Skip to main content (Press Enter).
Sign in
Skip auxiliary navigation (Press Enter).
ISACA.org
Certifications
Online Forums
Volunteering
My ISACA
Join ISACA
Skip main navigation (Press Enter).
Toggle navigation
Home
About Our Chapter
About
Member Benefits
One In Tech Foundation
Jobs
Calendar of Events
Our Chapter Events
Search Events For All Communities
My Registrations
Contact Us
Calendar of Events
Event Description
Pre-Conference CSX Training Workshop
Starts:
Sep 9, 2019 08:30 (CT)
Ends:
Sep 10, 2019 17:00 (CT)
Associated with
Regina Chapter
Class Information
This is a two-day class. Classes will run from 8:30am – 5:00pm each day.
Target Audience
0 to 3 years cybersecurity experience. Audit, risk, compliance, information security, governance and legal professionals with a familiarity of basic IT/IS concept, who are either new to cybersecurity, interested in entering the field of cybersecurity, and/or who are interested in the ISACA Cybersecurity Fundamentals Certificate.
Overview
Cybersecurity is a growing and rapidly changing field, and it is crucial that the central concepts that frame and define this increasingly pervasive field are understood by professionals who are involved and concerned with the security implications of Information Technologies (IT). The CSX Fundamental Course is designed for this purpose, as well as to provide insight into the importance of cybersecurity, and the integral role of cybersecurity professionals. Designed as a foundational course, it will also prepare learners for the CSX Cybersecurity Fundamentals Exam. Attendance at this Course will not guarantee passage of any ISACA offered certification.
Topics Covered
CSX Fundamentals Domain 1 Cyber Security Concepts Lessons
Cyber security principles used to manage risks related to the use, processing, storage and transmission of information or data.
Security Management
Risk Management Processes, including steps and methods for assessing risk.
Threat Actors
Cyber Security Roles
Common Adversary Tactics, Techniques, and Procedures (TTPs)
Relevant Laws, Policies, Procedures and Governance Requirements.
Cyber Security Controls
CSX Fundamentals Domain 2 Security Implications and Adoption of Evolving Technology Lessons
Network Design Processes, to include an understanding of security objectives, operational objectives, and trade-offs.
Security System Design Methods, Tools and Techniques.
Network Access, Identity and Access Management
Information Technology (IT) Security Principles and Methods
Network Security Architecture Concepts, including topology, protocols, components, and principles
Malware Analysis Concepts and Methodology
Intrusion detection methodologies and techniques for detecting host and network-based intrusions via intrusion detection technologies
Defense in Depth Principles and Network Security Architecture
Encryption Algorithms
Cryptography
Encryption Methodologies
The process of traffic flows across the network (e.g. transmission and encapsulation)
Network Protocols, Dynamic Host Configuration Protocol, and Directory Services
CSX Fundamentals Domain 3 Security of Networks, Systems, Applications and Data Lessons
Vulnerability Assessment Tools and their Capabilities
Basic System Administration, Network and Operating System Hardening Techniques
Risk Associated with Virtualizations
Penetration Testing
Network Systems Management Principles, Modules, Methods and Tools
Remote Access Technology
Unix Command Line
System and Application Security Threats and Vulnerabilities
System Life Cycle Management Principles, including software security and usability
Local Specialized System Requirements for Safety, Performance, and Reliability.
System and Application Security Threats and Vulnerabilities
Social Dynamics of Computer Attackers in a Global Context
Secure Configuration Management Techniques
Capabilities and Applications of Network Equipment including Hubs, Routers, Switches, Bridges, Servers, Transmission Media and Related Hardware.
Communication Methods, Principles, and Concepts that Support the Network Infrastructure
Common Networking Protocols and Services and how they Interact to Provide Network Communications.
Different Types of Network Communication
Virtualization Technologies and Virtual Machine Development and Maintenance • Application Security
Risk Threat Assessment
CSX Fundamentals Domain 4 Incident Response Lessons
Incident Categories and Response
Business Continuity/Disaster Recovery
Incident Response and Handling Methodologies
Security Event Correlation Tools • Processes for Seizing and Preserving Digital Evidence
Types of Digital Forensics Data
Basic Concepts and Practices of Processing Digital Forensics Data
Anti-Forensics Tactics, Techniques, and Procedures (TTPS)
Common Forensic Tool Configuration and Support Applications
Network Traffic Analysis Methods
Which System Files Contain Relevant Information and Where to Find Those System Files
CSX Fundamentals Domain 5: Security Implications and Adoption of Evolving Technology Lessons
Emerging Technology and Associated Security Issues, Risks and Vulnerabilities
Risk Associated with Mobile Computing
Cloud Concepts Around Data and Collaboration
Risk of Moving Applications and Infrastructure to the Cloud
Risk Associated with Outsourcing
Supply Chain Risk Management Processes and Practices
Extra Material: Cybersecurity Framework
Discuss the NIST Cybersecurity Framework
Delve into the 5 main categories
Discuss how it could be used to assess an organizations Cybersecurity maturity
Conduct a sample assessment
Location
Queensbury Convention Centre
1700 Elphinstone St
Regina, SK S4P 2Z6
Download to Your Calendar
Contact
Cliff Janzen
isacaregina@gmail.com
Copyright 2023 ISACA. All rights reserved.
ISACA COMMUNITIES CODE OF CONDUCT
CHAPTER PRIVACY POLICY
Powered by Higher Logic