Login     Signup
   info@zetlantechnologies.com        +91-8680961847

  /   ISACA Certification   /   CSX-P Certification

Most Qualified Cybersecurity Professionals

The CSX-P Cybersecurity certification is retired, but maintenance is Avalable for existing holders



What makes CSX-P professionals unique?

CSX Cybersecurity Practitioner (CSX-P) holders have demonstrated a minimum competence across several security functions, proving they can actually perform a variety of cybersecurity tasks.





Who would benefit from hiring a CSX-P certification holder?


70%

TECHNOLOGY COMPANIES


65%

GOVERNMENTS AGENCIES


52%

FINANCIAL INSTITUTIONS


The CSX-P Difference

CSX-P was the first and only comprehensive performance certification testing one’s ability to perform globally validated cybersecurity skills. CSX-P required that candidates demonstrate critical cybersecurity skills in a live, proctored, virtual environment that assessed their analytical ability to identify assets and resolve network and host cybersecurity issues by applying the cybersecurity knowledge and skills required of an evolving cyber first responder.

With CSX-P you can be assured an individual’s ability to perform globally validated cybersecurity skills has been tested and affirmed—spanning five key security functions:



Identification of threats and vulnerabilities.


Protecting systems from outside threats.


Detection of threats and system vulnerabilities.


Response to and mitigation of cyber incidents



Recovery from incidents and disasters.





Course Details

1. Identify

  • Hardware Software Identification and Documentation
  • Preliminary Scanning
  • Additional Scanning Options
  • Sensitive Information Discovery
  • Sensitive Information Identification
  • Vulnerability Assessment Process

  • Specific Cyber Controls
  • System Hardening
  • Collecting Event Data
  • Firewall Setup and Configuration
  • Verifying the Effectiveness of Controls
  • Microsoft Baseline Security Analyzer
  • Monitoring Controls

  • Network Traffic Analysis
  • Malicious Activity Detection
  • Introduction and Execution of Malicious Activity
  • Analyze Malware
  • Baselines for Anomaly Detection

  • Defined Response Plan Execution
  • Incident Detection and Identification
  • Network Isolation
  • how to remove Trojan
  • Disable User Accounts
  • Block Incoming Traffic on Known Port
  • Blocking Traffic
  • Implement Single System Changes in Firewall

  • Disaster Recovery and BC Plans
  • Patches and Updates
  • Cyber System Restoration
  • Data Backup and Recovery
  • Data Backup and Restoration
  • Recovering Data and Data Integrity Checks
  • Actualizing Data Backups and Recovery


Fees Structure : 15500 INR / 185 USD
Total No of Class : 42 Video Class
Class Duration : 35:00 Working Hours
Download Feature : Download Avalable
Technical Support : Call / Whatsapp : +91 8680961847
Working Hours : Monday to Firday 9 AM to 6 PM
Payment Mode : Credit Card / Debit Card / NetBanking / Wallet (Gpay/Phonepay/Paytm/WhatsApp Pay)

Brochure       Buy Now       Sample Demo

Fees Structure : 30000 INR / 355 USD
Class Duration : 60 Days
Class Recording : Live Class Recording available
Class Time : Monday to Firday 1.5 hours per day / Weekend 3 Hours per day
Technical Support : Call / Whatsapp : +91 8680961847
Working Hours : Monday to Firday 9 AM to 6 PM
Payment Mode : Credit Card / Debit Card / NetBanking / Wallet (Gpay/Phonepay/Paytm/WhatsApp Pay)

Download Brochure       Pay Online