CyberSec First Responder – Advanced (CFR-A)

Course Overview

This course takes cybersecurity practice to the next level. It is an advanced experience that builds upon the defensive skills and knowledge taught by the CyberSec First Responder® (Exam CFR-410) course. It is an applied experience in that it almost entirely consists of hands-on exercises featuring many different tools and environments.

The “”A”” in CFR-A can also refer to the cybersecurity modes this course is built around:

  • Attack: Simulating attacks on computing assets to test security measures and learn more about threat vectors.
  • Analyze: Identifying, detecting, and assessing threats to learn more about how they operate and how they affect security.
  • Address: Implementing countermeasures and other protections to mitigate the impact of threats to security.

Course Objectives

  • Get oriented to your tools and environment.
  • Exploit vulnerabilities in software.
  • Exploit vulnerabilities related to system access, networking, data, and file configurations.
  • Analyze attacks using passive and active methods.
  • Implement security protections to minimize the impact of attacks.

Who Should Attend?

This course is designed for cybersecurity professionals who want to expand their practical skills in the three aforementioned modes. The target student is also someone who has taken the CyberSec First Responder® (Exam CFR-410) course and wants to dive deeper into the methods and tactics used to defend against a range of cyber threats.

Course Prerequisites

To ensure your success in this course, you should have taken the CyberSec First Responder® (Exam CFR410) course and passed the associated exam. This validates you have intermediate skills in working with the Linux® operating system; working at the command line; using fundamental cybersecurity tools like Nmap and Metasploit; and following an incident-response process—all of which are important to this course. And, it ensures you have foundational cybersecurity and networking knowledge.

In addition, you should have some familiarity with computer programming and scripting. Expertise in writing code is not necessary, but you should be able to comprehend code at a high level, and follow the logic behind a script as it is explained to you. Knowledge of one particular programming language is not required. Python is fairly universal, especially among technology professionals who are not software developers by trade.

What’s included?

  • Authorized Courseware
  • Intensive Hands on Skills Development with an Experienced Subject Matter Expert
  • Hands-on practice on real Servers and extended lab support 1.800.482.3172
  • Examination Vouchers & Onsite Certification Testing- (excluding Adobe and PMP Boot Camps)
  • Academy Code of Honor: Test Pass Guarantee
  • Optional: Package for Hotel Accommodations, Lunch and Transportation

With several convenient training delivery methods offered, The Academy makes getting the training you need easy. Whether you prefer to learn in a classroom or an online live learning virtual environment, training videos hosted online, and private group classes hosted at your site. We offer expert instruction to individuals, government agencies, non-profits, and corporations. Our live classes, on-sites, and online training videos all feature certified instructors who teach a detailed curriculum and share their expertise and insights with trainees. No matter how you prefer to receive the training, you can count on The Academy for an engaging and effective learning experience.

Methods

  • Instructor-Led (the best training format we offer)
  • Live Online Classroom – Online Instructor-Led
  • Self-Paced Video

Speak to an Admissions Representative for complete details

StartFinishPublic PricePublic Enroll Private PricePrivate Enroll
12/8/202512/12/2025
12/29/20251/2/2026
1/19/20261/23/2026
2/9/20262/13/2026
3/2/20263/6/2026
3/23/20263/27/2026
4/13/20264/17/2026
5/4/20265/8/2026
5/25/20265/29/2026
6/15/20266/19/2026
7/6/20267/10/2026
7/27/20267/31/2026
8/17/20268/21/2026
9/7/20269/11/2026
9/28/202610/2/2026
10/19/202610/23/2026
11/9/202611/13/2026
11/30/202612/4/2026
12/21/202612/25/2026
1/11/20271/15/2027

Agenda

Duration
5 Days

1 – Getting Oriented to Your Tools and Environment

  • Explore the CFR-A Activity Environment
  • Perform Reconnaissance
  • Simulate an Attack Using Metasploit

2 – Exploiting Software Vulnerabilities

  • Exploit Code-Execution and Injection Vulnerabilities
  • Exploit Web-Application Vulnerabilities

3 – Exploiting System Vulnerabilities

  • Exploit Access Vulnerabilities
  • Exploit Network Vulnerabilities
  • Exploit Data Vulnerabilities
  • Exploit File-Configuration Vulnerabilities

4 – Analyzing Attack

  • Analyze Logs for Signs of Attack
  • Detect Attack Using Active Monitoring Systems
  • Perform Digital Forensics

5 – Protecting Assets

  • Protect Data
  • Protect Access
  • Protect Software
  • Protect Networks and Systems