CSX Practitioner 1: Identification and Protection

Overview

Price: USD $3,345.00
Duration: 5 Days
CPE Credits: 35
Course Number: SEC-327
CSX Practitioner (CSXP) LOGO in .svg format by ISACA

CSX Practitioner 1: Identification and Protection is a five day, 40 CPE course offered to you by Intrinsec Security – an official training partner of ISACA.

Course Introduction

NOTE: CSX Practitioner 1 (Identification and Protection) is the first of three training programs in the CSX Practitioner series created by ISACA. To view all CSX Practitioner courses, please click here.

ISACA’s Cybersecurity Nexus (CSX) certification program supports cybersecurity professionals throughout their career by assessing a candidate’s abilities and skills at three progressive technical skill levels. Levels are differentiated by skills, not by years of experience. Each technical skill level is assessed utilizing a vendor-neutral set of performance-based exams measuring a candidate’s technical skills, abilities and performance in the following areas: Identify, Protect, Detect, Respond, and Recover.

The CSX Practitioner 1 course focuses on the first two domains of the certification exam, Identify and Protect. Those who register for this ISACA authorized CSX Practitioner 1 course will learn how to apply industry-developed, experience-based methods to the identification of specific internal and external network threats. Additionally, students will learn the basic concepts, methods and tools associated with implementing cyber security controls to protect a system from the identified threats.

This course, along with CSX Practitioner 2 and 3, was developed using existing global cybersecurity frameworks as well as input from hundreds of subject matter experts. Whether a student is planning to write the exam or learn more about Cyber Security, this course is packed with study tips and practical exercises.

Course Outline

CSX Practitioner 1 provides students with an environment to discuss and practice methods implemented by cybersecurity professionals in the respond and recover domains. This course will consist of at least 50% hands-on lab exercise, while lessons and lectures are comprised of up-to-date coursework and demonstrations.

Additional information about the training for this official CSX Practitioner 1 course can be found in this section.

Day 1 of 5 (ex. Monday)

The first day of this official CSX Practitioner 1 course reviews several topics while also providing labs for students to gain practical experience. The lessons and labs found below are associated with the following topics: C.I.A., Active / Passive Scanning, Availability / Authenticity, Asset Classification, Network Devices, and OSI Model.
 

Lessons:
  • Hardware and Software Identification and Documentation
  • Network Reconnaissance and Scanning
  • Sensitive Information Discovery
  • Asset Validation and Rogue Devices
Labs
  • Preliminary Scanning
  • Additional Scanning Options
  • Scanning from Windows

Day 2 of 5 (ex. Tuesday)

Day 2 of this official course reviews several topics while also providing labs for students to gain practical experience. The lessons and labs found below are associated with the following topics: Scanning, Enumeration, Penetration Training, and Fingerprinting.
 

Lessons:
  • Network Topology Documentation
  • Vulnerability Assessment Process
  • Patching and Configuration Vulnerability Scanners
  • Vulnerability Scanning
  • Vulnerability Scanning Analysis
Labs:
  • Specialized Linux Port Scans
  • Sensitive Information identification
  • Network Topology Generation
  • Vulnerability Scanner Set-up and Configuration
  • Vulnerability Scanner Set-up and Configuration, Pt. 2

Day 3 of 5 (ex. Wednesday)

Day 3 of this CSX Practitioner 1 training seminar reviews several topics while also providing labs for students to gain practical experience. The lessons and labs found below are associated with the following topics: Cryptographic Controls, NSIT / ISO Documentation, Network / Host Prevention Systems, Internal Log Processes, and External Documentation.
 

Lessons:
  • Implementing Specified Cyber Security Controls
  • Cyber Security Procedure Execution
  • Configuring Cyber Security Controls
  • Validating Configurations
Labs:
  • System Hardening
  • Firewall Setup and Configuration

Day 4 of 5 (ex. Thursday)

The fourth day of training for this course reviews several topics while also providing labs for students to gain practical experience. The lessons and labs found below are associated with the following topics: Host Logs, Activity Logs, Network Logs, Firewall Logs, IDS Logs, and Encryption.
 

Lessons:
  • Documenting Configuration Changes
  • Testing New Controls
  • Collecting Event Data
  • Sending and Receiving Event Data
  • Verifying the Effectiveness of Controls
Labs:
  • Log Analysis
  • Centralized Monitoring
  • Microsoft Baseline Analyzer

Day 5 of 5 (ex. Friday)

In the final day of this official CSX Practitioner 1 training seminar, students review several topics while also participating in various labs to gain practical experience. The lessons and labs found below are associated with the following topics: Non-Repudiation, Multiple Factor Authentication, Information Classification, File System Access Control Mechanisms, Mobile Device Management Policy, and Remote Access Solutions.
 

Lessons:
  • Hardware and Software Identification and Documentation
  • Network Reconnaissance and Scanning
  • Sensitive Information Discovery
  • Asset Validation and Rogue Devices
Labs:
  • Preliminary Scanning
  • Additional Scanning Options
  • Scanning from Windows

What Comes With Registration?

Those who register for this course receive the following features and resources with every CSX Practitioner 1 registration:

  • Five (5) Days of Official ISACA Training from an Authorized CSX Practitioner Instructor
  • Official ISACA Courseware for CSX Practitioner 1: Identification and Protection
  • Official ISACA Study Guide for CSX Practitioner 1: Identification and Protection
  • Six (6) Month Subscription to ISACA’s Official OnDemand Labs for CSXP 1: Identification and Protection

*CSX Practitioner Exam Voucher Available for Additional Cost ($540 USD)*

CSX Practitioner 1 Prerequisites

Any interested student can attend Intrinsec’s CSX Practitioner 1: Identification and Protection training program.

However, we recommend for all prospective students to have professional experience in the field of cyber security along with an interest in gaining hands-on technical skills.

What does ISACA say about Intrinsec?

 

“Intrinsec is one of ISACA’s official partners, authorized to provide training for our certifications across North America. Their background in professional development and cyber security will help us equip organizations with skilled candidates who have the hands-on experience they need to quickly and effectively mitigate threats.”

Why Intrinsec?

100% Security Focused Courses and People

Intrinsec only provides training for vendor-neutral courses focusing on cyber security. It’s our niche and in all honesty, it’s what we do best. As a result, we know what we’re talking about and can provide you with qualified professionals to ensure you receive the best information.

Hassle Free Refunds and Guaranteed Satisfaction

We’re so confident you’ll be satisfied with our CSX Practitioner 1 Identification and Protection training that we don’t mind putting our money where our mouth is; if a student is unsatisfied during the first morning of training, we’ll give them a 100% refund, regardless of the reason. For example:

  • The course isn’t what you expected? Refund.
  • Our instructor is humming that annoyingly catchy song you had just managed to forget? Refund.

ISACA®, the CSX Cybersecurity Nexus™ Mark, and ISACA’s CSX Cybersecurity Nexus™ products, certifications, and services are not affiliated with CSX Corporation or its subsidiaries, including CSX Transportation, Inc.

Schedule

No courses were found.

 

Request Group Training