MCSEClasses Certification Training Boot Camp Cisco Certification Training Military Discounts Testimonials About Us Linux/Unix Certification MCSD Certification Home MCSE Certification MCDBA Certification Cisco Certification Security Certification Java Certification Oracle® Certification CIW Certification Jobs Boot Camp Financing Boot Camp Pricing Boot Camp Technical Schedule Contact Us


CSX - Certified Cybersecurity Practitioner Level 1 - Identification & Protection

Course Length: 5 days

Class Schedule
Call for Class Schedule

  • Certified Instructor
  • Includes all course materials

The first course in the CSX Practitioner series focuses on key cybersecurity skills and includes foundational, real- world instruction in the Identify and Protect domains.

Topics range from preliminary network scanning to security control implementation. Through the completion of multiple lab-reinforced modules, students will learn how to apply industry-developed, experience-based methods to the identification of key networks and learn to develop appropriate protection mechanisms.

The Identify domain teaches students to recognize, assess and remediate specific internal and external network threats.

The Protect domain offers instruction in the basic concepts, methods, and tools associated with implementing cybersecurity controls to protect a system from the identified threats.

Course Learning Objectives

Provide students with an environment to discuss and practice methods implemented by cybersecurity professionals in the Identify and Protect domains. Ensure students develop into complimentary team members for enterprises who are workforce ready.

Target Audience

Individuals in the field of cybersecurity who are interested in learning hands-on technical skills.

Classroom-Based Instruction Topics

  • Network Reconnaissance
  • Software / Hardware Scanning
  • Asset Validation / Anomaly Assessment
  • Network Mapping
  • Introduction to Vulnerability Scanning
  • Vulnerability Scanning Configuration
  • Conducting a Vulnerability Scan
  • Vulnerability Scan Evaluation
  • Cybersecurity Control Introduction and Explanation
  • Cybersecurity Control Evaluation and Configuration
  • Threat Data Collection
  • Threat Log Parsing and Maintenance
  • Control Vulnerability Scanning and Assessment
  • Control Monitoring and Assessment
  • Control Change implementation
  • Control Documentation Maintenance
  • Patch Implementation and Dissemination

Lab Requirements:

  • Networking Reconnaissance
  • Network and System Scanning
  • Network Topology Generation
  • Vulnerability Scanner Differentiation / Configuration
  • Vulnerability Scanning
  • Vulnerability Scanner Log Evaluation
  • Security Control Assessment
  • Log Analysis and Collection
  • Host Threat Transmission
  • IDS Installation, Configuration, Implementation
  • IDS Control Testing
  • IDS Control Reconfiguration
  • IDS Patching

Course Outline

DAY 1

LESSON

  • Network Reconnaissance
  • Software / Hardware Scanning
  • Asset Validation / Anomaly Assessment
  • Network Mapping

LAB

  • Network Reconnaissance
  • Network and System Scanning
  • Network Topology Generation

ASSOCIATED TOPICS

  • C.I.A.
  • Active / Passive Scanning
  • Availability / Authenticity
  • Asset Classification
  • Network Devices
  • OSI Model
DAY 2

LESSON

  • Introduction to Vulnerability Scanning
  • Vulnerability Scanning Preparation / Configuration
  • Conducting a Vulnerability Scan
  • Vulnerability Scan Assessment / Evaluation

LAB

  • Vulnerability Scanner Differentiation / Configuration
  • Vulnerability Scanning
  • Vulnerability Scanner Log Evaluation

ASSOCIATED TOPICS

  • Scanning, Enumeration, Penetration Testing
  • Fingerprinting
DAY 3

LESSON

  • Cybersecurity Control Introduction and Explanation
  • Cybersecurity Control Evaluation and Configuration
  • Threat Data Collection and Amalgamation
  • Threat Log Parsing and Maintenance

LAB

  • Network Reconnaissance
  • Security Control Assessment
  • Log Analysis and Collection
  • Host Threat Transmission

ASSOCIATED TOPICS

  • Cryptographic Controls
  • NSIT / ISO Documentation
  • Network / Host Prevention Systems
  • Internal Log Processes
  • External Documentation
DAY 4
LESSON
  • Control Vulnerability Scanning and Assessment
  • Control Monitoring and Assessment
  • Control Change Implementation
  • Control Documentation Maintenance
LAB
  • IDS Installation, Configuration, Implementation
  • IDS Control Testing
  • IDS Control Reconfiguration
ASSOCIATED TOPICS
  • Host Logs
  • Activity Logs
  • Network Logs
  • Firewall Logs
  • IDS Logs
  • Encryption
DAY 5
LESSON
  • Control Patch Implementation / Dissemination
LAB
  • IDS Patching
ASSOCIATED TOPICS
  • Non-repudiation
  • Multiple Factor Authentication Information Classification
  • File System Access Control Mechanisms
  • Mobile Device Management Policy
  • Remote Access Solutions

IPLearning.net is your best choice for CSX Level 1, CSX Level 1 training, CSX Level 1 certification, CSX Level 1 certification boot camp, CSX Level 1 boot camp, CSX Level 1 certification training, CSX Level 1 boot camp training, CSX Level 1 boot camp certification, CSX Level 1 certification course, CSX Level 1 course, training CSX Level 1, certification CSX Level 1, boot camp CSX Level 1, certification CSX Level 1 boot camp, certification CSX Level 1 training, boot camp CSX Level 1 training, certification CSX Level 1 course.




Search classes by keyword:


Search classes by category:

Copyright © 2024 Institute of Professional Learning. IPL Refund Policy. All Rights Reserved.