Anda di halaman 1dari 7

CSX CYBERSECURITY NEXUS™

FUNDAMENTALS TRAINING
November 22-24, 2017 | ISACA Manila Professional Development Center
CSX CYBERSECURITY NEXUS™ FUNDAMENTALS TRAINING
The Cybersecurity Fundamentals Certificate is part of ISACA’s
Cybersecurity Nexus. CSX was created to provide guidance, career
development, education and community for cybersecurity professionals INTRODUCTORY PRICE
at every stage of their careers. CSX represents ISACA’s solid
commitment to help address the global need for skilled cybersecurity
professionals. Through CSX, ISACA commits to doing for cybersecurity
professionals what it has done, and will continue to do, for IT audit, ISACA MEMBERS NON MEMBERS
control and governance professionals over the last 45 years.

BUNDLE 1 - P25,000.00 BUNDLE 1 - P30,000.00


Training + Study Guide + Training + Study Guide +
COURSE OBJECTIVE
Exam Exam
CSX’s knowledge-based Cybersecurity Fundamentals Certificate from ISACA’s Cybersecurity
Nexus™ (CSX) can enable you to:
• Demonstrate your understanding of the principles that frame and define cyber security
• Set yourself apart and have your resume/CV rise to the top of recruiters’ stacks 5% Discount to a group of 3 or more
• Start your cyber security career strong

The Cybersecurity Fundamentals Certificate affirms your knowledge of cyber security’s key
concepts, standards, guidelines and practices and the role of the cyber security professional.

TARGET AUDIENCE
Ideal for practitioners in any field of information systems impacted by the ever-increasing
threats to global cyber security and their roles, the certificate is particularly relevant and
valuable to:
• Individuals looking for a career change to this increasingly in-demand field
• Recent college/university graduates
• Others just starting out in cyber security
CSX CYBERSECURITY NEXUS™ FUNDAMENTALS TRAINING
COURSE OUTLINE
Domain 1: Cyber Security Concepts
Cyber Security Concepts is the first domain covered in this official CSX Fundamentals Domain 3: Security of Networks, Systems, Applications and Data
training program. The various areas or topics students spend time on can be found below: This is the third domain covered in this course, and it’s called Security of Networks, Systems,
Applications, and Data. Students can expect to review the following topics:
CSX Fundamentals Domain 1 Lessons
• Cyber security principles used to manage risks related to the use, processing, storage and CSX Fundamentals Domain 3 Lessons
transmission of information or data. • Vulnerability Assessment Tools and their Capabilities
• Security Management • Basic System Administration, Network and Operating System Hardening Techniques
• Risk Management Processes, including steps and methods for assessing risk. • Risk Associated with Virtualizations
• Threat Actors • Penetration Testing
• Cyber Security Roles • Network Systems Management Principles, Modules, Methods and Tools
• Common Adversary Tactics, Techniques, and Procedures (TTPs) • Remote Access Technology
• Relevant Laws, Policies, Procedures and Governance Requirements. • Unix Command Line
• Cyber Security Controls • System and Application Security Threats and Vulnerabilities
• System Life Cycle Management Principles, including software security and usability
• Local Specialized System Requirements for Safety, Performance, and Reliability.
Domain 2: Cyber Security Architecture Principles • System and Application Security Threats and Vulnerabilities
Domain 2 focuses on Cyber Security Architecture Principles, and students will learn about • Social Dynamics of Computer Attackers in a Global Context
the following topics: • Secure Configuration Management Techniques
• Capabilities and Applications of Network Equipment including Hubs, Routers, Switches,
CSX Fundamentals Domain 2 Lessons Bridges, Servers, Transmission Media and Related Hardware.
• Network Design Processes, to include an understanding of security objectives, • Communication Methods, Principles, and Concepts that Support the Network
operational objectives, and trade-offs. Infrastructure
• Security System Design Methods, Tools and Techniques. • Common Networking Protocols and Services and how they Interact to Provide Network
• Network Access, Identity and Access Management Communications.
• Information Technology (IT) Security Principles and Methods • Different Types of Network Communication
• Network Security Architecture Concepts, including topology, protocols, components, and • Virtualization Technologies and Virtual Machine Development and Maintenance
principles • Application Security
• Malware Analysis Concepts and Methodology • Risk Threat Assessment
• Intrusion detection methodologies and techniques for detecting host and network-based
intrusions via intrusion detection technologies
• Defense in Depth Principles and Network Security Architecture
• Encryption Algorithms
• Cryptography
• Encryption Methodologies
• The process of traffic flows across the network (e.g. transmission and encapsulation)
• Network Protocols, Dynamic Host Configuration Protocol, and Directory Services
CSX CYBERSECURITY NEXUS™ FUNDAMENTALS TRAINING
COURSE OUTLINE
Domain 4: Incident Response
Incident Response is the fourth domain reviewed in this course and it focuses on the
following areas:

