ISACA CSX Practitioner I: Identification and Protection Training

Print Friendly, PDF & Email
Introduction

ISACA CSX Practitioner I: Identification and Protection Training Course with Hands-on Labs (Online, Onsite and Classroom Live)

Learn how to identify and protect network threats with this ISACA CSX Practitioner I: Identification and Protection Training.

ISACA’s Cybersecurity Nexus (CSX) certification program supports cybersecurity professionals throughout their career by assessing a candidate’s abilities and skills at three progressive technical skill levels. Levels are differentiated by skills, not by years of experience. Each technical skill level is assessed utilizing a vendor-neutral set of performance-based exams measuring a candidate’s technical skills, abilities and performance in the following areas: Identify, Protect, Detect, Respond, and Recover.

The SACA CSX Practitioner I: Identification and Protection course focuses on the first two domains within ISACA’s CSX Practitioner certification exam – Identify and Protect. Those who register for this ISACA authorized CSX Practitioner 1 prep course will learn how to apply industry-developed, experience-based methods to the identification of specific internal and external network threats. Additionally, students will learn the basic concepts, methods, and tools associated with implementing cyber security controls to protect a system from the identified threats.

This ISACA CSX Practitioner I: Identification and Protection Training course, along with CSX Practitioner 2 and 3, was developed using existing global cybersecurity frameworks as well as input from hundreds of subject matter experts. Whether a student is planning to write the exam or learn more about Cyber Security, this course is packed with study tips and practical exercises.

Duration: 5 days

Related Courses
 Customize It
  • We can adapt this ISACA CSX Practitioner I: Identification and Protection Training course to your group’s background and work requirements at little to no added cost.
  • If you are familiar with some aspects of this ISACA CSX Practitioner I: Identification and Protection Training course, we can omit or shorten their discussion.
  • We can adjust the emphasis placed on the various topics or build the ISACA CSX Practitioner I: Identification and Protection Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the ISACA CSX Practitioner I: Identification and Protection course in manner understandable to lay audiences.
Audience / Target Group

The ISACA CSX Practitioner I: Identification and Protection course is intended for professionals with roles focusing on cyber security – with a minimum of one to five years of experience. Students who register for this course should be proficient in the following areas:

  • Network Scanning
  • Specialized Port Scans
  • Network Topologies
  • Network Log Analysis
  • Centralized Monitoring
  • Hotfix Distribution
  • Vulnerability Scanning
  • Traffic Monitoring
  • Compromise Indicators
  • False Positive Identification
  • Packet Analysis
  • Used Account Controls
ISACA CSX Practitioner I: Identification and Protection Training - Prerequisites:
  • While this training program does not have any prerequisites, we recommend for all prospective students to have professional experience in the field of cyber security along with an interest in gaining hands-on technical skills.
ISACA CSX Practitioner I: Identification and Protection Training - Objectives:

After completing this ISACA CSX Practitioner I: Identification and Protection Training course, attendees will be able to:

  • Network reconnaissance
  • Network mapping
  • Vulnerability scanning
  • Security control assessment
  • Log analysis
  • IDS control testing
  • IDS patching
ISACA CSX Practitioner I: Identification and Protection Training - Course Content:
Day 1

The first day of this official CSX Practitioner 1 course reviews several topics while also providing labs for students to gain practical experience. The lessons and labs found below are associated with the following topics: C.I.A., Active / Passive Scanning, Availability / Authenticity, Asset Classification, Network Devices, and OSI Model.

Lessons:

  • Hardware and Software Identification and Documentation
  • Network Reconnaissance and Scanning
  • Sensitive Information Discovery
  • Asset Validation and Rogue Devices

Labs:

  • Preliminary Scanning
  • Additional Scanning Options
  • Scanning from Windows
Day 2

Day 2 of this official course reviews several topics while also providing labs for students to gain practical experience. The lessons and labs found below are associated with the following topics: Scanning, Enumeration, Penetration Training, and Fingerprinting.

Lessons:

  • Network Topology Documentation
  • Vulnerability Assessment Process
  • Patching and Configuration Vulnerability Scanners
  • Vulnerability Scanning
  • Vulnerability Scanning Analysis

Labs:

  • Specialized Linux Port Scans
  • Sensitive Information identification
  • Network Topology Generation
  • Vulnerability Scanner Set-up and Configuration
  • Vulnerability Scanner Set-up and Configuration, Pt. 2
Day 3

Day 3 of this CSX Practitioner 1 training seminar reviews several topics while also providing labs for students to gain practical experience. The lessons and labs found below are associated with the following topics: Cryptographic Controls, NSIT / ISO Documentation, Network / Host Prevention Systems, Internal Log Processes, and External Documentation.

Lessons:

  • Implementing Specified Cyber Security Controls
  • Cyber Security Procedure Execution
  • Configuring Cyber Security Controls
  • Validating Configurations

Labs:

  • System Hardening
  • Firewall Setup and Configuration
Day 4

The fourth day of training for this course reviews several topics while also providing labs for students to gain practical experience. The lessons and labs found below are associated with the following topics: Host Logs, Activity Logs, Network Logs, Firewall Logs, IDS Logs, and Encryption.

Lessons:

  • Documenting Configuration Changes
  • Testing New Controls
  • Collecting Event Data
  • Sending and Receiving Event Data
  • Verifying the Effectiveness of Controls

Labs:

  • Log Analysis
  • Centralized Monitoring
  • Microsoft Baseline Analyzer
Day 5

In the final day of this official CSX Practitioner 1 training seminar, students review several topics while also participating in various labs to gain practical experience. The lessons and labs found below are associated with the following topics: Non-Repudiation, Multiple Factor Authentication, Information Classification, File System Access Control Mechanisms, Mobile Device Management Policy, and Remote Access Solutions.

Lessons:

  • Hardware and Software Identification and Documentation
  • Network Reconnaissance and Scanning
  • Sensitive Information Discovery
  • Asset Validation and Rogue Devices

Labs:

  • Preliminary Scanning
  • Additional Scanning Options
  • Scanning from Windows
Request More Information

Time Frame: 0-3 Months4-12 Months

0