Regular price is US$1299 for ISACA members and US$1549 for non-members.
Career Objective: Information Security Specialist | IT Specialist Information Security | Cyber Security Specialist | Information Technology Specialist | IT Security Specialist
Average Salary: $75k Job Openings: 7,800
Specialists operate and maintain computer information systems to keep them secure. They determine who requires access to which information, and then plan, coordinate and implement information security programs. Specialists also protect and defend against cyber threats.
The CSX Cybersecurity Specialist training package provides specific training which focuses on developing cybersecurity threat-hunting skills. Throughout the program, you will learn to identify attacks as they occur and hunt potential threats, in order to stop them before they impact organizational systems. Upon completion of each lab, detailed feedback is provided on strengths and weaknesses so you know where to focus your efforts to practice areas of strength and develop areas where you may not have experience.
The final objective in this training is to complete a live challenge in the CSX Cyber Hunt, an advanced, capture-the-flag cybersecurity challenge which takes place in a real environment where you work to put your red and blue team skills to the test.
Continuing Professional Education (CPE) Credit Count: 86
This training is recommended for individuals with a fundamental knowledge of cybersecurity including the skills covered in CSX Fundamentals, CSX Technical Foundations, and CSX Cybersecurity Practitioner.
|COURSE LESSON||INSTRUCTIONAL LAB|
|Introduction to Threat Hunting Threat Hunting Methodology The Threat Landscape||Exploitation and Threat Creation|
|Memory Forensics||Memory Forensics|
|Network Forensics||Network Forensics|
|Incident Response Detection and Threat Hunting||Creating and Investigating Browser Attacks|
|Enterprise Threat Hunting||Utilizing Zeek (Bro) for HTTP Threat Hunting|
|PowerShell||Threat Hunting with PowerShell|
|Evasion Techniques||Covert Communications Examination|
|FINAL CHALLENGE||Threat Hunt Challenge 1 Threat Hunt Challenge 2|
|Data Integrity Finding the Lost Web Server (Beginner) HTTP Packet Analysis Insider Threat Identification Intrusion Detection System Implementation and Testing Linux Baseline with Lynis Network Scanning Script Construction and Execution Scripts with Nmap System Baselining||Beginner Beginner Beginner Beginner Beginner Beginner Beginner Beginner Beginner Beginner|
|Chrome Extension Testing Data Leakage Hardening Windows Initializing Honeypots Man-in-the-Middle Detection Securing IoT Devices via Firewall Testing Intrusion Detection Systems Threat Detection Triaging Incidents Updating Firewall Rules||Intermediate Intermediate Intermediate Intermediate Intermediate Intermediate Intermediate Intermediate Intermediate Intermediate|
|Applying Snort Rules and Classifying Processes Browser Attacks (Advanced) DDoS Detection Harvesting DNS and Focusing Web Searches Identifying Cryptojacking Processes Malware Analysis (Advanced) Managing Windows Firewall via Powershell/MMC Protecting Against VPNFilter Scheduled Scripts on Windows Session Hijacking||Advanced Advanced Advanced Advanced Advanced Advanced Advanced Advanced Advanced Advanced|
Go beyond typical lecture-style training and put your cybersecurity skills to the test in a capture-the-flag challenge where you compete in a live, real-world environment scored by the system.
Participants will leverage capabilities from all cybersecurity domains and gain skills in network scanning, vulnerability identification, system hardening, system exploitation, exploitation response, and more.
Successful Cyber Hunters will demonstrate their abilities to:
The CSX Cybersecurity Specialist training package hones skills in the five NIST domains of cybersecurity: Identify, Protect, Detect, Respond, and Recover.