CSX - Certified Cybersecurity Practitioner Level 1 - Identification & Protection
|
- Certified Instructor
- Includes all course materials
|
The first course in the CSX Practitioner series focuses on key cybersecurity skills and includes foundational, real- world instruction in the Identify and Protect domains.
Topics range from preliminary network scanning to security control implementation. Through the completion of multiple lab-reinforced modules, students will learn how to apply industry-developed, experience-based methods to the identification of key networks and learn to develop appropriate protection mechanisms.
The Identify domain teaches students to recognize, assess and remediate specific internal and external network threats.
The Protect domain offers instruction in the basic concepts, methods, and tools associated with implementing cybersecurity controls to protect a system from the identified threats.
Course Learning Objectives
Provide students with an environment to discuss and practice methods implemented by cybersecurity professionals in the Identify and Protect domains. Ensure students develop into complimentary team members for enterprises who are workforce ready.
Target Audience
Individuals in the field of cybersecurity who are interested in learning hands-on technical skills.
Classroom-Based Instruction Topics
- Network Reconnaissance
- Software / Hardware Scanning
- Asset Validation / Anomaly Assessment
- Network Mapping
- Introduction to Vulnerability Scanning
- Vulnerability Scanning Configuration
- Conducting a Vulnerability Scan
- Vulnerability Scan Evaluation
- Cybersecurity Control Introduction and Explanation
- Cybersecurity Control Evaluation and Configuration
- Threat Data Collection
- Threat Log Parsing and Maintenance
- Control Vulnerability Scanning and Assessment
- Control Monitoring and Assessment
- Control Change implementation
- Control Documentation Maintenance
- Patch Implementation and Dissemination
Lab Requirements:
- Networking Reconnaissance
- Network and System Scanning
- Network Topology Generation
- Vulnerability Scanner Differentiation / Configuration
- Vulnerability Scanning
- Vulnerability Scanner Log Evaluation
- Security Control Assessment
- Log Analysis and Collection
- Host Threat Transmission
- IDS Installation, Configuration, Implementation
- IDS Control Testing
- IDS Control Reconfiguration
- IDS Patching
Course Outline
DAY 1
LESSON
- Network Reconnaissance
- Software / Hardware Scanning
- Asset Validation / Anomaly Assessment
- Network Mapping
LAB
- Network Reconnaissance
- Network and System Scanning
- Network Topology Generation
ASSOCIATED TOPICS
- C.I.A.
- Active / Passive Scanning
- Availability / Authenticity
- Asset Classification
- Network Devices
- OSI Model
DAY 2
LESSON
- Introduction to Vulnerability Scanning
- Vulnerability Scanning Preparation / Configuration
- Conducting a Vulnerability Scan
- Vulnerability Scan Assessment / Evaluation
LAB
- Vulnerability Scanner Differentiation / Configuration
- Vulnerability Scanning
- Vulnerability Scanner Log Evaluation
ASSOCIATED TOPICS
- Scanning, Enumeration, Penetration Testing
- Fingerprinting
DAY 3
LESSON
- Cybersecurity Control Introduction and Explanation
- Cybersecurity Control Evaluation and Configuration
- Threat Data Collection and Amalgamation
- Threat Log Parsing and Maintenance
LAB
- Network Reconnaissance
- Security Control Assessment
- Log Analysis and Collection
- Host Threat Transmission
ASSOCIATED TOPICS
- Cryptographic Controls
- NSIT / ISO Documentation
- Network / Host Prevention Systems
- Internal Log Processes
- External Documentation
DAY 4
LESSON
- Control Vulnerability Scanning and Assessment
- Control Monitoring and Assessment
- Control Change Implementation
- Control Documentation Maintenance
LAB
- IDS Installation, Configuration, Implementation
- IDS Control Testing
- IDS Control Reconfiguration
ASSOCIATED TOPICS
- Host Logs
- Activity Logs
- Network Logs
- Firewall Logs
- IDS Logs
- Encryption
DAY 5
LESSON
- Control Patch Implementation / Dissemination
LAB
ASSOCIATED TOPICS
- Non-repudiation
- Multiple Factor Authentication Information Classification
- File System Access Control Mechanisms
- Mobile Device Management Policy
- Remote Access Solutions
IPLearning.net is your best choice for CSX Level 1,
CSX Level 1 training,
CSX Level 1 certification,
CSX Level 1 certification boot camp,
CSX Level 1 boot camp,
CSX Level 1 certification training,
CSX Level 1 boot camp training,
CSX Level 1 boot camp certification,
CSX Level 1 certification course,
CSX Level 1 course,
training CSX Level 1,
certification CSX Level 1,
boot camp CSX Level 1,
certification CSX Level 1 boot camp,
certification CSX Level 1 training,
boot camp CSX Level 1 training,
certification CSX Level 1 course.
|