fbpx

CSX Specialist: Identify

CSX Specialist: Identify

Course ID: CSXSI 5 Days
   

CSX Specialist: Identify

Overview

This week-long course will help students gain an intermediate-level understanding of the concepts, skills and tools required to perform network asset and vulnerability identification. They will learn how to analyze and assess cyber threats against multiple levels of infrastructure from host to system-level using industry-accepted methods and tools, as governed by the NIST and ISO publication guidelines.

The Identify domain teaches students to analyze and assess cyber threats against multiple levels of infrastructure from host to system-level systems using industry-accepted methods and tools, as governed by the NIST and ISO publication guidelines.

Description

Audience

  • CSX Specialist courses are for individuals who are established in the field of cybersecurity and would like to take their skills to the next level by pursuing in-depth, hands-on understanding of the domains and techniques that are part of their everyday work-life.

Certification

Exam

Exam

Investment

Instructor-led / Virtual Instructor-led

India: Upon Request

PREREQUISITES

 –

OBJECTIVES

  • Provide students with an environment to discuss and practice methods implemented by cyber security professionals in the Identify and Protect domain. Ensure students develop into complimentary team members for enterprises who are workforce ready.

COURSE CONTENT

Day 1:

Asset Identification

LAB: Network Scanning and Documentation

License Management

LAB: License Identification and Documentation

Host Scanning Output Analysis

LAB: Microsoft Baseline Analyzer

Output Comparisons

LAB: Output Documentation Construction/Comparison

Associated Topics:

  •  Nmap Scanning
  • Scanline Scanning
  • Hping Scanning
  • Nmap Metasploit Implementation
  • Microsoft Baseline Analyzer

Day 2: 

Vulnerability Scanning

LAB: Vulnerability Scanning

Vulnerability Reporting

LAB:Vulnerability Report Composition

Threat Documentation

LAB: Remediation Reporting

Associated Topics:

  • Threat Intelligence Sources
  • Attack Vector Types
  • Technical Risk Assessment
  • Risk Assessment Processes
  • Nessus Implementation
  • Remediation Recommendations

Day 3:

Vulnerability Scan Evaluation

LAB: Scan Analysis

Patching Procedures

LAB: Patch Dispersion

Mitigation Plan Development 

LAB: Mitigating Threats

Malicious Activity Identification 

LAB: Log Identifiers

Associated Topics:

  • Scan Dissection
  • Patch Application
  • Knowledge of Security Threats
  • Plan Creation
  • Warning Identification

Day 4:

Control Assessment

LAB: Assessment Evaluation

Baseline Identification

LAB: Baseline Evaluation

Behaviour Analysis

LAB: Behavioral Collection

Baseline Creation

LAB: Baseline Generation

Associated Topics:

  • Baseline Standards
  • Multiple Factor Identification
  • Control Evaluation
  • Character Based Controls
  • Host Behavioral Analytics
  • Behavioral Identification
  • Baseline Creation

Day 5:

Security Control Baseline Creation

LAB: Baseline Creation

Baseline/Configuration Comparison

LAB: Log/Configuration Comparison

Baseline Adherence Evaluation

LAB: Configuration Comparisons

Third-Party Control Evaluation

LAB: Penetration Testing Configuration

Associated Topics:

  • Activity Log Evaluation
  • Best Practices
  • Host Log Evaluation
  • Configuration Mechanisms

What’s Next

Additional information

Country

Singapore, Malaysia, Indonesia, Thailand, Vietnam, India, Hong Kong

Subscribe to our mailing list for special offers and promotions.

Processing...
Thank you! Your subscription has been confirmed. You'll hear from us soon.
ErrorHere