需要保持您的CSX-P认证?
获得CSX-P认证意味着什么?
CSX-P candidates were assessed on their ability to perform cybersecurity tasks. 4小时的考试不包括多项选择题和模拟题. Candidates had to complete tasks of varying durations with minimal instruction while navigating between multiple virtual machines and were expected to demonstrate a variety of skills and working knowledge. 一次认证, CSX-P certification holders maintain the certification by earning and reporting CPE credits and paying an annual maintenance fee.
通过全面的培训提高你的网络安全技能
ISACA提供各种网络安全资源,包括小组培训, 各种语言的自学培训和学习资源. We also have our online Engage community where you can connect with peers for cybersecurity discussions. 选择适合你的时间表和学习需要的方法.
ISACA网络安全:渗透测试在线课程
The ISACA网络安全:渗透测试在线课程 provides students with an introductory understanding of penetration testing and ethical hacking. Penetration testing involves using defined methods to breach a system in order to determine if a system is vulnerable to attack and exploitation of valuable information. Ethical hackers expose vulnerabilities and determine whether unauthorized or malicious activity is possible and to what extent it could cause harm. 根据需要访问您的在线课程和基于性能的实验室,全天候. 完成后,您将获得10个CPE.
ISACA网络安全:漏洞,识别 & 分析在线课程
识别漏洞对于保持网络安全至关重要. ISACA网络安全:漏洞,识别 & 分析在线课程 teaches students how to conduct a thorough vulnerability analysis. Students will learn how to conduct open-source research to gather information on vulnerabilities and exploits. That research will help determine what to prioritize when addressing vulnerabilities in a system. 根据需要访问您的在线课程和基于性能的实验室,全天候. 完成后,您将获得10个CPE.
ISACA网络安全:数字取证在线课程
The ISACA网络安全:数字取证在线课程 provides learners with a deep understanding of the principles and best practices of digital forensics. 在整个课程中, 学习者将逐步完成进行完整调查的过程. You’ll explore the legal and ethical considerations of digital forensics including the chain of custody. You’ll also gain practical experience through a series of real-world simulations and exercises taught through our performance-based training. 根据需要访问您的在线课程和基于性能的实验室,全天候. 完成后,您将获得12个CPE.
ISACA网络安全:威胁狩猎在线课程
The ISACA网络安全:威胁狩猎在线课程 guides learners through the different phases of a threat hunt. 在整个课程中 you’ll learn about the different types of cyber threats, 如何进行主动的威胁搜寻, 以及如何调查/应对潜在事件. Through skills-based labs you’ll learn about the various tools and technologies used in threat hunting as well as how to use them effectively. 根据需要访问您的在线课程和基于性能的实验室,全天候. 完成后,您将获得12个CPE.
网络安全基础在线复习课程
Prepare for real-world situations with this interactive, self-guided course created by experts. A blend of knowledge and hands-on 应用程序 provides a truly unique and dynamic learning experience that builds and reinforces the critical skills required to perform many of the technical tasks that the IT work environment demands. 根据需要访问您的学习材料和基于性能的实验室,全天候. 你将获得9分.完成后的CPE.
网络安全审计证书在线课程
理想的任何人谁更喜欢在线, 以他或她自己的节奏和方便进行自主学习, the 网络安全审计证书 online course is delivered via the ISACA Learning Management System (LMS), and offers 24/7 access from any location with a computer and a high-speed Internet connection. It also includes online pre- and post-assessments to help you determine your current knowledge level, 告知你的学习计划并确定需要改进的地方. 完成后,您将获得10个CPE.
CSX-P candidates were assessed on their ability to perform a variety of cybersecurity tasks.
CSX-P candidates demonstrated a minimum competence across five security functions – identify, 保护, 检测, 回应, 恢复.4小时的考试不包括多项选择题和模拟题. Candidates had to complete tasks of varying durations with minimal instruction while navigating between multiple virtual machines.
CSX-P候选人表现出以下能力:
- Use vulnerability assessment processes and scanning tool sets to identify and document vulnerabilities based on defined asset criticality and technical impacts.
- 从多个来源获取和汇总信息,例如:日志, 事件数据, 网络评估——用于威胁情报, 度量事件检测, 和响应.
- 为网络实施指定的网络安全控制, 应用程序, 端点, 服务器, and more – and validate that controls are operating as required by defined policy or procedure.
- Implement and document changes to cybersecurity controls – for example: 端点 security and network security — in compliance with change management procedures.
- 识别异常活动和潜在的内部, 外部, and third-party threats to network resources using network traffic monitors or intrusion 检测ion and prevention systems, 以及确保及时发现妥协指标.
- 进行初始攻击分析,确定攻击向量, 目标、范围和潜在影响.
- 执行已定义的响应计划,以控制受影响资产的损失.