ISACA CSX Practitioner III: Respond and Recover Training
|Commitment||5 days, 7-8 hours a day.|
|How To Pass||Pass all graded assignments to complete the course.|
|User Ratings||Average User Rating 4.8 See what learners said|
|Delivery Options||Instructor-Led Onsite, Online, and Classroom Live|
ISACA CSX Practitioner III: Respond and Recover Training Course – Hands-on
ISACA’s Cybersecurity Nexus (CSX) certification program supports cybersecurity professionals throughout their career by assessing a candidate’s abilities and skills at three progressive technical skill levels. Levels are differentiated by skills, not by years of experience. Each technical skill level is assessed utilizing a vendor-neutral set of performance-based exams measuring a candidate’s technical skills, abilities and performance in the following areas: Identify, Protect, Detect, Respond, and Recover.
ISACA CSX Practitioner III: Respond and Recover Training training from Intrinsec reviews both the “Respond” and “Recover” domains. With course lecture reinforced with lab sequences, students will learn how to apply a professional methodology to respond and recover from network incidents or disasters. Not only that, but students will discover how to contain an event and protect assets and infrastructure, and learn the components and procedures required for a comprehensive incident response plan.
This ISACA CSX Practitioner III: Respond and Recover Training course, along with CSX Practitioner 1 and 2, was developed using existing global cybersecurity frameworks as well as input from hundreds of subject matter experts. Whether a student is planning to write the exam or learn more about Cyber Security, this course is packed with study tips and practical exercises.
ISACA CSX Practitioner III: Respond and Recover Training Course – Customize it
- We can adapt this ISACA CSX Practitioner III: Respond and Recover Training course to your group’s background and work requirements at little to no added cost.
- If you are familiar with some aspects of this ISACA CSX Practitioner III: Respond and Recover Training course, we can omit or shorten their discussion.
- We can adjust the emphasis placed on the various topics or build the ISACA CSX Practitioner III: Respond and Recover Training around the mix of technologies of interest to you (including technologies other than those included in this outline).
- If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the course in manner understandable to lay audiences.
ISACA CSX Practitioner III: Respond and Recover Training Course – Audience/Target Group
The CSX Practitioner course is intended for professionals with roles focusing on cyber security – with a minimum of one to five years of experience. Students who register for this course should be proficient in the following areas:
- Network Scanning
- Specialized Port Scans
- Network Topologies
- Network Log Analysis
- Centralized Monitoring
- Hotfix Distribution
- Vulnerability Scanning
- Traffic Monitoring
- Compromise Indicators
- False Positive Identification
- Packet Analysis
- Used Account Controls
ISACA CSX Practitioner III: Respond and Recover Training Course – Class Prerequisites
The knowledge and skills that a learner must have before attending this training course are:
ISACA CSX Practitioner III: Respond and Recover Training Course – Objectives:
Upon completing this training course, learners will be able to meet these objectives:
- Analyze and monitor network output
- Detect malware
- Detect incidents
- Notify proper channels
- Analyze attacks
- Escalate incidents
- Perform change monitoring
ISACA CSX Practitioner III: Respond and Recover Training – Course Content
On the first day of training for this official CSX Practitioner 3 course, students will learn about several topics while also participating in various labs to gain practical experience. The lessons and labs for this day of training relate to the following subjects: IR Reputation Databases, IR Procedure, and Real Time Blacklists.
- Defined Response Plan Execution
- Incident Response Escalation Procedures
- System Adverse Effects to Incident Response
- Network Isolation
- Disable User Accounts
- Remove Trojan
- Open and Close Ports on Windows 7
- Disable User Accounts on Windows 7
- Block Incoming Traffic on Known Ports
The second day of training for this course takes a look at a number of different topics while also providing labs for students to gain practical experience. The lessons and labs for this day of training relate to the following subjects: IR Procedure, IR Drafting, and IR Frameworks.
- Blocking Traffic
- Assess and Unplug
- System Configuration Changes and Supplemental Monitoring
- IR Documentation and Preservation
- Incident Report
- Implement Single System Changes
- Conduct Supplemental Monitoring
- Create Custom Snort Rules
- Install EMET and Edit Host Files
- Comprehensive Assessment
Day 3 of this course focuses on teaching students about a number of different topics while also providing them with labs for practical experience. The lessons and labs for day 3 of training relate to the following subjects: Business Unit Integration, Third Party Connection Mechanisms, Warm Site / Cold Site Configurations, and Data Preservation.
- Industry Best Practices
- Disaster Recovery and Business Continuity
- Cyber System Restoration
- Data Backup and Restoration Key Concepts
- Patches and Updates
On the fourth day of training for this official CSX Practitioner 3 course students will learn about several topics while also participate in labs to gain practical experience on the material covered. The lessons and labs for this day of training listed below relate to the following subjects: Network Access Control, Data Loss Prevention, Network Backup Procedures, and Encryption Controls.
- Backup Site Preparation and Utilization
- Data Management
- Actualizing Data Backups and Recovery
- Implementing Patches and Updates
- Data Backup and Recovery
On the final day of Intrinsec’s CSX Practitioner 3: Respond and Recover course, students review several topics while also participating in labs to reinforce the material covered. The lessons and labs that are listed below for this day of training relate to the following subjects: NIST Procedures, ISO Procedures, Team Input, and AAR Generation.
- Ensuring Data Integrity
- Deficiency and Error Reporting
- Post-Incident Review
- Reset and Prep for Future Events
- Temporary Control and Fix Review and Implementation
- Recovering Data and Data Integrity Checks