CSX Practitioner Boot Camp is a 5-day, immersive cyber security training course designed to help you build your technical skillset through true hands-on learning. Our Boot Camp is conducted in a live, lab-based network environment – not a simulated environment like other courses. You’ll go through complex cyber security scenarios based on recent, real-world scenarios and be given live incidents to detect and mitigate. You won’t find this level of hands-on experience anywhere else.
Our intensive Boot Camp will help you learn critical cyber security concepts and practice applying up-to-date, industry leading methods. Build more advanced technical cyber security skills in only one week.
Use the Same Tools and Scenarios You’ll Encounter Working in the Real World.
CSX Practitioner Boot Camp features practical, up-to-date instruction and practice using the latest open-source tools, within real-world scenarios. Go back to your job with new knowledge and skills you can put to work day one.
Live lab environment that tell you how to effectively respond to actual live cyber incidents, in line with NIST, ISO and ISA guidelines. And you’ll be able to confidently speak to the unique aspects of network attacks and compromises
The Boot Camp includes a complimentary, 6-month subscription to CSX Practitioner Practice Labs to enable you to practice building and honing your skills with 24/7 access to the same live cyber lab environment used in the course.
CSX Practitioner Boot Camp helps you develop and build the technical cyber security skills necessary to sit for the CSX Practitioner certification exam. Becoming a Certified Cyber Security Practitioner is a testament to your real-life skills and shows employers that you have both the knowledge and the technical ability to walk into an organization and do the job from day one.
Each day in this immersive training covers complex technical skills and concepts in one of five areas aligned to existing global cyber security frameworks:
Identify: Identification, assessment and evaluation of assets, threats and vulnerabilities in both internal and external networks
Protect: Implementation of cyber security controls to protect a system from identified threats
Detect: Detection of network and system incidents, events and compromise indicators, along with assessment of potential damage
Respond: Execution of comprehensive incident response plans and mitigation of cyber incidents
Recover: Recovery from incidents and disasters, including post incident-response documentation and implementation of continuity plans
Each lesson covered in the course is matched with practice labs and tools
*Locations are subject to availability.
Hundreds of employers — have maximized their talent with us.