Facebook Pixel
Microsoft Certification Training
Search classes by keyword:
Search classes by category:
Microsoft Certification and Microsoft Training, Cisco Certification and MCSE Certification
CSX  Level 1 space



CSX Level 1 Certification Training Course

CSX - Certified Cybersecurity Practitioner Level 1 - Identification & Protection

Course Number: #CED-1265
Course Length: 5 days

Grants (discounts) are available for multiple students for the same or different courses.

Upcoming Dates Class Times Class Format Quote
Call (800) 611-1840 for Class Schedule

Instructor-Led

  • Certified Instructor
  • Includes all course materials

The first course in the CSX Practitioner series focuses on key cybersecurity skills and includes foundational, real- world instruction in the Identify and Protect domains.

Topics range from preliminary network scanning to security control implementation. Through the completion of multiple lab-reinforced modules, students will learn how to apply industry-developed, experience-based methods to the identification of key networks and learn to develop appropriate protection mechanisms.

The Identify domain teaches students to recognize, assess and remediate specific internal and external network threats.

The Protect domain offers instruction in the basic concepts, methods, and tools associated with implementing cybersecurity controls to protect a system from the identified threats.

Course Learning Objectives

Provide students with an environment to discuss and practice methods implemented by cybersecurity professionals in the Identify and Protect domains. Ensure students develop into complimentary team members for enterprises who are workforce ready.

Target Audience

Individuals in the field of cybersecurity who are interested in learning hands-on technical skills.

Classroom-Based Instruction Topics

  • Network Reconnaissance
  • Software / Hardware Scanning
  • Asset Validation / Anomaly Assessment
  • Network Mapping
  • Introduction to Vulnerability Scanning
  • Vulnerability Scanning Configuration
  • Conducting a Vulnerability Scan
  • Vulnerability Scan Evaluation
  • Cybersecurity Control Introduction and Explanation
  • Cybersecurity Control Evaluation and Configuration
  • Threat Data Collection
  • Threat Log Parsing and Maintenance
  • Control Vulnerability Scanning and Assessment
  • Control Monitoring and Assessment
  • Control Change implementation
  • Control Documentation Maintenance
  • Patch Implementation and Dissemination

Lab Requirements:

  • Networking Reconnaissance
  • Network and System Scanning
  • Network Topology Generation
  • Vulnerability Scanner Differentiation / Configuration
  • Vulnerability Scanning
  • Vulnerability Scanner Log Evaluation
  • Security Control Assessment
  • Log Analysis and Collection
  • Host Threat Transmission
  • IDS Installation, Configuration, Implementation
  • IDS Control Testing
  • IDS Control Reconfiguration
  • IDS Patching

Course Outline

DAY 1

LESSON

  • Network Reconnaissance
  • Software / Hardware Scanning
  • Asset Validation / Anomaly Assessment
  • Network Mapping

LAB

  • Network Reconnaissance
  • Network and System Scanning
  • Network Topology Generation

ASSOCIATED TOPICS

  • C.I.A.
  • Active / Passive Scanning
  • Availability / Authenticity
  • Asset Classification
  • Network Devices
  • OSI Model
DAY 2

LESSON

  • Introduction to Vulnerability Scanning
  • Vulnerability Scanning Preparation / Configuration
  • Conducting a Vulnerability Scan
  • Vulnerability Scan Assessment / Evaluation

LAB

  • Vulnerability Scanner Differentiation / Configuration
  • Vulnerability Scanning
  • Vulnerability Scanner Log Evaluation

ASSOCIATED TOPICS

  • Scanning, Enumeration, Penetration Testing
  • Fingerprinting
DAY 3

LESSON

  • Cybersecurity Control Introduction and Explanation
  • Cybersecurity Control Evaluation and Configuration
  • Threat Data Collection and Amalgamation
  • Threat Log Parsing and Maintenance

LAB

  • Network Reconnaissance
  • Security Control Assessment
  • Log Analysis and Collection
  • Host Threat Transmission

ASSOCIATED TOPICS

  • Cryptographic Controls
  • NSIT / ISO Documentation
  • Network / Host Prevention Systems
  • Internal Log Processes
  • External Documentation
DAY 4
LESSON
  • Control Vulnerability Scanning and Assessment
  • Control Monitoring and Assessment
  • Control Change Implementation
  • Control Documentation Maintenance
LAB
  • IDS Installation, Configuration, Implementation
  • IDS Control Testing
  • IDS Control Reconfiguration
ASSOCIATED TOPICS
  • Host Logs
  • Activity Logs
  • Network Logs
  • Firewall Logs
  • IDS Logs
  • Encryption
DAY 5
LESSON
  • Control Patch Implementation / Dissemination
LAB
  • IDS Patching
ASSOCIATED TOPICS
  • Non-repudiation
  • Multiple Factor Authentication Information Classification
  • File System Access Control Mechanisms
  • Mobile Device Management Policy
  • Remote Access Solutions

CED Solutions is your best choice for CSX Level 1, CSX Level 1 training, CSX Level 1 certification, CSX Level 1 boot camp, CSX Level 1 certification training, CSX Level 1 certification course, CSX Level 1 course, CSX Level 1 class.



CSX  Level 1 space
Search classes by keyword:
Search classes by category:


Copyright © 2024 CED Solutions. CED Solutions Refund Policy. All Rights Reserved.