CSX Practitioner Level 1: Identification and Protection

  • Course Code
    ISAC-002

CSX Practitioner Level 1: Identification and Protection

  • ISACA’s Cybersecurity Nexus (CSX) certification program supports cybersecurity professionals throughout their career by assessing a candidate’s abilities and skills at three progressive technical skill levels. Levels are differentiated by skills, not by years of experience. Each technical skill level is assessed utilizing a vendor-neutral set of performance-based exams measuring a candidate’s technical skills, abilities and performance.

Learning Outcomes

    • Provide participants with an environment to discuss and practice methods implemented by cybersecurity professionals in the Identify and Protect domains
    • Ensure participants develop into complimentary team members for enterprises who are workforce ready
       

Course Contents

    Day 1

    The first day of this official CSX Practitioner 1 course reviews several topics while also providing labs for participants to gain practical experience. The lessons and labs found below are associated with the following topics: C.I.A., Active / Passive Scanning, Availability / Authenticity, Asset Classification, Network Devices, and OSI Model:

    Lessons:

    • Hardware and Software Identification and Documentation
    • Network Reconnaissance and Scanning
    • Sensitive Information Discovery
    • Asset Validation and Rogue Devices

    Labs:

    • Preliminary Scanning
    • Additional Scanning Options
    • Scanning from Windows

    Day 2

    Day 2 of this official course reviews several topics while also providing labs for participants to gain practical experience. The lessons and labs found below are associated with the following topics: Scanning, Enumeration, Penetration Training, and Fingerprinting.

    Lessons:

    • Network Topology Documentation
    • Vulnerability Assessment Process
    • Patching and Configuration Vulnerability Scanners
    • Vulnerability Scanning
    • Vulnerability Scanning Analysis

    Labs:

    • Specialized Linux Port Scans
    • Sensitive Information identification
    • Network Topology Generation
    • Vulnerability Scanner Set-up and Configuration
    • Vulnerability Scanner Set-up and Configuration, Pt. 2

    Day 3

    Day 3 of this CSX Practitioner 1 training course reviews several topics while also providing labs for participants to gain practical experience. The lessons and labs found below are associated with the following topics: Cryptographic Controls, NSIT / ISO Documentation, Network / Host Prevention Systems, Internal Log Processes, and External Documentation.

    Lessons:

    • Implementing Specified Cyber Security Controls
    • Cyber Security Procedure Execution
    • Configuring Cyber Security Controls
    • Validating Configurations

    Labs:

    • System Hardening
    • Firewall Setup and Configuration

    Day 4

    The fourth day of training for this course reviews several topics while also providing labs for participants to gain practical experience. The lessons and labs found below are associated with the following topics: Host Logs, Activity Logs, Network Logs, Firewall Logs, IDS Logs, and Encryption.

    Lessons:

    • Documenting Configuration Changes
    • Testing New Controls
    • Collecting Event Data
    • Sending and Receiving Event Data
    • Verifying the Effectiveness of Controls

    Labs:

    • Log Analysis
    • Centralized Monitoring
    • Microsoft Baseline Analyzer

    Day 5

    In the final day of this official CSX Practitioner 1 training seminar, participants review several topics while also participating in various labs to gain practical experience. The lessons and labs found below are associated with the following topics: Non-Repudiation, Multiple Factor Authentication, Information Classification, File System Access Control Mechanisms, Mobile Device Management Policy, and Remote Access Solutions.

    Lessons:

    • Hardware and Software Identification and Documentation
    • Network Reconnaissance and Scanning
    • Sensitive Information Discovery
    • Asset Validation and Rogue Devices

    Labs:

    • Preliminary Scanning
    • Additional Scanning Options
    • Scanning from Windows

Our Methodology

    • Make coaching and monitoring innovative and using modern
    • Media training also using on the go training by using interactive means and focusing on
    • The exercises, practical applications and real situations study
    • Live delivery method, instructor-led training
    • Experienced consultant, trainers, and professional
    • Qualified trainer with high-level experience

Attendance Reports

    • Send daily attendance reports to training departments
    • Send full attendance report to training dep. by the end of the course
    • Attend 100 % from the course days also provide daily
    • Issue attendance certificate for participant who attend minimum 80% from the course duration

Pre/Post Reports

    • Pre- assessment before starting training
    • Post assessment after finish training
    • Full report for the deferent between Pre-& Post assessment

Who Should Attend

    The CSX Practitioner course is intended for professionals with roles focusing on cyber security – with a minimum of one to five years of experience. Participants who register for this course should be proficient in the following areas:

    • Network Scanning
    • Specialized Port Scans
    • Network Topologies
    • Network Log Analysis
    • Centralized Monitoring
    • Vulnerability Scanning
    • Traffic Monitoring
    • Compromise Indicators
    • False Positive Identification
    • Packet Analysis
Date City Venue Language Price Status Register
19 Jan 23 Jan - 2025 Riyadh 5 Stars Hotel English SAR 14000 Planned Register
09 Feb 13 Feb - 2025 Cairo 5 Stars Hotel English SAR 16000 Planned Register
09 Feb 13 Feb - 2025 Dubai 5 Stars Hotel English SAR 16000 Planned Register
20 Apr 24 Apr - 2025 Riyadh 5 Stars Hotel English SAR 14000 Planned Register
06 Jul 10 Jul - 2025 Riyadh 5 Stars Hotel English SAR 14000 Planned Register
27 Jul 31 Jul - 2025 Cairo 5 Stars Hotel English SAR 16000 Planned Register
27 Jul 31 Jul - 2025 Dubai 5 Stars Hotel English SAR 16000 Planned Register
07 Sep 11 Sep - 2025 Cairo 5 Stars Hotel English SAR 16000 Planned Register
07 Sep 11 Sep - 2025 Dubai 5 Stars Hotel English SAR 16000 Planned Register
19 Oct 23 Oct - 2025 Riyadh 5 Stars Hotel English SAR 14000 Planned Register
02 Nov 06 Nov - 2025 Riyadh 5 Stars Hotel English SAR 14000 Planned Register
23 Nov 27 Nov - 2025 Riyadh 5 Stars Hotel English SAR 14000 Planned Register