MCSEClasses Certification Training Boot Camp MCSE MCSD MCDBA Cisco CIW Linux Oracle Java Security Military Discounts Testimonials About Us Linux/Unix Certification MCSD Certification Home MCSE Certification MCDBA Certification Cisco Certification Security Certification Java Certification Oracle® Certification CIW Certification Jobs Boot Camp Financing Boot Camp Pricing Boot Camp Technical Schedule Contact Us


CSX - Certified Cybersecurity Practitioner Level 1 - Identification & Protection

Course Length: 5 days

Class Schedule
Call for Class Schedule

  • Includes roundtrip airfare and lodging (for boot camps held in Georgia and Florida only)
  • Hands-on instruction by a certified instructor
  • Includes all course materials
  • On-site Testing
  • Lunch & Snacks provided each day

The first course in the CSX Practitioner series focuses on key cybersecurity skills and includes foundational, real- world instruction in the Identify and Protect domains.

Topics range from preliminary network scanning to security control implementation. Through the completion of multiple lab-reinforced modules, students will learn how to apply industry-developed, experience-based methods to the identification of key networks and learn to develop appropriate protection mechanisms.

The Identify domain teaches students to recognize, assess and remediate specific internal and external network threats.

The Protect domain offers instruction in the basic concepts, methods, and tools associated with implementing cybersecurity controls to protect a system from the identified threats.

Course Learning Objectives

Provide students with an environment to discuss and practice methods implemented by cybersecurity professionals in the Identify and Protect domains. Ensure students develop into complimentary team members for enterprises who are workforce ready.

Target Audience

Individuals in the field of cybersecurity who are interested in learning hands-on technical skills.

Classroom-Based Instruction Topics

  • Network Reconnaissance
  • Software / Hardware Scanning
  • Asset Validation / Anomaly Assessment
  • Network Mapping
  • Introduction to Vulnerability Scanning
  • Vulnerability Scanning Configuration
  • Conducting a Vulnerability Scan
  • Vulnerability Scan Evaluation
  • Cybersecurity Control Introduction and Explanation
  • Cybersecurity Control Evaluation and Configuration
  • Threat Data Collection
  • Threat Log Parsing and Maintenance
  • Control Vulnerability Scanning and Assessment
  • Control Monitoring and Assessment
  • Control Change implementation
  • Control Documentation Maintenance
  • Patch Implementation and Dissemination

Lab Requirements:

  • Networking Reconnaissance
  • Network and System Scanning
  • Network Topology Generation
  • Vulnerability Scanner Differentiation / Configuration
  • Vulnerability Scanning
  • Vulnerability Scanner Log Evaluation
  • Security Control Assessment
  • Log Analysis and Collection
  • Host Threat Transmission
  • IDS Installation, Configuration, Implementation
  • IDS Control Testing
  • IDS Control Reconfiguration
  • IDS Patching

Course Outline

DAY 1

LESSON

  • Network Reconnaissance
  • Software / Hardware Scanning
  • Asset Validation / Anomaly Assessment
  • Network Mapping

LAB

  • Network Reconnaissance
  • Network and System Scanning
  • Network Topology Generation

ASSOCIATED TOPICS

  • C.I.A.
  • Active / Passive Scanning
  • Availability / Authenticity
  • Asset Classification
  • Network Devices
  • OSI Model
DAY 2

LESSON

  • Introduction to Vulnerability Scanning
  • Vulnerability Scanning Preparation / Configuration
  • Conducting a Vulnerability Scan
  • Vulnerability Scan Assessment / Evaluation

LAB

  • Vulnerability Scanner Differentiation / Configuration
  • Vulnerability Scanning
  • Vulnerability Scanner Log Evaluation

ASSOCIATED TOPICS

  • Scanning, Enumeration, Penetration Testing
  • Fingerprinting
DAY 3

LESSON

  • Cybersecurity Control Introduction and Explanation
  • Cybersecurity Control Evaluation and Configuration
  • Threat Data Collection and Amalgamation
  • Threat Log Parsing and Maintenance

LAB

  • Network Reconnaissance
  • Security Control Assessment
  • Log Analysis and Collection
  • Host Threat Transmission

ASSOCIATED TOPICS

  • Cryptographic Controls
  • NSIT / ISO Documentation
  • Network / Host Prevention Systems
  • Internal Log Processes
  • External Documentation
DAY 4
LESSON
  • Control Vulnerability Scanning and Assessment
  • Control Monitoring and Assessment
  • Control Change Implementation
  • Control Documentation Maintenance
LAB
  • IDS Installation, Configuration, Implementation
  • IDS Control Testing
  • IDS Control Reconfiguration
ASSOCIATED TOPICS
  • Host Logs
  • Activity Logs
  • Network Logs
  • Firewall Logs
  • IDS Logs
  • Encryption
DAY 5
LESSON
  • Control Patch Implementation / Dissemination
LAB
  • IDS Patching
ASSOCIATED TOPICS
  • Non-repudiation
  • Multiple Factor Authentication Information Classification
  • File System Access Control Mechanisms
  • Mobile Device Management Policy
  • Remote Access Solutions

MCSEClasses.com is your best choice for CSX Identification and Protection, CSX Identification and Protection training, CSX Identification and Protection certification, CSX Identification and Protection certification boot camp, CSX Identification and Protection boot camp, CSX Identification and Protection certification training, CSX Identification and Protection boot camp training, CSX Identification and Protection boot camp certification, CSX Identification and Protection certification course, CSX Identification and Protection course, training CSX Identification and Protection, certification CSX Identification and Protection, boot camp CSX Identification and Protection, certification CSX Identification and Protection boot camp, certification CSX Identification and Protection training, boot camp CSX Identification and Protection training, certification CSX Identification and Protection course.



mcseclasses home | technical schedule | application schedule | class outlines | mcse, mcdba, mcsd training | microsoft .net | cisco certification | security training | ced solutions oracle® certification training | linux, unix, aix | comptia certification | webmaster training | pricing | locations | financing | instructors needed | e-mail us





Search classes by keyword:


Search classes by category:

Copyright © 2018 CED Solutions. CED Solutions Refund Policy. All Rights Reserved.