Cybersecurity Nexus (CSX) Practitioner Training

Course 2039

  • Duration: 5 days
  • Language: English
  • Level: Intermediate
Get This Course $3,710
  • Bring this or any training to your organization
  • Full - scale program development
  • Delivered when, where, and how you want it
  • Blended learning models
  • Tailored content
  • Expert team coaching
#2039

This official ISACA Cybersecurity Nexus (CSX) Practitioner certification course prepares you for the exam and provides you with in-depth coverage on the skills and concepts in the five areas (Identify, Protect, Detect, Respond, Recover) aligned to an existing global security framework (NIST Framework). This is designed specifically for IT professionals established in the cyber security field with a minimum of one to five years of experience.

Global cyber security frameworks not only serve as guidance for IT professionals but they are also for those in the C-Suite who make funding and business decisions that impact cyber security. Bring this course to your organization and equip your entire team for this in-demand certification.

  • This CSX practitioner boot camp course is designed specifically for IT professionals established in the cyber security field with a minimum of one to five years of experience

Cybersecurity Nexus (CSX) Practitioner Training Delivery Methods

  • Official ISACA Curriculum
  • After-course instructor coaching benefit

Cybersecurity Nexus (CSX) Practitioner Training Course Benefits

  • Prepare for and pass the CSX Practitioner Exam
  • Identify: Assess and evaluate assets threats and vulnerabilities
  • Protect: Implement cyber security controls
  • Detect: Identify network and system incidents, events and compromise indicators
  • Respond: Execute a comprehensive plan
  • Recover: Recovery from incidents and disasters

CSX Practitioner Course Outline

  • Hardware Software Identification and Documentation
  • Lab: Preliminary Scanning
  • Network Discovery Tools
  • Lab: Additional Scanning Options
  • Sensitive Information Discovery
  • Lab: Sensitive Information Identification
  • Vulnerability Assessment Process
  • Lab: Vulnerability Scanner Set-up and Configuration
  • Patch Upgrade Configure Vulnerability Scanners
  • Lab: Vulnerability Scanner Set-up and Configuration, Part 2
  • Specific Cyber Controls
  • Lab: System Hardening
  • Collecting Event Data
  • Lab: Firewall Setup and Configuration
  • Verifying the Effectiveness of Controls
  • Lab: Microsoft Baseline Security Analyzer
  • Monitoring Controls
  • Lab: IDS Setup
  • Updating Cyber Security Controls
  • Lab: Personal Security Products
  • Patch Management
  • Lab: Linux Users and Groups
  • Verifying Identities and Credentials
  • Cyber Security Procedures Standards
  • Analyze Network Traffic Using Monitors
  • Lab: Using Snort and Wireshark to Analyze Traffic
  • Detect Malicious Activity AntiVirus
  • Lab: Detect the Introduction and Execution of Malicious Activity
  • Assess Available Event Information
  • Lab: Analyze and Classify Malware
  • Baselines for Anomaly Detection
  • Lab: Windows Event Log Manipulation via Windows Event Viewer
  • Initial Attack Analysis
  • Lab: Host Data Integrity Baselining
  • Incident Escalation Reporting
  • Lab: Performing Network Packet Analysis
  • Change Implementation Escalation
  • Defined Response Plan Execution
  • Lab: Incident Detection and Identification
  • Network Isolation
  • Lab: Remove Trojan
  • Disable User Accounts
  • Lab: Block Incoming Traffic on Known Port
  • Blocking Traffic
  • Lab: Implement Single System Changes in Firewall
  • Documentation
  • Lab: Conduct Supplemental Monitoring
  • Incident Report
  • Lab: Create Custom Snort Rules
  • Industry Best Practices
  • Lab: Comprehensive Lab Response
  • Disaster Recovery and BC Plans
  • Lab: Patches and Updates
  • Cyber System Restoration
  • Lab: Data Backup and Recovery
  • Data Backup and Restoration Key Concepts
  • Lab: Recovering Data and Data Integrity Checks
  • Actualizing Data Backups and Recovery
  • Post Incident Service Restoration
  • Implementing Patches and Updates
  • Ensuring Data Integrity
  • Post-Incident Review

Need Help Finding The Right Training Solution?

Our training advisors are here for you.

Course FAQs

This is designed specifically for IT professionals established in the cyber security field with a minimum of one to five years of experience.

Chat With Us