fbpx

CSX Specialist: Recover

CSX Specialist: Recover

Course ID: CSXSR 5 Days
   

CSX Specialist: Recover

Overview

This week-long course will help students gain an intermediate-level understanding of the concepts, skills and tools required to execute tasks identified in organizational Business Continuity Plans (BCP) and Disaster Recovery Plans (DRP). They will learn to utilize recovery techniques, such as data integrity evaluation, alternative site maintenance and post event restoration. In addition, they will learn how to use specialized integrity evaluation and backup dispersion tools.

The Recover domain teaches students service restoration and associated support tasks. Students will learn proper post-IR documentation methodologies, to ensure that appropriate changes are adapted to system-wide control documentation and organizational policy.

Description

Audience

  • CSX Specialist courses are for individuals who are established in the field of cybersecurity and would like to take their skills to the next level by pursuing in-depth, hands-on understanding of the domains and techniques that are part of their everyday work-life.

Certification

Exam

Exam

Investment

Exam

PREREQUISITES

 –

OBJECTIVES

  • Provide students with an environment to discuss and practice methods implemented by cyber security professionals in the Identify and Protect domain. Ensure students develop into complimentary team members for enterprises who are workforce ready

COURSE CONTENT

Day 1:

BCP Components

LAB: Component Analysis/Verification

BCP Task 

LAB: Task Performance

System Configuration Changes

LAB: Changes Implementation

Control Validation

LAB: System Assessment

Associated Topics

  • Compliance Documentation
  • Best Practice Implementation
  • Security Control Application
  • Configuration Guidance

Day 2: 

DRP Components

LAB: Component Analysis/Verification

DRP Task

LAB: Task Performance

System Configuration Changes

LAB: Change Implementation

Control Validation

LAB: System Assessment

Associated Topics:

  • Compliance Documentation
  • Best Practice Implementation
  • Security Control Application
  • Configuration Guidance

Day 3:

Safeguard Incorporation

LAB: Safeguard Identification

Control Maintenance

LAB: System Checkup Plans

Confidentiality Assurance

LAB: Data Loss Prevention (DLP)

System Hardening 

LAB: Firewall Implementation Procedures

Associated Topics:

  • DLP
  • Configuration Refinement
  • CIA
  • Perimeter Securing Mechanisms

Day 4:

Understanding Compliance Policy

LAB: Compliance Policy Components

Patching Policies and Assurance

LAB: Patch Assessment

Vulnerability Policy Assessment

LAB: Vulnerability Evaluation

Comprehensive System Evaluation

LAB: Holistic Evaluation Methods

Associated Topics:

  • Patching Methods
  • Evaluation Methodologies
  • Vulnerability Scans
  • Exploitation Identification

Day 5:

Control Identification

LAB: Control Assessment

Change Review and Recommendation

LAB: Change Analysis

Report Component Identification

LAB: Component Assessment

Report Creation

LAB: After Action Report Construction

Associated Topics:

  • After Action Reporting
  • Security Control Assessment
  • Best Practice Implementation
  • Lessons learned Conduct

What’s Next

Subscribe to our mailing list for special offers and promotions.

Processing...
Thank you! Your subscription has been confirmed. You'll hear from us soon.
ErrorHere