CSX Practitioner II: Detection Training

CSX Practitioner II: Detection Training educates individuals about the basic methods, concepts, and tools used to leverage cybersecurity controls and enhance their ability to detect system events and non-events incidents.

Category : ISACA

Course Price : $3995 Per Participant

Course Details

500+

Courses

20+

Years of Experience

95K+

Global Learners

Training Exclusives

  • Live instructor-led interactive sessions with Microsoft Certified Trainers (MCT).
  • Access to Microsoft Official Courseware (MOC).
  • Real-time Virtual Lab Environment.
  • Experience 24*7 Learner Support.
  • Self-paced learning and flexible schedules.

Course Description

CSX Practitioner II: Detection Training educates individuals about the basic methods, concepts, and tools used to leverage cybersecurity controls and enhance their ability to detect system events and non-events incidents.

This technical course inspects the detect domain and guides individuals to develop the skills to fulfill the purpose of a first responder, following existing procedures, and defined processes, and dealing with everyday issues on a single system.

CSX Practitioner II: Detection Training is the second step on the road to becoming a CSX expert. It aims to help professionals to identify unauthorized malicious activities before they damage the organization.

This training is more comprehensive and faster than any other traditional training, and you learn different techniques to improve yourself as a CSX practitioner.

CSX Practitioner II: Detection Training teaches you essential skills to detect potential security threats quickly. It makes you better at analyzing network output, analyzing attacks, escalating incidents, and detecting malware.

What you will learn

Prerequisites

Prior to attending this course, students should have knowledge of:

  • Management of Software in a Windows Server 2012
  • Deployment and management of applications virtually, and in the cloud.
  • IIS Administration.
  • How to Configure AD DS for use in authentication, authorization.
  • Application management remotely using Windows PowerShell 4.0.
  • Databases and server roles in SQL Server.
  • Application connection to SQL Server.
  • claims-based security implementation.
  • Microsoft Hyper-V virtual machines.

Who should attend this course?

Ideal Participants for This Course

The program is aimed at IT professionals seeking to broaden their expertise by learning to load, configure, deploy, and manage SharePoint 2016 on the cloud or data center.

Individuals with at least one year of working experience in planning and maintenance of SharePoint and nearly two years of hands-on experience in core tech such as Windows Server 2012 R2 or later, Microsoft SQL Server 2014 or later, networking infrastructure services, Internet Information Services (IIS), Active Directory Services (AD DS).

What You Receive at Probot Learning:

Global IT Certification

Customized Training Solutions

Expert Industry Trainers

Practical Learning Approach

Flexible Training Modes

Authorized Course Materials

Career-Enhancing Skills

PPP-Based Pricing Model

Workshops for Skill Gaps

Recognition and Growth

Learning Modules

Module 1) IDS Traffic Analysis vs. Packet Analysis

This module explains how to create web applications in SharePoint 2016 and how to configure these applications. It also explains how to create and configure site collections in SharePoint 2016 and SharePoint Online.

  • Creating web applications
  • Configuring web applications
  • Creating and configuring site collections

Lab: Creating and configuring web applications

  • Creating a web application
  • Configuring a web application

Lab: Creating and configuring site collections

  • Creating and configuring site collections
  • Creating a site collection in a new content database
  • Using Fast Site Collection Creation

After completing this module, students will be able to:

  • Create web applications.
  • Configure web applications.
  • Create and configure site collections.

This module describes the service application architecture in SharePoint 2016, and how to provision and manage service applications.

  • Introduction to the service application architecture
  • Creating and configuring service applications

Lab: Planning and configuring service applications

  • Provisioning a Managed Metadata Service application with Central Administration
  • Provisioning a Managed Metadata Service application with Windows PowerShell
  • Configuring the Word Automation Services service application for document conversion
  • Configuring service application proxy groups

After completing this module, students will be able to:

  • Explain the key components and topologies for a SharePoint 2016 service application architecture.
  • Plan for service accounts and service application dependencies.
  • Understand the purpose of mapping service applications to business requirements.
  • Describe how to provision and manage SharePoint 2016 service applications

This module explains how to configure authorization in SharePoint 2016. It also explains how to configure site collection security in SharePoint 2016.

