CSX Cybersecurity Analyst Pathway

Learn to track and hunt cyber threats through cybersecurity forensics and threat hunting.

Difficulty: Multilevel CSF Domain: All domains

$1,239.00

Price represents the non member rate.

Buy Now
or pay later by invoice
Save 20% through 31 October 2019 at 11:59pm CDT/UTC-5.

Regular price is US$1299 for ISACA members and US$1549 for non-members.


CSX Cybersecurity Analyst Pathway


Career Objective: Information Security Analyst | Security Analyst | Cyber Security Analyst | IT Security Analyst | Senior Security Analyst

Average Salary: $85k            Job Openings: 26,000

What is a Cybersecurity Analyst?

Analysts prevent and defend against attacks by operating and maintaining databases, networks, hardware, firewalls and encryption. They are often responsible for identifying, investigating, analyzing, and securing network weaknesses and typically make recommendations for hardware and software upgrades.

Why CSX?

The CSX Cybersecurity Analyst training package provides training to develop the key skills required to perform in today’s fast-paced security operations centers. During course progression, you will enter a live training lab environment, with real threats and attacks borne from current cybersecurity incidents.

Included in the pathway are specific focuses in cybersecurity forensics, threat hunting, and several other key areas which prepares you for a position in which you will track and hunt cyber miscreants through the vast jungles of the internet.

  • A skills assessment will help you identify strengths, weaknesses and knowledge gaps, to focus your training.
  • Through CSX Forensics Analysis, learn how to deconstruct the scene of a cybercrime or incident to identify how the incident occurred, and better understand which threat actors may have perpetrated potential attacks.
  • Progress through a set of beginner, intermediate and advanced level labs, to practice your skills in navigation of the turbulent seas of cybersecurity operations.
  • Finally, in CSX Threat Hunting, learn how to protect systems from attacks before they ever occur and better hunt malicious threats.
  • Six-month access to train and test on your schedule, 24/7

Continuing Professional Education (CPE) Credit Count: 96

This training is recommended for individuals with a fundamental knowledge of cybersecurity including the skills covered in CSX Fundamentals, CSX Technical Foundations, and CSX Cybersecurity Practitioner.

This Package Includes:

COURSE LESSON INSTRUCTIONAL LAB
Introduction and Overview
Chain of Custody
Media and Memory Types
Forensics Environment
Kali Forensics Environment
PostgreSQL Configuration
Foreman Configuration
Final Foreman Setup
Imaging A New Case
Data Management My First Case
A Picture
Drives and Files Data DNA
The Missing Piece
FINAL CHALLENGE Forensics Challenge
LAB TITLE LEVEL
Data Integrity
Finding the Lost Web Server (Beginner)
Forensics 1: Imaging
HTTP Packet Analysis
Insider Threat Identification
Linux Baseline with Lynis
Network Scanning
Script Construction and Execution
Scripts with Nmap
Web Server Backup
Beginner
Beginner
Beginner
Beginner
Beginner
Beginner
Beginner
Beginner
Beginner
Beginner
Chrome Extension Testing
Data Leakage
Generating and Analyzing Logs
Hardening Windows
Initializing Honeypots
IOT Device Indicators
Meltdown Mitigation
Mobile Forensics
Securing IoT Devices via Firewall
Testing Intrusion Detection Systems
Threat Detection
Intermediate
Intermediate
Intermediate
Intermediate
Intermediate
Intermediate
Intermediate
Intermediate
Intermediate
Intermediate
Intermediate
Browser Attacks (Advanced)
Identifying Cryptojacking Processes
Investigating HTTP Request Methods
Malware Analysis (Advanced)
Protecting Against VPNFilter
Restoring Data with Secure Copy
SQL Injection
SQL Injection Challenge
Advanced
Advanced
Advanced
Advanced
Advanced
Advanced
Advanced
Advanced

COURSE LESSON INSTRUCTIONAL LAB
Introduction to Threat Hunting
Threat Hunting Methodology
The Threat Landscape
Exploitation and Threat Creation
Memory Forensics Memory Forensics
Network Forensics Network Forensics
Incident Response Detection and Threat Hunting Creating and Investigating Browser Attacks
Enterprise Threat Hunting Utilizing Zeek (Bro) for HTTP Threat Hunting
PowerShell Threat Hunting with PowerShell
Evasion Techniques Covert Communications Examination
FINAL CHALLENGE Threat Hunt Challenge 1
Threat Hunt Challenge 2

The CSX Cybersecurity Analyst training package hones skills in the five NIST domains of cybersecurity: Identify, Protect, Detect, Respond, and Recover.


Need training for a team? Contact us for group pricing.