Presented by SKLABS | Aug. 28 – Sept. 01

Category: .
  • Description
  • Additional Information
  • Classroom Topics
  • Reviews (0)

Product Description

The CSX Practitioner designation is a globally-offered certification for cyber security professionals. This certification allows you to professionally serve as a first responder who is an expert at following established procedures, using defined processes, and working mostly with known problems on a single system

The first course in the CSX Practitioner series focuses on key cybersecurity skills and includes foundational, realworld instruction in the Identify and Protect domains. Topics range from preliminary network scanning to security control implementation. Through the completion of multiple lab-reinforced modules, students will learn how to apply industry-developed, experience-based methods to the identification of key networks and learn to develop appropriate protection mechanisms. The Identify domain teaches students to recognize, assess and remediate specific internal and external network threats. The Protect domain offers instruction in the basic concepts, methods, and tools associated with implementing cybersecurity controls to protect a system from the identified threats.

Course Learning Objectives

Provide students with an environment to discuss and practice methods implemented by cybersecurity professionals in the Identify and Protect domains. Ensure students develop into complimentary team members for enterprises who are workforce ready.

The CSX PRACTITIONER Series consists of three Courses:

1. Identification and Protection

2. Detection

3. Respond and Recover

Additional Information

Course Syllabus

» Classes consist of at least 50% hands-on lab exercise. » Lessons and lectures are comprised of up-to-date coursework and demonstrations. » Instruction includes introductory information regarding the Identify and Protect domains.




The Certified Instructor Eng. Adel Abdel moneim

Classroom Topics

Classroom-Based Instruction Topics (level 1)
» Network Reconnaissance
» Software / Hardware Scanning
» Asset Validation / Anomaly Assessment
» Network Mapping
» Introduction to Vulnerability Scanning
» Vulnerability Scanning Configuration
» Conducting a Vulnerability Scan
» Vulnerability Scan Evaluation
» Cybersecurity Control Introduction and Explanation
» Cybersecurity Control Evaluation and Configuration
» Threat Data Collection
» Threat Log Parsing and Maintenance
» Control Vulnerability Scanning and Assessment
» Control Monitoring and Assessment
» Control Change implementation
» Control Documentation Maintenance
» Patch Implementation and Dissemination


There are no reviews yet, would you like to submit yours?

Be the first to review “CYBERSECURITY NEXUS (CSX) "Level 1"”