  • Configuring authorization in SharePoint 2016
  • Managing access to content

Lab: Managing users and groups

  • Creating a web-application policy
  • Creating and managing SharePoint groups
  • Creating custom permission levels

Lab: Securing content in SharePoint sites

  • Managing permissions and inheritance
  • Managing site-collection security
  • Enabling anonymous access to a site

After completing this module, students will be able to:

  • Manage users and permissions in SharePoint 2016.
  • Manage access to content in SharePoint 2016.

This module explains about the SharePoint 2016 authentication infrastructure, and how to configure claims, providers, and identity federation for SharePoint 2016. It also explains how to configure server-to-server authentication for SharePoint 2016.

  • Overview of authentication
  • Configuring federated authentication
  • Configuring server-to-server authentication

Lab: Extend your SharePoint 2016 to support Secure Sockets Layer (SSL)

  • Configuring Microsoft SharePoint 2016 to use federated identities
  • Configuring Active Directory Federation Services (AD FS) to enable a web application a relying party
  • Configuring SharePoint to trust AD FS as an identity provider
  • Configuring a web application to use the AD FS identity provider

After completing this module, students will be able to:

  • Explain the authentication infrastructure of SharePoint 2016.
  • Configure claims providers and identity federation for SharePoint 2016.
  • Configure server-to-server authentication for SharePoint 2016.

This module explains how to secure a SharePoint 2016 deployment at the platform level, and how to configure farm-level security settings for a SharePoint 2016 deployment.

  • Securing the platform
  • Configuring farm-level security

Lab: Securing a SharePoint 2016 deployment

  • Configuring SharePoint Server communication security
  • Hardening a SharePoint server farm
  • Configuring blocked file types
  • Configuring Web Part security
  • Implementing security auditing

After completing this module, students will be able to:

  • Secure a SharePoint 2016 deployment at the platform level.
  • Configure farm-level security settings for a SharePoint 2016 deployment.

This module explains how to create and manage content types and content-type propagation. Additionally, it explains how to implement managed metadata in SharePoint web applications and site collections. It also explains how to configure the managed metadata service application in SharePoint 2016.

  • Managing content types
  • Understanding managed metadata
  • Configuring the managed metadata service

Lab: Configuring content-type propagation

  • Creating content types for propagation
  • Publishing content types across site collections

Lab: Configuring and using the managed metadata service

  • Configuring the managed metadata service
  • Creating term sets and terms
  • Consuming term sets

After completing this module, students will be able to:

  • Create and manage content types and content-type propagation.
  • Explain how to implement managed metadata in SharePoint web applications and site collections.
  • Configure the managed metadata service application in SharePoint 2016.
  • Network Traffic and Log Comparison
  • Log Qualification
  • Event Comparison
  • Threat Identification
  • Anti-Virus Deployment
  • Anti-Virus Utilization
  • Containment and Eradication
  • Traffic Analysis Threat Identification
  • Threat and Incident Component Evaluation
  • Traffic and Log Assessment and Analysis
  • Baseline Output Comparison
  • Packet Character Observation
  • Compromise Indicators
  • Traffic Analysis
  • Timeline Creation
  • Incident Report Generation
  • Incident Management Register Comparison
  • Incident Escalation Report Generation

What Exam Do I Need To Get Certified?

  • 312-50 CEH : EC-Council Certified Ethical Hacker
 

About the Certifications

CEH – Certified Ethical Hacker Certification empowers a person in a certain network security area of Ethical Hacking through a vendor-neutral perspective. This certification will strengthen the application knowledge of security officers, auditors, security professionals, site administrators and anybody who is apprehensive about the virtue of the network infrastructure. A CEH is an individual who is trained to understand and know how to locate for shortcomings and susceptibilities in target systems and utilizes the knowledge and tools for the same as a malicious hacker.

Certification Details

Step 1: Review the skills and knowledge required to certify.

Step 2: Recommended training for EC-Council Certified Ethical Hacker (CEH) Certification:

  • CEH – Certified Ethical Hacker v12

Step 3: Take this exam and get certified.

  • Exam 312-50 CEH

Who Should Attend?

Individual who wants to strengthen the application knowledge of security officers, auditors, security professionals, site administrators and anybody who is concerned about the uprightness of the network infrastructure.

Skills Measured

This CEH – Certified Ethical Hacker Certification is an entry level training certification course where professionals having basic idea about networking and familiarity with Linux OS can join this course.

Certification Latest Updates

This Certified Ethical Hacker Certification is valid for three years staring from the certification date. You must renew your certification before expiry date.

FAQs

What qualifications are needed to obtain this certification in ethical hacking?

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Talk to Learning Advisor