Alabama Computer Solutions Certification Training Boot Camp MCSE MCSD MCDBA Cisco CIW Linux Oracle Java Security Military Discounts Testimonials About Us Linux/Unix Certification MCSD Certification Home MCSE Certification MCDBA Certification Cisco Certification Security Certification Java Certification Oracle® Certification CIW Certification Jobs Boot Camp Financing Boot Camp Pricing Boot Camp Technical Schedule Contact Us


CSX - Certified Cybersecurity Practitioner Level 1 - Identification & Protection

Course Length: 5 days

Class Schedule
Call for Class Schedule

The first course in the CSX Practitioner series focuses on key cybersecurity skills and includes foundational, real- world instruction in the Identify and Protect domains.

Topics range from preliminary network scanning to security control implementation. Through the completion of multiple lab-reinforced modules, students will learn how to apply industry-developed, experience-based methods to the identification of key networks and learn to develop appropriate protection mechanisms.

The Identify domain teaches students to recognize, assess and remediate specific internal and external network threats.

The Protect domain offers instruction in the basic concepts, methods, and tools associated with implementing cybersecurity controls to protect a system from the identified threats.

Course Learning Objectives

Provide students with an environment to discuss and practice methods implemented by cybersecurity professionals in the Identify and Protect domains. Ensure students develop into complimentary team members for enterprises who are workforce ready.

Target Audience

Individuals in the field of cybersecurity who are interested in learning hands-on technical skills.

Classroom-Based Instruction Topics

  • Network Reconnaissance
  • Software / Hardware Scanning
  • Asset Validation / Anomaly Assessment
  • Network Mapping
  • Introduction to Vulnerability Scanning
  • Vulnerability Scanning Configuration
  • Conducting a Vulnerability Scan
  • Vulnerability Scan Evaluation
  • Cybersecurity Control Introduction and Explanation
  • Cybersecurity Control Evaluation and Configuration
  • Threat Data Collection
  • Threat Log Parsing and Maintenance
  • Control Vulnerability Scanning and Assessment
  • Control Monitoring and Assessment
  • Control Change implementation
  • Control Documentation Maintenance
  • Patch Implementation and Dissemination

Lab Requirements:

  • Networking Reconnaissance
  • Network and System Scanning
  • Network Topology Generation
  • Vulnerability Scanner Differentiation / Configuration
  • Vulnerability Scanning
  • Vulnerability Scanner Log Evaluation
  • Security Control Assessment
  • Log Analysis and Collection
  • Host Threat Transmission
  • IDS Installation, Configuration, Implementation
  • IDS Control Testing
  • IDS Control Reconfiguration
  • IDS Patching

Course Outline

DAY 1

LESSON

  • Network Reconnaissance
  • Software / Hardware Scanning
  • Asset Validation / Anomaly Assessment
  • Network Mapping

LAB

  • Network Reconnaissance
  • Network and System Scanning
  • Network Topology Generation

ASSOCIATED TOPICS

  • C.I.A.
  • Active / Passive Scanning
  • Availability / Authenticity
  • Asset Classification
  • Network Devices
  • OSI Model
DAY 2

LESSON

  • Introduction to Vulnerability Scanning
  • Vulnerability Scanning Preparation / Configuration
  • Conducting a Vulnerability Scan
  • Vulnerability Scan Assessment / Evaluation

LAB

  • Vulnerability Scanner Differentiation / Configuration
  • Vulnerability Scanning
  • Vulnerability Scanner Log Evaluation

ASSOCIATED TOPICS

  • Scanning, Enumeration, Penetration Testing
  • Fingerprinting
DAY 3

LESSON

  • Cybersecurity Control Introduction and Explanation
  • Cybersecurity Control Evaluation and Configuration
  • Threat Data Collection and Amalgamation
  • Threat Log Parsing and Maintenance

LAB

  • Network Reconnaissance
  • Security Control Assessment
  • Log Analysis and Collection
  • Host Threat Transmission

ASSOCIATED TOPICS

  • Cryptographic Controls
  • NSIT / ISO Documentation
  • Network / Host Prevention Systems
  • Internal Log Processes
  • External Documentation
DAY 4
LESSON
  • Control Vulnerability Scanning and Assessment
  • Control Monitoring and Assessment
  • Control Change Implementation
  • Control Documentation Maintenance
LAB
  • IDS Installation, Configuration, Implementation
  • IDS Control Testing
  • IDS Control Reconfiguration
ASSOCIATED TOPICS
  • Host Logs
  • Activity Logs
  • Network Logs
  • Firewall Logs
  • IDS Logs
  • Encryption
DAY 5
LESSON
  • Control Patch Implementation / Dissemination
LAB
  • IDS Patching
ASSOCIATED TOPICS
  • Non-repudiation
  • Multiple Factor Authentication Information Classification
  • File System Access Control Mechanisms
  • Mobile Device Management Policy
  • Remote Access Solutions

Alabama Computer Solutions is your best choice for CSX Identification and Protection, CSX Identification and Protection training, CSX Identification and Protection certification, CSX Identification and Protection certification boot camp, CSX Identification and Protection boot camp, CSX Identification and Protection certification training, CSX Identification and Protection boot camp training, CSX Identification and Protection boot camp certification, CSX Identification and Protection certification course, CSX Identification and Protection course, training CSX Identification and Protection, certification CSX Identification and Protection, boot camp CSX Identification and Protection, certification CSX Identification and Protection boot camp, certification CSX Identification and Protection training, boot camp CSX Identification and Protection training, certification CSX Identification and Protection course.



home | technical schedule | application schedule | class outlines | mcse, mcdba, mcsd training | microsoft .net | cisco certification | security training | alabama training solutions oracle® certification training | linux, unix | comptia certification | web development | pricing | locations | financing | instructors needed | e-mail us





Search classes by keyword:


Search classes by category:

mcse training
MCSE boot camp MCSE Training MCSE Certification MCSE Bootcamp MCSE Boot Camp MCSE Course MCSE Training MCSE Certification MCSE Bootcamp MCSE Boot Camp MCSE MCSA Training MCSA Certification MCSA Bootcamp MCSA Boot Camp MCSA Course MCSA Training MCSA Certification MCSA Bootcamp MCSA Boot Camp MCSA Course MCSA MCSE 2003 MCSE Training 2003 MCSE Certification 2003 MCSE Boot Camp 2003 MCSE Course 2003 MCSE 2003 Training MCSE 2003 Certification MCSE 2003 Boot Camp MCSE 2003 Course Training MCSE 2003 Certification MCSE 2003 Boot Camp MCSE 2003 Course MCSE 2003 MCSE Training Course MCSE Training Boot Camp MCSE training
MCSE certification MCSE Training Certification
Training MCSE Certification Training MCSE Boot Camp Training MCSE Course MCSE Certification Training MCSE Certification Boot Camp MCSE Certification Course MCSE Boot Camp Training MCSE Boot Camp Course MCSE Course Training MCSE Course Certification MCSD MCSD Training MCSD Certification MCSD Course Certification Training Training Certification Microsoft Certification Certification Microsoft Microsoft Training

Copyright © 2019 Alabama Computer Solutions. Alabama Computer Solutions Refund Policy. All Rights Reserved.