CSX Practitioner 1: Identification and Protection

Overview

Duration: 5 Days
CPE Credits: 35
Course Number: SEC-327
CSX Practitioner (CSXP) LOGO in .svg format by ISACA

CSX Practitioner 1: Identification and Protection is a five day, 40 CPE course offered to you by Intrinsec Security – an official training partner of ISACA.

NOTE: This course is the first of three training programs in the CSX Practitioner series created by ISACA. To view all CSX Practitioner courses, please click here.

Course Introduction

ISACA’s Cybersecurity Nexus (CSX) certification program supports cybersecurity professionals throughout their career by assessing a candidate’s abilities and skills at three progressive technical skill levels. Levels are differentiated by skills, not by years of experience. Each technical skill level is assessed utilizing a vendor-neutral set of performance-based exams measuring a candidate’s technical skills, abilities and performance in the following areas: Identify, Protect, Detect, Respond, and Recover.

The CSX Practitioner 1 course focuses on the first two domains within ISACA’s CSX Practitioner certification exam – Identify and Protect. Those who register for this ISACA authorized CSX Practitioner 1 prep course will learn how to apply industry-developed, experience-based methods to the identification of specific internal and external network threats. Additionally, students will learn the basic concepts, methods, and tools associated with implementing cyber security controls to protect a system from the identified threats.

This course, along with CSX Practitioner 2 and 3, was developed using existing global cybersecurity frameworks as well as input from hundreds of subject matter experts. Whether a student is planning to write the exam or learn more about Cyber Security, this course is packed with study tips and practical exercises.

GROUP TRAINING

Certifications Training

AVAILABLE OPTIONS

OnSite Training
50-Day Training Bundle

What Comes With Registration?

  • Five Days of Official ISACA Training from an Authorized CSX Practitioner Instructor
  • Official ISACA Courseware for CSX Practitioner 1: Identification and Protection
  • Official ISACA Study Guide for CSX Practitioner 1: Identification and Protection
  • Six Month Subscription to ISACA’s Official OnDemand Labs for CSXP 1: Identification and Protection

*CSX Practitioner Exam Voucher Available for Additional Cost ($540 USD)*

CSX Practitioner 1 Prerequisites

This official ISACA training seminar has no prerequisites and the scheduled dates below are open for registration.

NOTE: While this training program does not have any prerequisites, we recommend for all prospective students to have professional experience in the field of cyber security along with an interest in gaining hands-on technical skills.

Course Outline

Day 1 of 5 (ex. Monday)

The first day of this official CSX Practitioner 1 course reviews several topics while also providing labs for students to gain practical experience. The lessons and labs found below are associated with the following topics: C.I.A., Active / Passive Scanning, Availability / Authenticity, Asset Classification, Network Devices, and OSI Model.

Lessons:
  • Hardware and Software Identification and Documentation
  • Network Reconnaissance and Scanning
  • Sensitive Information Discovery
  • Asset Validation and Rogue Devices
Labs
  • Preliminary Scanning
  • Additional Scanning Options
  • Scanning from Windows

Day 2 of 5 (ex. Tuesday)

Day 2 of this official course reviews several topics while also providing labs for students to gain practical experience. The lessons and labs found below are associated with the following topics: Scanning, Enumeration, Penetration Training, and Fingerprinting.

Lessons:
  • Network Topology Documentation
  • Vulnerability Assessment Process
  • Patching and Configuration Vulnerability Scanners
  • Vulnerability Scanning
  • Vulnerability Scanning Analysis
Labs:
  • Specialized Linux Port Scans
  • Sensitive Information identification
  • Network Topology Generation
  • Vulnerability Scanner Set-up and Configuration
  • Vulnerability Scanner Set-up and Configuration, Pt. 2

Day 3 of 5 (ex. Wednesday)

Day 3 of this CSX Practitioner 1 training seminar reviews several topics while also providing labs for students to gain practical experience. The lessons and labs found below are associated with the following topics: Cryptographic Controls, NSIT / ISO Documentation, Network / Host Prevention Systems, Internal Log Processes, and External Documentation.

Lessons:
  • Implementing Specified Cyber Security Controls
  • Cyber Security Procedure Execution
  • Configuring Cyber Security Controls
  • Validating Configurations
Labs:
  • System Hardening
  • Firewall Setup and Configuration

Day 4 of 5 (ex. Thursday)

The fourth day of training for this course reviews several topics while also providing labs for students to gain practical experience. The lessons and labs found below are associated with the following topics: Host Logs, Activity Logs, Network Logs, Firewall Logs, IDS Logs, and Encryption.

Lessons:
  • Documenting Configuration Changes
  • Testing New Controls
  • Collecting Event Data
  • Sending and Receiving Event Data
  • Verifying the Effectiveness of Controls
Labs:
  • Log Analysis
  • Centralized Monitoring
  • Microsoft Baseline Analyzer

Day 5 of 5 (ex. Friday)

In the final day of this official CSX Practitioner 1 training seminar, students review several topics while also participating in various labs to gain practical experience. The lessons and labs found below are associated with the following topics: Non-Repudiation, Multiple Factor Authentication, Information Classification, File System Access Control Mechanisms, Mobile Device Management Policy, and Remote Access Solutions.

Lessons:
  • Hardware and Software Identification and Documentation
  • Network Reconnaissance and Scanning
  • Sensitive Information Discovery
  • Asset Validation and Rogue Devices
Labs:
  • Preliminary Scanning
  • Additional Scanning Options
  • Scanning from Windows
ISACA logo - IntrinsecSecurity.com

ISACA® is a trademark of the Information Systems Audit and Control Association, Inc. (ISACA), registered in the United States and other countries. www.isaca.org ISACA®, the CSX Cybersecurity Nexus™ Mark, and ISACA’s CSX Cybersecurity Nexus™ products, certifications, and services are not affiliated with CSX Corporation or its subsidiaries, including CSX Transportation, Inc.

Schedule

No public dates are currently scheduled. Request Group Training!

 

Request Group Training