CSX Practitioner: Boot Camp

CSX Practitioner: Boot Camp

Course ID: CSXPBC 5 Days

CSX Practitioner: Boot Camp


The CSX Practitioner Boot Camp is a 5-day, intensive cyber security training course focused on more complex, technical cyber skills and scenarios. For professionals with up to five years of experience in a cyber security role and an intermediate technical skillset, Boot Camp is an accelerated alternative to our more comprehensive 3-week CSX Practitioner course series.

Boot Camp is conducted in an adaptive, live cyber lab environment, enabling students to build critical technical skills by learning complex concepts and practice applying industry-leading methods. They will learn to utilize the latest open-source tools within actual, real-world scenarios.

Each lesson covered in the course is matched with practice labs and tools, and attendees will receive a complimentary 6-month subscription to the virtual cyber lab environment where they can continue practicing and building technical skills.

CSX Practitioner Boot Camp is an ideal way to build complex and advanced technical skills essential for career advancement and will help students in preparing for the CSX Practitioner certification exam.



The CSX Practitioner Boot Camp is intended for professionals established in the cyber security field — with a minimum of one to five years of experience.

  • Network Scanning
  • Specialized Port Scans
  • Network Topologies
  • Network Log Analysis
  • Centralized Monitoring
  • Hotfix Distribution
  • Vulnerability Scanning
  • Traffic Monitoring
  • Compromise Indicators
  • False Positive Identification
  • Packet Analysis
  • User Account Controls

Those just entering the cyber security field, or who are newer in their cyber security roles, should consider the more comprehensive 3-week series of CSX Practitioner courses: CSX Practitioner Course 1: Identification and Protection, CSX Practitioner Course 2: Detection and CSX Practitioner Course 3: Respond and Recover.





Instructor-led / Virtual Instructor-led

Thailand: Upon Request
India: USD4,000



The course provides students with an environment to discuss and practice methods implemented by cyber security professionals in key areas aligned with global cyber security frameworks. Boot Camp attendees will leave with a concise, clear understanding of relevant technical skills and the governance and policy supporting the required skill set.


Day 1:

Hardware Software Identification and Documentation

LAB: Preliminary Scanning

Network Discovery Tools

LAB: Additional Scanning Options

Sensitive Information Discovery

LAB: Sensitive Information Identification

Vulnerability Assessment Process

LAB: Vulnerability Scanner Set-up and Configuration

Patch Upgrade Configure Vulnerability Scanners

LAB: Vulnerability Scanner Set-up and Configuration, Part 2

Associated Topics

  • Identify

Day 2:

Specific Cyber Controls

LAB: System Hardening

Collecting Event Data

LAB: Firewall Setup and Configuration

Verifying the Effectiveness of Controls

LAB: Microsoft Baseline Security Analyzer

Monitoring Controls

LAB: IDS Setup

Updating Cyber Security Controls

LAB: Personal Security Products

Patch Management

LAB: Linux Users and Groups

Verifying Identities and Credentials

Cyber Security Procedures Standards

Associated Topics

  • Protect

Day 3:

Analyze Network Traffic Using Monitors

LAB: Using Snort and Wireshark to Analyze Traffic

Detect Malicious Activity AntiVirus

LAB: Detect the Introduction and Execution of Malicious Activity

Assess Available Event Information

LAB: Analyze and Classify Malware

Baselines for Anomaly Detection

LAB: Windows Event Log Manipulation via Windows Event Viewer

Initial Attack Analysis

LAB: Host Data Integrity Baselining

Incident Escalation Reporting

LAB: Performing Network Packet Analysis

Change Implementation Escalation

Associated Topics

  • Detect

Day 4:

Defined Response Plan Execution

LAB: Incident Detection and Identification

Network Isolation

LAB: Remove Trojan

Disable User Accounts

LAB: Block Incoming Traffic on Known Port

Blocking Traffic

LAB: Implement Single System Changes in Firewall


LAB: Conduct Supplemental Monitoring

Incident Report

LAB: Create Custom Snort Rules

Associated Topics:

  • Respond

Day 5:

Industry Best Practices

LAB: Comprehensive Lab Response

Disaster Recovery and BC Plans

LAB: Patches and Updates

Cyber System Restoration

LAB: Data Backup and Recovery

Data Backup and Restoration Key Concepts

LAB: Recovering Data and Data Integrity Checks

Actualizing Data Backups and Recovery

LAB: Post Incident Service Restoration

Implementing Patches and Updates

Ensuring Data Integrity

Post-Incident Review

Associated Topics

  • Recover

What’s Next

Subscribe to our mailing list for special offers and promotions.

Thank you! Your subscription has been confirmed. You'll hear from us soon.