* All fees are exclusive of vat ** PREMIUM - Customize your learning experience
This official ISACA Cybersecurity Nexus (CSX) Practitioner certification course prepares you for the exam and provides you with in-depth coverage on the skills and concepts in the five areas (Identify, Protect, Detect, Respond, Recover) aligned to an existing global security framework (NIST Framework). This is designed specifically for IT professionals established in the cyber security field with a minimum of one to five years of experience.
Global cyber security frameworks not only serve as guidance for IT professionals but they are also for those in the C-Suite who make funding and business decisions that impact cyber security. Bring this course to your organization and equip your entire team for this in-demand certification.
What Do Participants Learn?
Prepare for and pass the CSX Practitioner Exam
Identify: Assess and evaluate assets threats and vulnerabilities
Protect: Implement cyber security controls
Detect: Identify network and system incidents, events and compromise indicators
Respond: Execute a comprehensive plan
Recover: Recovery from incidents and disasters
Who Should Attend?
Information security governance
Information risk management
Information security program development
Information security program management
Incident management and response
What Will the Learning Experience Include?
Comprehensive pre-program activities include:
Web-based information forms & surveys completed by attendee.
Direct consultation with the attendee about the expectations.
During the training, participants engage in data, activities, and conversations that lead to insight and knowledge.
Participants learn from expert trainers who have both academic and business experiences.
Highly applicable training content & instructive activities for adding depth to training topics.
**A half-day site visit for integrating the experience & plan next steps. Opportunities to provide connections, ideas & support.
Explore & Practice
Apply & sustain the learning experience by using this ongoing support:
To ensure participant has new skills or behavior progress.
Optional, fee-based mentoring & coaching with the trainer.
Training materials & additional documents (e-books, pdf files, presentations and articles)
Evaluate your training experience by giving us feedbacks and help us to reach our organizational goals.
Section One: Identify
Hardware Software Identification and Documentation
Lab: Preliminary Scanning
Network Discovery Tools
Lab: Additional Scanning Options
Sensitive Information Discovery
Lab: Sensitive Information Identification
Vulnerability Assessment Process
Lab: Vulnerability Scanner Set-up and Configuration
Patch Upgrade Configure Vulnerability Scanners
Lab: Vulnerability Scanner Set-up and Configuration, Part 2
Section Two: Protect
Specific Cyber Controls
Lab: System Hardening
Collecting Event Data
Lab: Firewall Setup and Configuration
Verifying the Effectiveness of Controls
Lab: Microsoft Baseline Security Analyzer
Lab: IDS Setup
Updating Cyber Security Controls
Lab: Personal Security Products
Lab: Linux Users and Groups
Verifying Identities and Credentials
Cyber Security Procedures Standards
Section Three: Detect
Analyze Network Traffic Using Monitors
Lab: Using Snort and Wireshark to Analyze Traffic
Detect Malicious Activity AntiVirus
Lab: Detect the Introduction and Execution of Malicious Activity
Assess Available Event Information
Lab: Analyze and Classify Malware
Baselines for Anomaly Detection
Lab: Windows Event Log Manipulation via Windows Event Viewer