ISACA CSX Practitioner I: Identification and Protection Training

ISACA CSX Practitioner I: Identification and Protection Training: ISACA’s Cybersecurity Nexus (CSX) certification program supports cybersecurity professionals throughout their career by assessing a candidate’s abilities and skills at three progressive technical skill levels. Levels are differentiated by skills, not by years of experience. Each technical skill level is assessed utilizing a vendor-neutral set of performance-based exams measuring a candidate’s technical skills, abilities and performance in the following areas: Identify, Protect, Detect, Respond, and Recover.

The CSX Practitioner I: Identification and Protection Training course focuses on the first two domains within CSX Practitioner certification exam – Identify and Protect. Those who register for this ISACA authorized CSX Practitioner 1 prep course will learn how to apply industry-developed, experience-based methods to the identification of specific internal and external network threats. Additionally, students will learn the basic concepts, methods, and tools associated with implementing cyber security controls to protect a system from the identified threats.

This CSX Practitioner I: Identification and Protection Training course, along with CSX Practitioner 2 and 3, was developed using existing global cybersecurity frameworks as well as input from hundreds of subject matter experts. Whether a student is planning to write the exam or learn more about Cyber Security, this course is packed with study tips and practical exercises.

ISACA CSX Practitioner I: Identification and Protection TrainingDuration: 5 days

RESOURCES
RELATED COURSES
CUSTOMIZE It
  • We can adapt this ISACA CSX Practitioner I: Identification and Protection Training course to your group’s background and work requirements at little to no added cost.
  • If you are familiar with some aspects of this ISACA CSX Practitioner I: Identification and Protection Training course, we can omit or shorten their discussion.
  • We can adjust the emphasis placed on the various topics or build the ISACA CSX Practitioner I: Identification and Protection Course around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the ISACA CSX Practitioner I: Identification and Protection course in manner understandable to lay audiences.
AUDIENCE/TARGET GROUP

The target audience for this ISACA CSX Practitioner I: Identification and Protection course:

The CSX Practitioner I: Identification and Protection Training course is intended for professionals with roles focusing on cyber security – with a minimum of one to five years of experience. Students who register for this CSX Practitioner I: Identification and Protection course should be proficient in the following areas:

  • Network Scanning
  • Specialized Port Scans
  • Network Topologies
  • Network Log Analysis
  • Centralized Monitoring
  • Hotfix Distribution
  • Vulnerability Scanning
  • Traffic Monitoring
  • Compromise Indicators
  • False Positive Identification
  • Packet Analysis
  • Used Account Controls
CLASS PREREQUISITES

The knowledge and skills that a learner must have before attending this ISACA CSX Practitioner I: Identification and Protection course are:

  • You do not need to possess any prerequisites for this certification.
ISACA CSX Practitioner I: Identification and Protection Training - OBJECTIVES

Upon completing this ISACA CSX Practitioner I: Identification and Protection course, learners will be able to meet these objectives:

  • Network reconnaissance
  • Network mapping
  • Vulnerability scanning
  • Security control assessment
  • Log analysis
  • IDS control testing
  • IDS patching
ISACA CSX Practitioner I: Identification and Protection Training - COURSE SYLLABUS
DAY 1

The first day of this official CSX Practitioner I: Identification and Protection Training course reviews several topics while also providing labs for students to gain practical experience. The lessons and labs found below are associated with the following topics: C.I.A., Active / Passive Scanning, Availability / Authenticity, Asset Classification, Network Devices, and OSI Model.

Lessons:

  • Hardware and Software Identification and Documentation
  • Network Reconnaissance and Scanning
  • Sensitive Information Discovery
  • Asset Validation and Rogue Devices

Labs:

  • Preliminary Scanning
  • Additional Scanning Options
  • Scanning from Windows
DAY 2

Day 2 of this official CSX Practitioner I: Identification and Protection course reviews several topics while also providing labs for students to gain practical experience. The lessons and labs found below are associated with the following topics: Scanning, Enumeration, Penetration Training, and Fingerprinting.

Lessons:

  • Network Topology Documentation
  • Vulnerability Assessment Process
  • Patching and Configuration Vulnerability Scanners
  • Vulnerability Scanning
  • Vulnerability Scanning Analysis

Labs:

  • Specialized Linux Port Scans
  • Sensitive Information identification
  • Network Topology Generation
  • Vulnerability Scanner Set-up and Configuration
  • Vulnerability Scanner Set-up and Configuration, Pt. 2
DAY 3

Day 3 of this CSX Practitioner I: Identification and Protection seminar reviews several topics while also providing labs for students to gain practical experience. The lessons and labs found below are associated with the following topics: Cryptographic Controls, NSIT / ISO Documentation, Network / Host Prevention Systems, Internal Log Processes, and External Documentation.

Lessons:

  • Implementing Specified Cyber Security Controls
  • Cyber Security Procedure Execution
  • Configuring Cyber Security Controls
  • Validating Configurations

Labs:

  • System Hardening
  • Firewall Setup and Configuration
DAY 4

The fourth day of training for this CSX Practitioner I: Identification and Protection course reviews several topics while also providing labs for students to gain practical experience. The lessons and labs found below are associated with the following topics: Host Logs, Activity Logs, Network Logs, Firewall Logs, IDS Logs, and Encryption.

Lessons:

  • Documenting Configuration Changes
  • Testing New Controls
  • Collecting Event Data
  • Sending and Receiving Event Data
  • Verifying the Effectiveness of Controls

Labs:

  • Log Analysis
  • Centralized Monitoring
  • Microsoft Baseline Analyzer
DAY 5

In the final day of this official CSX Practitioner I: Identification and Protection seminar, students review several topics while also participating in various labs to gain practical experience. The lessons and labs found below are associated with the following topics: Non-Repudiation, Multiple Factor Authentication, Information Classification, File System Access Control Mechanisms, Mobile Device Management Policy, and Remote Access Solutions.

Lessons:

  • Hardware and Software Identification and Documentation
  • Network Reconnaissance and Scanning
  • Sensitive Information Discovery
  • Asset Validation and Rogue Devices

Labs:

  • Preliminary Scanning
  • Additional Scanning Options
  • Scanning from Windows
ISACA CSX Practitioner I: Identification and Protection Training Course Wrap-Up

Whether you are looking for general information or have a specific question, we want to help.
Request More Information

    Time frame: