Product Catalog

The training platform features a library of self-paced, virtual courses combining instructional lecture with hands-on lab work. Each course offers a focused, deep dive into a specialized area of cybersecurity and ranges in length from 2 to 16 hours. Courses are available at varying levels of complexity: Beginner, Practitioner, Advanced and Bridge to Security Management.

CSX Advanced Exploitation Course

Learn advanced tactics for penetration testing.

advanced

Detect

CSX Advanced Forensics Course

Learn advanced forensics techniques.

advanced

Respond

CSX Blockchain Basics Course

Learn how to practically apply blockchain basics.

advanced

Protect

CSX Cybersecurity Analyst Pathway

Learn to track and hunt cyber threats through cybersecurity forensics and threat hunting.

multilevel

All domains

CSX Cybersecurity Hands-On Basics Labs

Apply fundamental cybersecurity concepts in a live environment.

beginner

All domains

CSX Cybersecurity Specialist Pathway

Enhance your cybersecurity foundational skill set to prepare for a specialized career in cybersecurity.

multilevel

All domains

CSX Forensics Analysis Course

Learn basic forensics and documentation skills.

multilevel

Respond

CSX Immersion: The OWASP Top 10

Train and sharpen your skills related to the OWASP Top 10 web application security vulnerabilities.

multilevel

All domains

CSX Linux Application and Configuration

Learn Linux commands, create objects, and establish network connections.

beginner

Identify

CSX Network Application and Configuration

Establish and secure networks from scratch.

beginner

Protect

CSX Packet Analysis Course

Leverage packets to characterize networks, devices, and people.

beginner

Identify

CSX Penetration & Vulnerability Tester Pathway

Learn, test, and earn three of ISACA’s most prestigious certificates in less than 6 months.

multilevel

All domains

CSX Penetration Test Certificate Series Course and Exam Bundle

Members save over 40% compared to non-members buying unbundled.

multilevel

All domains

CSX Penetration Testing Overview

An hands-on introduction to penetration testing.

beginner

Detect

CSX Technical Foundations Certificate Package

Earn certificates in packet analysis, Linux, and network application. Includes 3 courses and 3 certificate exams.

beginner

All domains

CSX Technical Foundations Course Package

Contains three courses covering packet analysis, Linux, and network application. Certificate exams sold separately.

beginner

All domains

CSX Threat Hunting

Learn to identify threats before they impact your system.

advanced

Detect

CSX Vulnerability and Exploitation Course

Learn how to gain access and maintain access to a system.

intermediate

Detect

Additional Firewall Setup

Add rules to protect your specific network devices from potential threats.

intermediate

Protect

Chrome Extension Testing

Test Chrome extensions for security flaws.

intermediate

Detect

Cleaning Up After an Attack

Learn how to ensure no backdoors or additional compromises exist on a system after an attack.

intermediate

Recover

Cyber Hunt

Test your red team and blue team skills in this capture-the-flag style challenge.

intermediate

All domains

Data Leakage

Students will interact with a username and password leak from a web app.

intermediate

Identify

Generating and Analyzing Logs

Generate nefarious logs and use tools to analyze.

intermediate

Respond

Initializing Honeypots

Learn about honeypot implementation.

intermediate

Detect

Introduction to Forensics Recovery

Investigate a possible data breach in your company.

intermediate

Recover

Intrusion Detection System Implementation and Testing

Get familiar with Security Onion and its functions.

intermediate

Detect

Linux Baseline with Lynis

Conduct audits of Linux systems.

intermediate

Identify

Man-in-the-Middle Detection

Students taking this course will learn how to detect when a potential MitM attack is occurring.

intermediate

Detect

Mobile Forensics

Mobile forensics is similar to computer forensics but there are a few nuances to the task.

intermediate

Recover

Packet Construction and Kernel Hardening

Analyze a flood script built with Scapy

intermediate

Protect

Passive Computer Forensics

Identify critical data using passive computer forensic techniques.

intermediate

All domains

Script Construction and Execution

Gain an understanding of bash scripting and batch file execution.

intermediate

Identify

Spectre and Meltdown Mitigation

Learn how to spot and mitigate the Spectre and Meltdown.

intermediate

Detect

Testing Intrusion Detection Systems

This lab will teach students how to create Snort rules for web-based attacks and how to manage alerts in Sguil.

intermediate

Protect

Threat Detection

Implement typical network diagnostic tools to determine the type of issue an end user is having.

intermediate

Detect

Threat Identification and Detection

Students will experience a situation where a former employee poses a serious threat to the company network.

intermediate

Detect

Triaging Incidents

Categorize network security incidents.

intermediate

Respond

Updating Firewall Rules

In this course, students learn how to change firewall rules to block unacceptable traffic.

intermediate

Protect