CSX Practitioner Level 2: Detection

  • Course Code
    ISAC-003

CSX Practitioner Level 2: Detection

  • ISACA’s Cybersecurity Nexus (CSX) certification program supports cybersecurity professionals throughout their career by assessing a participant’s abilities and skills at three progressive technical skill levels. Levels are differentiated by skills, not by years of experience. Each technical skill level is assessed utilizing a vendor-neutral set of performance-based exams measuring a candidate’s technical skills, abilities and performance.
  • This official CSX Practitioner 2 course reviews the “Detect” domain. Participants will learn the basic concepts, methods and tools used to leverage cyber security controls to identify system events and non-event level incidents. CSX Practitioner 2 will help participants develop the ability to serve as a first responder, following established procedures, defined processes and working mostly with known problems on a single system.

Learning Outcomes

    Over the course of five days, participants will cover everything they need to know to succeed in the CSX Practitioner 2: Detection exam:

    • Traffic Flow Analysis
    • IR Resources
    • Attack Types
    • Attack Methods
    • Network Access Control
    • Virus Types
    • Worm Variants
    • Incident Identification Methodologies
    • IP Reputation Databases
    • Port Scanning
    • Host Analysis
    • Network Traffic Behavior
    • Malware Functionality, Spyware
    • Trojans
    • NIST Roles
    • ISO Designations
    • Cert Designation
    • CSIRT Roles

Course Contents

    Day 1

    The first day of this official CSX Practitioner 2 course reviews several topics while also providing labs for Participants to gain practical experience. The lessons and labs found below are associated with the following topics: Traffic Flow Analysis and IR Resources.

    Lessons:

    • Analyzing Network Traffic Using Monitors
    • Monitoring Network Traffic
    • Monitoring Schedule
    • Searching for Indicators of Compromise
    • Monitoring for False Positives

    Labs:

    • Using Snort and Wireshark to Analyze Traffic
    • Monitoring Network Traffic

    Day 2

    Day 2 of this official course analyzes several topics while providing labs for Participants to gain practical experience. The lessons and labs found below are associated with the following topics: Attack Types, Attack Methods, Network Access Control, Virus Types, and Worm Variants.

    Lessons:

    • Escalate Potential Compromises
    • Network Packet Analysis
    • Malicious Activity and Anti-Virus
    • Malicious Code and Activity Types
    • Remediation Steps

    Labs:

    • Searching for Indicators of Compromise
    • Monitoring for False Positives

    Day 3

    The third day of this training seminar focuses on several topics while also providing labs for Participants to gain practical experience. The lessons and labs found below are associated with the following topics: Incident Identification Methodologies, IP Reputation Databases, Port Scanning, Host Analysis, and Network Traffic Behavior.

    Lessons:

    • Assessing Available Event Information
    • Performing Initial Analysis
    • Identifying Potential Collection Sources
    • Deploy the Data Collection Utility
    • Using Event Correlation

    Labs:

    • Performing an Initial Attack Analysis
    • Detect the Introduction and Execution of Malicious Activity
    • Analyze and Classify Malware

    Day 4

    Just like the first three days of training, day 4 reviews several topics while also providing labs for Participants to gain practical experience. The lessons and labs found below are associated with the following topics: Malware Functionality, Spyware, Trojans, Rootkits, Viruses, and Backdoors.

    Lessons:

    • Using Established Baselines to Detect Anomalies
    • Documenting Your Steps
    • Initial Attack Analysis
    • Determine the Initial Scope
    • Identify if High-Risk Systems Were Affected

    Labs:

    • Event Log Collection
    • Windows Event Log Manipulation
    • Host Integrity Baselining

    Day 5

    On the final day of training for this official CSX Practitioner 2 course, Participants review several topics while also participating in various labs to gain practical experience. The lessons and labs found below are associated with the following topics: NIST Roles, ISO Designations, Cert Designation, and CSIRT Roles.

    Lessons:

    • Monitoring Controls
    • Updating Cyber Security Controls
    • Patch Management
    • Verifying Identities and Credentials
    • Cybersecurity Standards and Procedures

    Labs:

    • IDS Setup
    • Personal Security Products
    • Verifying Hotfixes
    • Linux Users and Groups
    • Core Impact Vulnerability Scan

Our Methodology

    • Make coaching and monitoring innovative and using modern
    • Media training also using on the go training by using interactive means and focusing on
    • The exercises, practical applications and real situations study
    • Live delivery method, instructor-led training
    • Experienced consultant, trainers, and professional
    • Qualified trainer with high-level experience

Attendance Reports

    • Send daily attendance reports to training departments
    • Send full attendance report to training dep. by the end of the course
    • Attend 100 % from the course days also provide daily
    • Issue attendance certificate for participant who attend minimum 80% from the course duration

Pre/Post Reports

    • Pre- assessment before starting training
    • Post assessment after finish training
    • Full report for the deferent between Pre-& Post assessment

Who Should Attend

    The CSX Practitioner 2 course is intended for professionals with roles focusing on cyber security – with a minimum of one to five years of experience. Participants who register for this course should be proficient in the following areas:

    • Network Scanning
    • Specialized Port Scans
    • Network Topologies
    • Network Log Analysis
    • Centralized Monitoring
    • Vulnerability Scanning
    • Traffic Monitoring
    • Compromise Indicators
    • False Positive Identification
    • Packet Analysis
Date City Venue Language Price Status Register
27 Oct 31 Oct - 2024 Riyadh 5 Stars Hotel English SAR 12000 Planned Register
10 Nov 14 Nov - 2024 Riyadh 5 Stars Hotel English SAR 12000 Planned Register
08 Dec 12 Dec - 2024 Riyadh 5 Stars Hotel English SAR 12000 Planned Register
22 Dec 26 Dec - 2024 Cairo 5 Stars Hotel English SAR 14850 Planned Register
22 Dec 26 Dec - 2024 Dubai 5 Stars Hotel English SAR 14850 Planned Register
16 Feb 20 Feb - 2025 Riyadh 5 Stars Hotel English SAR 12000 Planned Register
23 Feb 27 Feb - 2025 Riyadh 5 Stars Hotel English SAR 12000 Planned Register
18 May 22 May - 2025 Cairo 5 Stars Hotel English SAR 14850 Planned Register
18 May 22 May - 2025 Dubai 5 Stars Hotel English SAR 14850 Planned Register
25 May 29 May - 2025 Cairo 5 Stars Hotel English SAR 14850 Planned Register
25 May 29 May - 2025 Dubai 5 Stars Hotel English SAR 14850 Planned Register
15 Jun 19 Jun - 2025 Riyadh 5 Stars Hotel English SAR 12000 Planned Register
27 Jul 31 Jul - 2025 Riyadh 5 Stars Hotel English SAR 12000 Planned Register
10 Aug 14 Aug - 2025 Cairo 5 Stars Hotel English SAR 14850 Planned Register
10 Aug 14 Aug - 2025 Dubai 5 Stars Hotel English SAR 14850 Planned Register
26 Oct 30 Oct - 2025 Riyadh 5 Stars Hotel English SAR 12000 Planned Register
09 Nov 13 Nov - 2025 Riyadh 5 Stars Hotel English SAR 12000 Planned Register
07 Dec 11 Dec - 2025 Riyadh 5 Stars Hotel English SAR 12000 Planned Register
21 Dec 25 Dec - 2025 Cairo 5 Stars Hotel English SAR 14850 Planned Register
21 Dec 25 Dec - 2025 Dubai 5 Stars Hotel English SAR 14850 Planned Register