Regular price is US$1299 for ISACA members and US$1549 for non-members.
Career Objective: Information Security Analyst | Security Analyst | Cyber Security Analyst | IT Security Analyst | Senior Security Analyst
Average Salary: $85k Job Openings: 26,000
Analysts prevent and defend against attacks by operating and maintaining databases, networks, hardware, firewalls and encryption. They are often responsible for identifying, investigating, analyzing, and securing network weaknesses and typically make recommendations for hardware and software upgrades.
The CSX Cybersecurity Analyst training package provides training to develop the key skills required to perform in today’s fast-paced security operations centers. During course progression, you will enter a live training lab environment, with real threats and attacks borne from current cybersecurity incidents.
Included in the pathway are specific focuses in cybersecurity forensics, threat hunting, and several other key areas which prepares you for a position in which you will track and hunt cyber miscreants through the vast jungles of the internet.
Continuing Professional Education (CPE) Credit Count: 96
This training is recommended for individuals with a fundamental knowledge of cybersecurity including the skills covered in CSX Fundamentals, CSX Technical Foundations, and CSX Cybersecurity Practitioner.
|COURSE LESSON||INSTRUCTIONAL LAB|
|Introduction and Overview Chain of Custody Media and Memory Types Forensics Environment||Kali Forensics Environment PostgreSQL Configuration Foreman Configuration Final Foreman Setup|
|Imaging||A New Case|
|Data Management||My First Case A Picture|
|Drives and Files||Data DNA The Missing Piece|
|FINAL CHALLENGE||Forensics Challenge|
|Data Integrity Finding the Lost Web Server (Beginner) Forensics 1: Imaging HTTP Packet Analysis Insider Threat Identification Linux Baseline with Lynis Network Scanning Script Construction and Execution Scripts with Nmap Web Server Backup||Beginner Beginner Beginner Beginner Beginner Beginner Beginner Beginner Beginner Beginner|
|Chrome Extension Testing Data Leakage Generating and Analyzing Logs Hardening Windows Initializing Honeypots IOT Device Indicators Meltdown Mitigation Mobile Forensics Securing IoT Devices via Firewall Testing Intrusion Detection Systems Threat Detection||Intermediate Intermediate Intermediate Intermediate Intermediate Intermediate Intermediate Intermediate Intermediate Intermediate Intermediate|
|Browser Attacks (Advanced) Identifying Cryptojacking Processes Investigating HTTP Request Methods Malware Analysis (Advanced) Protecting Against VPNFilter Restoring Data with Secure Copy SQL Injection SQL Injection Challenge||Advanced Advanced Advanced Advanced Advanced Advanced Advanced Advanced|
|COURSE LESSON||INSTRUCTIONAL LAB|
|Introduction to Threat Hunting Threat Hunting Methodology The Threat Landscape||Exploitation and Threat Creation|
|Memory Forensics||Memory Forensics|
|Network Forensics||Network Forensics|
|Incident Response Detection and Threat Hunting||Creating and Investigating Browser Attacks|
|Enterprise Threat Hunting||Utilizing Zeek (Bro) for HTTP Threat Hunting|
|PowerShell||Threat Hunting with PowerShell|
|Evasion Techniques||Covert Communications Examination|
|FINAL CHALLENGE||Threat Hunt Challenge 1 Threat Hunt Challenge 2|
The CSX Cybersecurity Analyst training package hones skills in the five NIST domains of cybersecurity: Identify, Protect, Detect, Respond, and Recover.