ISACA CSX Practitioner I: Identification and Protection Training

Print Friendly, PDF & Email
Introduction

ISACA CSX Practitioner I: Identification and Protection Training Course by ENO

Learn how to identify and protect network threats with this ISACA CSX Practitioner I: Identification and Protection Training.

ISACA’s Cybersecurity Nexus (CSX) certification program supports cybersecurity professionals throughout their career by assessing a candidate’s abilities and skills at three progressive technical skill levels. Levels are differentiated by skills, not by years of experience. Each technical skill level is assessed utilizing a vendor-neutral set of performance-based exams measuring a candidate’s technical skills, abilities and performance in the following areas: Identify, Protect, Detect, Respond, and Recover.

The ISACA CSX Practitioner I: Identification and Protection Training course focuses on the first two domains within ISACA’s CSX Practitioner certification exam – Identify and Protect. Those who register for this ISACA authorized CSX Practitioner 1 prep course will learn how to apply industry-developed, experience-based methods to the identification of specific internal and external network threats. Additionally, students will learn the basic concepts, methods, and tools associated with implementing cyber security controls to protect a system from the identified threats.

This ISACA CSX Practitioner I: Identification and Protection Training course, along with CSX Practitioner 2 and 3, was developed using existing global cybersecurity frameworks as well as input from hundreds of subject matter experts. Whether a student is planning to write the exam or learn more about Cyber Security, this ISACA CSX Practitioner I: Identification and Protection Training course is packed with study tips and practical exercises.

Duration: 5 days

ISACA CSX Practitioner I: Identification and Protection Training Related Courses

 
Customize It

• We can adapt this ISACA CSX Practitioner I: Identification and Protection Training course to your group’s background and work requirements at little to no added cost.
• If you are familiar with some aspects of this ISACA CSX Practitioner I: Identification and Protection Training course, we can omit or shorten their discussion.
• We can adjust the emphasis placed on the various topics or build the ISACA CSX Practitioner I: Identification and Protection Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
• If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the ISACA CSX Practitioner I: Identification and Protection Training course in manner understandable to lay audiences.

Audience / Target Group

• Individuals in the field of cybersecurity who are interested in gaining hands-on technical skills

ISACA CSX Practitioner I: Identification and Protection Training - Prerequisites:

• While this training program does not have any prerequisites, we recommend for all prospective students to have professional experience in the field of cyber security along with an interest in gaining hands-on technical skills.

ISACA CSX Practitioner I: Identification and Protection Training - Objectives:

After completing this ISACA CSX Practitioner I: Identification and Protection Training course, attendees will be able to:

• Network reconnaissance
• Network mapping
• Vulnerability scanning
• Security control assessment
• Log analysis
• IDS control testing
• IDS patching

ISACA CSX Practitioner I: Identification and Protection Training - Course Content:

Day 1

The first day of this official ISACA CSX Practitioner I: Identification and Protection Training course reviews several topics while also providing labs for students to gain practical experience. The lessons and labs found below are associated with the following topics: C.I.A., Active / Passive Scanning, Availability / Authenticity, Asset Classification, Network Devices, and OSI Model.

Lessons:

• Hardware and Software Identification and Documentation
• Network Reconnaissance and Scanning
• Sensitive Information Discovery
• Asset Validation and Rogue Devices

Labs

• Preliminary Scanning
• Additional Scanning Options
• Scanning from Windows

Day 2

Day 2 of this official ISACA CSX Practitioner I: Identification and Protection Training course reviews several topics while also providing labs for students to gain practical experience. The lessons and labs found below are associated with the following topics: Scanning, Enumeration, Penetration Training, and Fingerprinting.

Lessons:

• Network Topology Documentation
• Vulnerability Assessment Process
• Patching and Configuration Vulnerability Scanners
• Vulnerability Scanning
• Vulnerability Scanning Analysis

Labs:

• Specialized Linux Port Scans
• Sensitive Information identification
• Network Topology Generation
• Vulnerability Scanner Set-up and Configuration
• Vulnerability Scanner Set-up and Configuration, Pt. 2

Day 3

Day 3 of this ISACA CSX Practitioner I: Identification and Protection Training training seminar reviews several topics while also providing labs for students to gain practical experience. The lessons and labs found below are associated with the following topics: Cryptographic Controls, NSIT / ISO Documentation, Network / Host Prevention Systems, Internal Log Processes, and External Documentation.

Lessons:

• Implementing Specified Cyber Security Controls
• Cyber Security Procedure Execution
• Configuring Cyber Security Controls
• Validating Configurations

Labs:

• System Hardening
• Firewall Setup and Configuration

Day 4

The fourth day of training for this ISACA CSX Practitioner I: Identification and Protection Training course reviews several topics while also providing labs for students to gain practical experience. The lessons and labs found below are associated with the following topics: Host Logs, Activity Logs, Network Logs, Firewall Logs, IDS Logs, and Encryption.

Lessons:

• Documenting Configuration Changes
• Testing New Controls
• Collecting Event Data
• Sending and Receiving Event Data
• Verifying the Effectiveness of Controls

Labs:

• Log Analysis
• Centralized Monitoring
• Microsoft Baseline Analyzer

Day 5

In the final day of this official ISACA CSX Practitioner I: Identification and Protection Training seminar, students review several topics while also participating in various labs to gain practical experience. The lessons and labs found below are associated with the following topics: Non-Repudiation, Multiple Factor Authentication, Information Classification, File System Access Control Mechanisms, Mobile Device Management Policy, and Remote Access Solutions.

Lessons:

• Hardware and Software Identification and Documentation
• Network Reconnaissance and Scanning
• Sensitive Information Discovery
• Asset Validation and Rogue Devices

Labs:

• Preliminary Scanning
• Additional Scanning Options
• Scanning from Windows

Request More Information

Time Frame: 0-3 Months4-12 Months

No Comments Yet.

Leave a comment

0