Alabama Computer Solutions Certification Training Boot Camp MCSE MCSD MCDBA Cisco CIW Linux Oracle Java Security Military Discounts Testimonials About Us Linux/Unix Certification MCSD Certification Home MCSE Certification MCDBA Certification Cisco Certification Security Certification Java Certification Oracle® Certification CIW Certification Jobs Boot Camp Financing Boot Camp Pricing Boot Camp Technical Schedule Contact Us


CSX - Certified Cybersecurity Practitioner Level 2 - Detection

Course Length: 5 days
Number of Exams: 1

Class Schedule
Call for Class Schedule

The second course in the CSX Practitioner series goes deeper into skills focused in the Detect domain.

Students will learn the basic concepts, methods and tools used to leverage cybersecurity controls in order to identify system events and non-event level incidents. By completing multiple lab-reinforced modules, students will gain the skills necessary to detect potential network events and incidents. Topics range from incident packet analysis to Incident Response (IR) report drafting and generation.

Students will gain the following skills in the Detect domain:

  • Analyzing and monitoring network output
  • Detecting malware
  • Detecting incidents
  • Notifying proper channels
  • Analyzing attacks
  • Escalating incidents
  • Performing change monitoring

Course Learning Objectives

Provide students with an environment to discuss and practice methods implemented by cybersecurity professionals in the Detect domain. Ensure students develop into complimentary team members for enterprises who are workforce ready.

Target Audience

Individuals in the field of cybersecurity who are interested in learning hands-on technical skills.

Classroom-Based Instruction Topics

  • IDS Traffic Analysis vs Packet Analysis
  • Behavioral Designation
  • Compromise Identifiers / False Positive Differentiation
  • Compromise Escalation
  • Malicious Code Differentiation
  • Antivirus Deployments
  • Antivirus Monitoring / Malicious Code Identification
  • Malicious Code Remediation
  • Incident Identification
  • Initial Incident identifiers
  • Incident Event Collection
  • Identifying Established baselines
  • Event Characteristic Capture
  • Attack Intent Assessment
  • System Exposure Analysis / Change identification
  • Attack Timeline Construction
  • Attack Documentation
  • Event Escalation
  • Support Role Designation / Action
  • Incident Response Report Generation

Lab Requirements:

  • Networking Traffic and Log Comparison
  • Log Qualification
  • Event Comparison
  • Threat Identification
  • Antivirus Deployment
  • Antivirus Utilization
  • Containment / Eradication
  • Traffic Analysis Threat Identification
  • Threat / Incident Component Evaluation
  • Traffic and Log Assessment and Analysis
  • Baseline Output Comparison
  • Packet Character Observation
  • Compromise Indicators
  • Traffic Analysis
  • Timeline Creation
  • Incident Report Generation
  • Incident Management Register Comparison
  • Incident Escalation Report Generation

Course Outline

DAY 1

LESSON

  • IDS Traffic Analysis vs Packet Analysis
  • Behavior Designation
  • Compromise Identifiers / False Positive Differentiation
  • Compromise Escalation

LAB

  • Traffic and Log Comparison
  • Log Qualification
  • Event Comparison
  • Threat Identification

ASSOCIATED TOPICS

  • Traffic Flow Analysis
  • IR Resources
DAY 2

LESSON

  • Malicious Code Differentiation
  • Antivirus Deployments
  • Antivirus Monitoring / Malicious Code Identification
  • Malicious Code Remediationt

LAB

  • Antivirus Deployment
  • Antivirus Utilization
  • Containment / Eradication

ASSOCIATED TOPICS

  • Attack Types
  • Attack Methods
  • Network Access Control
  • Virus Types
  • Worm Variants
DAY 3

LESSON

  • Incident Identification
  • Initial Incident Identifiers
  • Incident Event Collection
  • Identifying Established Baselines
  • Event Characteristic Capture

LAB

  • Traffic Analysis Threat Identification
  • Threat / Incident Component Evaluation
  • Traffic and Log Assessment and Analysis
  • Baseline Output Comparison
  • Packet Character Observation

ASSOCIATED TOPICS

  • Incident Identification Methodologies
  • IP Reputation Databases
  • Port Scanning
  • Host Analysis
  • Network Traffic Behavior
DAY 4
LESSON
  • Attack Intent Assessment
  • System Exposure Analysis / Change Identification
  • Attack Timeline Construction
  • Attack Documentation
LAB
  • Compromise Indicators
  • Traffic Analysis
  • Timeline Creation
  • Incident Report Generation
ASSOCIATED TOPICS
  • Malware Functionality
  • Spyware
  • Trojans
  • Rootkits
  • Viruses
  • Backdoors
DAY 5
LESSON
  • Event Escalation
  • Support Role Designation / Action
  • Incident Response Report Generation
LAB
  • Incident Management Register Comparison
  • Incident Escalation Report Generation
ASSOCIATED TOPICS
  • NIST Roles
  • ISO Designations
  • CERT Designation
  • CSIRT Roles

Alabama Computer Solutions is your best choice for CyberSecurity Practitioner Decttion, CyberSecurity Practitioner Decttion training, CyberSecurity Practitioner Decttion certification, CyberSecurity Practitioner Decttion certification boot camp, CyberSecurity Practitioner Decttion boot camp, CyberSecurity Practitioner Decttion certification training, CyberSecurity Practitioner Decttion boot camp training, CyberSecurity Practitioner Decttion boot camp certification, CyberSecurity Practitioner Decttion certification course, CyberSecurity Practitioner Decttion course, training CyberSecurity Practitioner Decttion, certification CyberSecurity Practitioner Decttion, boot camp CyberSecurity Practitioner Decttion, certification CyberSecurity Practitioner Decttion boot camp, certification CyberSecurity Practitioner Decttion training, boot camp CyberSecurity Practitioner Decttion training, certification CyberSecurity Practitioner Decttion course.



home | technical schedule | application schedule | class outlines | mcse, mcdba, mcsd training | microsoft .net | cisco certification | security training | alabama training solutions oracle® certification training | linux, unix | comptia certification | web development | pricing | locations | financing | instructors needed | e-mail us





Search classes by keyword:


Search classes by category:

mcse training
MCSE boot camp MCSE Training MCSE Certification MCSE Bootcamp MCSE Boot Camp MCSE Course MCSE Training MCSE Certification MCSE Bootcamp MCSE Boot Camp MCSE MCSA Training MCSA Certification MCSA Bootcamp MCSA Boot Camp MCSA Course MCSA Training MCSA Certification MCSA Bootcamp MCSA Boot Camp MCSA Course MCSA MCSE 2003 MCSE Training 2003 MCSE Certification 2003 MCSE Boot Camp 2003 MCSE Course 2003 MCSE 2003 Training MCSE 2003 Certification MCSE 2003 Boot Camp MCSE 2003 Course Training MCSE 2003 Certification MCSE 2003 Boot Camp MCSE 2003 Course MCSE 2003 MCSE Training Course MCSE Training Boot Camp MCSE training
MCSE certification MCSE Training Certification
Training MCSE Certification Training MCSE Boot Camp Training MCSE Course MCSE Certification Training MCSE Certification Boot Camp MCSE Certification Course MCSE Boot Camp Training MCSE Boot Camp Course MCSE Course Training MCSE Course Certification MCSD MCSD Training MCSD Certification MCSD Course Certification Training Training Certification Microsoft Certification Certification Microsoft Microsoft Training

Copyright © 2019 Alabama Computer Solutions. Alabama Computer Solutions Refund Policy. All Rights Reserved.