ISACA CSX Practitioner I: Identification and Protection Training
ISACA CSX Practitioner I: Identification and Protection Training: ISACA’s Cybersecurity Nexus (CSX) certification program supports cybersecurity professionals throughout their career by assessing a candidate’s abilities and skills at three progressive technical skill levels. Levels are differentiated by skills, not by years of experience. Each technical skill level is assessed utilizing a vendor-neutral set of performance-based exams measuring a candidate’s technical skills, abilities and performance in the following areas: Identify, Protect, Detect, Respond, and Recover.
The CSX Practitioner I: Identification and Protection Training course focuses on the first two domains within CSX Practitioner certification exam – Identify and Protect. Those who register for this ISACA authorized CSX Practitioner 1 prep course will learn how to apply industry-developed, experience-based methods to the identification of specific internal and external network threats. Additionally, students will learn the basic concepts, methods, and tools associated with implementing cyber security controls to protect a system from the identified threats.
This CSX Practitioner I: Identification and Protection Training course, along with CSX Practitioner 2 and 3, was developed using existing global cybersecurity frameworks as well as input from hundreds of subject matter experts. Whether a student is planning to write the exam or learn more about Cyber Security, this course is packed with study tips and practical exercises.
Duration: 5 days
RESOURCES
- ISACA CSX Practitioner I: Identification and Protection Training – https://www.wiley.com/
- ISACA CSX Practitioner I: Identification and Protection Training – https://www.packtpub.com/
- ISACA CSX Practitioner I: Identification and Protection Training – https://store.logicaloperations.com/
- ISACA CSX Practitioner I: Identification and Protection Training – https://us.artechhouse.com/
- ISACA CSX Practitioner I: Identification and Protection Training – https://www.amazon.com/
RELATED COURSES
- ISACA CSX Practitioner II: Detection Training
- ISACA CSX Practitioner III: Respond and Recover Training
CUSTOMIZE It
- We can adapt this ISACA CSX Practitioner I: Identification and Protection Training course to your group’s background and work requirements at little to no added cost.
- If you are familiar with some aspects of this ISACA CSX Practitioner I: Identification and Protection Training course, we can omit or shorten their discussion.
- We can adjust the emphasis placed on the various topics or build the ISACA CSX Practitioner I: Identification and Protection Course around the mix of technologies of interest to you (including technologies other than those included in this outline).
- If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the ISACA CSX Practitioner I: Identification and Protection course in manner understandable to lay audiences.
AUDIENCE/TARGET GROUP
The target audience for this ISACA CSX Practitioner I: Identification and Protection course:
The CSX Practitioner I: Identification and Protection Training course is intended for professionals with roles focusing on cyber security – with a minimum of one to five years of experience. Students who register for this CSX Practitioner I: Identification and Protection course should be proficient in the following areas:
- Network Scanning
- Specialized Port Scans
- Network Topologies
- Network Log Analysis
- Centralized Monitoring
- Hotfix Distribution
- Vulnerability Scanning
- Traffic Monitoring
- Compromise Indicators
- False Positive Identification
- Packet Analysis
- Used Account Controls
CLASS PREREQUISITES
The knowledge and skills that a learner must have before attending this ISACA CSX Practitioner I: Identification and Protection course are:
- You do not need to possess any prerequisites for this certification.
ISACA CSX Practitioner I: Identification and Protection Training - OBJECTIVES
Upon completing this ISACA CSX Practitioner I: Identification and Protection course, learners will be able to meet these objectives:
- Network reconnaissance
- Network mapping
- Vulnerability scanning
- Security control assessment
- Log analysis
- IDS control testing
- IDS patching
ISACA CSX Practitioner I: Identification and Protection Training - COURSE SYLLABUS
DAY 1
The first day of this official CSX Practitioner I: Identification and Protection Training course reviews several topics while also providing labs for students to gain practical experience. The lessons and labs found below are associated with the following topics: C.I.A., Active / Passive Scanning, Availability / Authenticity, Asset Classification, Network Devices, and OSI Model.
Lessons:
- Hardware and Software Identification and Documentation
- Network Reconnaissance and Scanning
- Sensitive Information Discovery
- Asset Validation and Rogue Devices
Labs:
- Preliminary Scanning
- Additional Scanning Options
- Scanning from Windows
DAY 2
Day 2 of this official CSX Practitioner I: Identification and Protection course reviews several topics while also providing labs for students to gain practical experience. The lessons and labs found below are associated with the following topics: Scanning, Enumeration, Penetration Training, and Fingerprinting.
Lessons:
- Network Topology Documentation
- Vulnerability Assessment Process
- Patching and Configuration Vulnerability Scanners
- Vulnerability Scanning
- Vulnerability Scanning Analysis
Labs:
- Specialized Linux Port Scans
- Sensitive Information identification
- Network Topology Generation
- Vulnerability Scanner Set-up and Configuration
- Vulnerability Scanner Set-up and Configuration, Pt. 2
DAY 3
Day 3 of this CSX Practitioner I: Identification and Protection seminar reviews several topics while also providing labs for students to gain practical experience. The lessons and labs found below are associated with the following topics: Cryptographic Controls, NSIT / ISO Documentation, Network / Host Prevention Systems, Internal Log Processes, and External Documentation.
Lessons:
- Implementing Specified Cyber Security Controls
- Cyber Security Procedure Execution
- Configuring Cyber Security Controls
- Validating Configurations
Labs:
- System Hardening
- Firewall Setup and Configuration
DAY 4
The fourth day of training for this CSX Practitioner I: Identification and Protection course reviews several topics while also providing labs for students to gain practical experience. The lessons and labs found below are associated with the following topics: Host Logs, Activity Logs, Network Logs, Firewall Logs, IDS Logs, and Encryption.
Lessons:
- Documenting Configuration Changes
- Testing New Controls
- Collecting Event Data
- Sending and Receiving Event Data
- Verifying the Effectiveness of Controls
Labs:
- Log Analysis
- Centralized Monitoring
- Microsoft Baseline Analyzer
DAY 5
In the final day of this official CSX Practitioner I: Identification and Protection seminar, students review several topics while also participating in various labs to gain practical experience. The lessons and labs found below are associated with the following topics: Non-Repudiation, Multiple Factor Authentication, Information Classification, File System Access Control Mechanisms, Mobile Device Management Policy, and Remote Access Solutions.
Lessons:
- Hardware and Software Identification and Documentation
- Network Reconnaissance and Scanning
- Sensitive Information Discovery
- Asset Validation and Rogue Devices
Labs:
- Preliminary Scanning
- Additional Scanning Options
- Scanning from Windows
ISACA CSX Practitioner I: Identification and Protection Training Course Wrap-Up
Whether you are looking for general information or have a specific question, we want to help.
Request More Information