of Evidence in the Cloud
● Discover Syslog Facilities and Severity Levels
● Explore Gathered Intelligence
● Explore AccessData Forensic Toolkit (FTK) and Autopsy
● Explore Hex Encoding
● Explore Disassemblers and Debuggers
● Explore Deobfuscation Tools
● Explore Native Windows Tools Used in Digital Forensics and Incident Response
● Explore Native Linux Tools
● Explore Wireshark

● Create and Use a Yet Another Recursive Acronym (YARA) Rule
● Examine the Threat-Hunting Process
● Perform Data Acquisition
● Acquire Data from the Cloud
● Acquire Data Acquisition from Files, Disk, and Drive
● Analyze RAM and Fileless Malware Data
● Analyze Network Data
● Correlate Data from Different Sources
● Use Scripting for Forensics
● Analyze Web Application Logs
● Contain the Attack
● Remediate an Incident
● Analyze the Evidence and Propose the Solution

Before taking this course, you should have:
● Familiarity with network and endpoint security concepts and monitoring
● Experience with network intrusion analysis
● An understanding of security policies and procedures
● Experience with risk management
● Experience with traffic and logs analysis
● Familiarity with APIs
● 2–3 years’ experience working in a Security Operations Center (SOC) environment (experience Tier 1, or
new Tier 2)
These recommended Cisco learning offerings may help students meet these prerequisites:
● Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
● Performing CyberOps Using Cisco Security Technologies (CBRCOR)
● Splunk Fundamentals 1

Discover the perfect fit for your learning journey

Choose Learning Modality

Live Online

  • Convenience
  • Cost-effective
  • Self-paced learning
  • Scalability


  • Interaction and collaboration
  • Networking opportunities
  • Real-time feedback
  • Personal attention


  • Familiar environment
  • Confidentiality
  • Team building
  • Immediate application

Training Exclusives

This course comes with following benefits:

  • Practice Labs.
  • Get Trained by Certified Trainers.
  • Access to the recordings of your class sessions for 90 days.
  • Digital courseware
  • Experience 24*7 learner support.

Got more questions? We’re all ears and ready to assist!

Request More Details

Please enable JavaScript in your browser to complete this form.

Subscribe to our Newsletter

Please enable JavaScript in your browser to complete this form.