CSX Fundamentals Domain 4 Lessons The following features and resources may included with all
• Incident Categories and Response course registrations. (Study Guide & Exam are optional)
• Business Continuity/Disaster Recovery
• Incident Response and Handling Methodologies
• Security Event Correlation Tools
• Processes for Seizing and Preserving Digital Evidence
• Types of Digital Forensics Data
• Basic Concepts and Practices of Processing Digital Forensics Data
• Anti-Forensics Tactics, Techniques, and Procedures (TTPS)
• Common Forensic Tool Configuration and Support Applications CSX
• Network Traffic Analysis Methods
• Which System Files Contain Relevant Information and Where to Find Those System Files

Domain 5: Security Implications and Adoption of Evolving Technology Three days of


Security Implications and Adoption of Evolving Technology is the fifth and final domain Official ISACA
covered in this official CSX Fundamentals training program. It’s in this domain where Official CSX
Training from Official CSX
students can expect to learn about the following topics: Cybersecurity Inclusive of the
an authorized Cybersecurity
Fundamentals Exam
CSX Fundamentals Domain 5 Lessons CSX Study Guide
• Emerging Technology and Associated Security Issues, Risks and Vulnerabilities Courseware
Fundamentals
• Risk Associated with Mobile Computing
• Cloud Concepts Around Data and Collaboration
Instructor
• Risk of Moving Applications and Infrastructure to the Cloud
• Risk Associated with Outsourcing
• Supply Chain Risk Management Processes and Practices

CSX CYBERSECURITY NEXUS™ FUNDAMENTALS TRAINING


TERMS AND CONDITIONS | Registration and Payments

• Registration is on FIRST-COME, FIRST-SERVED basis.


• Check payments should be made payable to ISACA MANILA CHAPTER. Post-Dated checks will not be accepted.
• A participant is considered registered once the confirmation of registration has been sent to your registered email address. The terms for Cancellations, Refunds and Transfers shall automatically apply.
• Registration Fee covers the following: Study Guide, Examination Fee, Courseware (Hardcopy), Certificate of Attendance, Meals (AM & PM snacks, and Lunch).
• Please course your Registration, Payment & Other Inquiries to ISACA Manila Chapter (c/o Apple Bernardez or Buboy Barasona) at Unit 2109 Cityland10 Tower 2 #154 H.V. Dela Costa St., Makati City,
Philippines 1227; Telefax: (+63) 2 894-2533
• Email address: secretariat@isaca-manila.org or staff@isaca-manila.org

Cancellations, Refunds and Transfers


All Cancellations after the registration is received should be made in writing. Cancellation fees and refund will be applied as follow:
CSX

For online payment, the amount that will be refunded includes a minimal transaction processing charge. To initiate a refund, please contact ISACA Manila and mention the order number indicated in your
order confirmation email.

A member registrant can be replaced by another member. In case a member registrant is replaced by a non-member, the registration fee for non-members shall be applied and the new registrant will pay
the difference in the registration fee.

A non-member registrant can be replaced by a non-member in which the same rate applies. In case a non-member is replaced by a member, the excess registration fee paid will be refunded. The registrant
should request for the refund by contacting ISACA Manila.

The replacement registrant should register to the event (manual or online).

Cancellation of the Event If Organizer cancels the Event due to circumstances beyond the reasonable control (such as acts of God, acts of war, governmental emergency, labor strike or unavailability of the
Exhibit Facility). Organizer reserves the right to cancel, re-name or relocate the Event or change the dates on which it is held. The participant and sponsors are not entitled for a refund provided that the
organizer were able to relocate or reschedule the event.

"No-shows“ will be fully charged.

CSX CYBERSECURITY NEXUS™ FUNDAMENTALS TRAINING


6

CSX CYBERSECURITY NEXUS™ FUNDAMENTALS TRAINING


REGISTRATION FORM
Company Name: _______________________________________________________________________________________________________________________
Company Address: _______________________________________________________________________________________________________________________
Contact Person: _______________________________________________________________________________________________________________________
Contact No.: ___________________________________ Email: __________________________________________________
Payment For Company Payment
(please check one) Personal Company
______________________
Authorized Signatory/HR Officer
TO: SECRETARIAT (Signature over printed name)
FAX NO.: (+63) 2 894.2533
Please register the following delegates from our company:
Name Position/Designation ISACA Membership Rates Contact No. Email Address
No.
1.
2.
3.

Remarks (Special Arrangement—Physical Disabilities, Food Restrictions, etc.)


__________________________________________________________________________________________________________________________

I agree to pay the total amount due above for my registration. I have read, accept and agree to abide by all the terms and conditions stated on this document.

________________________
Signature over printed name
7

Privacy Notice & Consent

PRIVACY NOTICE
We are committed to respecting your privacy and we recognize the importance of protecting the information collected about you. All of the personal information that you
have submitted during the registration shall only be processed in relation to your attendance to this event (i.e., processing of payments, issuance of certificate and sending
of any announcements).

All the information that you have provided in relation to this event shall be protected with reasonable and appropriate measures, and shall only be retained as long as
necessary in its processing.

If you wish to be opted out from the processing of your information, please do let us know by sending an email to secretariat@isaca-manila.org.

I have read, accept and agree to the privacy policy of ISACA Manila Chapter.

________________________
Signature over printed name

Anda mungkin juga menyukai