ISACA CSX Practitioner II: Detection Training

ISACA CSX Practitioner II: Detection Training

Course Delivery

This Course is available in the following format:

Request this course in a different delivery format

GSA Schedule 70 Saving for Government Customers

Course Overview:

ISACA CSX Practitioner II: Detection Training – Hands-on

Use cybersecurity controls to detect network events and incidents with this ISACA CSX Practitioner II: Detection Training.

In this second ISACA CSX Practitioner II: Detection Training course in the CSX Practitioner series, you will go deeper into skills focused in the Detect domain. You will learn the basic concepts, methods, and tools used to leverage cybersecurity controls in order to identify system events and non-event level incidents. Completing multiple lab-reinforced modules, you will gain the skills necessary to detect potential network events and incidents. You will learn about topics ranging from incident packet analysis to drafting and generating incident response reports.

Customize It:

• If you are familiar with some aspects of this course, we can omit or shorten their discussion.
• We can adjust the emphasis placed on the various topics or build the course around the mix of technologies of interest to you (including technologies other than those included in this outline).
• If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the course in manner understandable to lay audiences.

Related Courses:

ISACA CSX Practitioner I: Identification and Protection Training
Fundamentals of Information Systems Security Training

Audience / Target Group:

The target audience for this ISACA CSX Practitioner II: Detection Training course:

• Individuals in the field of cybersecurity who are interested in gaining hands-on technical skills

What You Will Learn:

Upon completing this ISACA CSX Practitioner II: Detection Training course, learners will be able to meet these objectives:

• Analyze and monitor network output
• Detect malware
• Detect incidents
• Notify proper channels
• Analyze attacks
• Escalate incidents
• Perform change monitoring

ISACA CSX Practitioner II: Detection Training – Course Syllabus:

1. IDS Traffic Analysis vs. Packet Analysis
2. Behavior Designation
3. Compromise Identifiers and False Positive Differentiation
4. Compromise Escalation
5. Malicious Code Differentiation
6. Anti-Virus Deployments
7. Anti-Virus Monitoring and Malicious Code Identification
8. Malicious Code Remediation
9. Incident Identification
10. Initial Incident Identifiers
11. Incident Event Collection
12. Identifying Established Baselines
13. Event Characteristic Capture
14. Attack Intent Assessment
15. System Exposure Analysis and Change Identification
16. Attack Timeline Construction
17. Attack Documentation
18. Event Escalation
19. Support Role Designation and Action
20. Incident Response Report Generation


Lab 1: Network Traffic and Log Comparison
Lab 2: Log Qualification
Lab 3: Event Comparison
Lab 4: Threat Identification
Lab 5: Anti-Virus Deployment
Lab 6: Anti-Virus Utilization
Lab 7: Containment and Eradication
Lab 8: Traffic Analysis Threat Identification
Lab 9: Threat and Incident Component Evaluation
Lab 10: Traffic and Log Assessment and Analysis
Lab 11: Baseline Output Comparison
Lab 12: Packet Character Observation
Lab 13: Compromise Indicators
Lab 14: Traffic Analysis
Lab 15: Timeline Creation
Lab 16: Incident Report Generation
Lab 17: Incident Management Register Comparison
Lab 18: Incident Escalation Report Generation

Whether you are looking for general information or have a specific question, we want to help!

Request More Information

Print Friendly, PDF & Email