CSX Cybersecurity Specialist Pathway

Enhance your cybersecurity foundational skill set to prepare for a specialized career in cybersecurity.

Difficulty: Multilevel CSF Domain: All domains

$1,549.00

Price represents the non member rate.

Buy Now
or pay later by invoice

CSX Cybersecurity Specialist Pathway


Career Objective: Information Security Specialist | IT Specialist Information Security | Cyber Security Specialist | Information Technology Specialist | IT Security Specialist

The CSX Cybersecurity Specialist training package provides specific training which focuses on developing cybersecurity threat-hunting skills. Throughout the program, you will learn to identify attacks as they occur and hunt potential threats, in order to stop them before they impact organizational systems. Upon completion of each lab, detailed feedback is provided on strengths and weaknesses so you know where to focus your efforts to practice areas of strength and develop areas where you may not have experience.

The final objective in this training is to complete a live challenge in the CSX Cyber Hunt, an advanced, capture-the-flag cybersecurity challenge which takes place in a real environment where you work to put your red and blue team skills to the test.

  • Skills assessment will help you identify strengths, weaknesses and knowledge gaps, to focus your training.
  • Content training is enhanced when you enter a curated selection of beginner, intermediate and advanced labs that help you develop and practice skills and concepts that have been presented.
  • Learn about and then perform general cybersecurity tasks, like threat hunting and enhance applicability in the field of cybersecurity.
  • Six-month access to train and test on your schedule, 24/7

Continuing Professional Education (CPE) Credit Count: 86

This training is recommended for individuals with a fundamental knowledge of cybersecurity including the skills covered in CSX Fundamentals, CSX Technical Foundations, and CSX Cybersecurity Practitioner.

This Package Includes:


COURSE LESSON INSTRUCTIONAL LAB
Introduction to Threat Hunting
Threat Hunting Methodology
The Threat Landscape
Exploitation and Threat Creation
Memory Forensics Memory Forensics
Network Forensics Network Forensics
Incident Response Detection and Threat Hunting Creating and Investigating Browser Attacks
Enterprise Threat Hunting Utilizing Zeek (Bro) for HTTP Threat Hunting
PowerShell Threat Hunting with PowerShell
Evasion Techniques Covert Communications Examination
FINAL CHALLENGE Threat Hunt Challenge 1
Threat Hunt Challenge 2
LAB TITLE LEVEL
Data Integrity
Finding the Lost Web Server (Beginner)
HTTP Packet Analysis
Insider Threat Identification
Intrusion Detection System Implementation and Testing
Linux Baseline with Lynis
Network Scanning
Script Construction and Execution
Scripts with Nmap
System Baselining
Beginner
Beginner
Beginner
Beginner
Beginner
Beginner
Beginner
Beginner
Beginner
Beginner
Chrome Extension Testing
Data Leakage
Hardening Windows
Initializing Honeypots
Man-in-the-Middle Detection
Securing IoT Devices via Firewall
Testing Intrusion Detection Systems
Threat Detection
Triaging Incidents
Updating Firewall Rules
Intermediate
Intermediate
Intermediate
Intermediate
Intermediate
Intermediate
Intermediate
Intermediate
Intermediate
Intermediate
Applying Snort Rules and Classifying Processes
Browser Attacks (Advanced)
DDoS Detection
Harvesting DNS and Focusing Web Searches
Identifying Cryptojacking Processes
Malware Analysis (Advanced)
Managing Windows Firewall via Powershell/MMC
Protecting Against VPNFilter
Scheduled Scripts on Windows
Session Hijacking
Advanced
Advanced
Advanced
Advanced
Advanced
Advanced
Advanced
Advanced
Advanced
Advanced

Go beyond typical lecture-style training and put your cybersecurity skills to the test in a capture-the-flag challenge where you compete in a live, real-world environment scored by the system.

Participants will leverage capabilities from all cybersecurity domains and gain skills in network scanning, vulnerability identification, system hardening, system exploitation, exploitation response, and more.
Successful Cyber Hunters will demonstrate their abilities to:

  • Identify remote vulnerabilities.
  • Exploit remote vulnerabilities.
  • Navigate the Linux OS.
  • Conduct privilege escalation.
  • Basic python programming skills.
  • Packet analysis.
  • Forensics.
  • Network scanning.
  • Web application security testing.
  • And much more!

The CSX Cybersecurity Specialist training package hones skills in the five NIST domains of cybersecurity: Identify, Protect, Detect, Respond, and Recover.


Need training for a team? Contact us for group pricing.