CYBERSECURITY NEXUS (CSX) TRAINING PLATFORM
Schedule a demo to see how the CSX Training Platform can help you build the right team with the right skills to protect and defend your organization against cyberattacks.
Already a Customer?
Click the link below to login and access your labs and courses on the CSX Training Platform.
IN CYBERSECURITY, THERE’S NO SUBSTITUTE FOR REAL-WORLD EXPERIENCE.
That’s why we created the Cybersecurity Nexus™ (CSX) Training Platform, the first on-demand, real-world training solution that builds real technical skills to help your staff combat real threats.
Integrated Learning in an On-Demand, Self-Paced Environment
Always on and continually updated, the Cybersecurity Nexus™ (CSX) Training Platform helps your employees build critical technical cybersecurity skills through hands-on, skills-based training. In addition, our skills assessment component enables you to verify the technical competency of both existing employees and prospective new hires.
Hands-On, Practical Training in a Live and Dynamic Network Environment
Employees go through complex cybersecurity scenarios based on recent, real-world scenarios and are given live incidents to detect and mitigate.
Every Experience is Skills-Based
Our training platform is the first to offer skills-based evaluation and scoring of every effort. Users are assessed in real time and receive their success metrics and continuing professional education credits at the end of each lab and course.
Keep Track of Individual Employee and Team Level Performance and Progress with an Administrator Dashboard
Keep track of each employee’s progress and results for each course and lab with an administrator dashboard. You can see each employee’s strengths and areas for improvement and direct training based on these insightful trackers.
Training for a Full Year for Less Than the Cost of a Typical Week-Long Training Course
Employees can have continuous training and practice building critical cybersecurity skills for an entire year – with access to our full catalog of courses and/or labs, depending on the package you choose for your organization. Plus, you’ll eliminate expensive travel or long periods of time away from work.
“Anytime, Anywhere” Training with Minimal Technical Requirements
Your employees can access the CSX platform and train 24/7, anywhere a computer and high-speed internet connection are available. They can then learn at their own pace, focusing on areas where they need to build or improve individual skills.
Training Content that Stays Current
Courses, labs, tools and scenarios are continuously updated, ensuring your staff are always on top of the latest known threats and approaches. And new labs are issued every quarter.
Labs Built with Your Needs in Mind
Our labs are developed based on your input, allowing you to help build a better global cybersecurity workforce.
CSX Training Platform Modules
Enterprise packages include labs, or labs + courses + assessment tool. CSX Practitioner Courses are available as a standalone offer, and the CSX Practitioner Exam can be added on to your package to help certify your team and validate technical skill and ability. Capture the flag scenarios will be available free.
Focused Training Courses—The training platform features a library of self-paced, virtual courses combining instructional lecture with hands-on lab work. Each course offers a focused, deep dive into a specialized area of cybersecurity and ranges in length from 2 to 16 hours. Courses are available at varying levels of complexity: Beginner, Practitioner, Advanced and Bridge to Security Management.
CSX Practitioner Exam Prep Course—The enterprise training platform also includes a virtual version of our in-person CSX Practitioner Exam Prep Course. Offering 1-week of comprehensive training, this course combines instruction with hands-on learning and practice in applying basic concepts and industry-leading methods, and in utilizing a large array of open source tools within real-world scenarios in the live network environment. This training will help employees build the critical skills necessary to be successful in a variety of cybersecurity roles and to earn the CSX Practitioner certification.
Enterprise Assessment Tool—Exclusive to the CSX platform, the Enterprise Assessment Tool allows you to assess the technical abilities and current skill levels of both your current employees and potential hires. Each assessment provides an on-the-spot evaluation of an individual’s cyber strengths and weaknesses, allowing you to make informed hiring, promotional, and development decisions.
Capture the Flag Scenarios—Frequent capture the flag scenarios will be added on an ongoing basis to help users sharpen their skills in friendly competition.
The CSX Practitioner Exam is also available as an add-on to the training platform packages. The CSX Practitioner certification is the first vendor-neutral, performance certification that measures and validates technical cybersecurity skills and abilities.
2 CPE Hours Per Lab
|Lab||Skill Level||Functional Domain||Lab Description|
|Finding the Lost Web Server||Beginner||Identify||Students will leverage network discovery and diagnostic capabilities to identify what happened to a corporate webserver severely damaged during an attack.|
|Network Scanning||Beginner||Identify||Students will leverage network scanning tools to identify nodes and services on an internal network. The end goal is to create an up to date network map of their company's internal network for troubleshooting, analysis, and future reference.|
|HTTP Packet Analysis||Beginner||Detect||Conducting basic packet analysis is a key skill for anyone working in the cybersecurity field. Students will learn how to filter and parse packets to detect if corporate intellectual property is being stolen from their organization.|
|Data Integrity||Beginner||Protect||Students will learn the importance of data integrity through comparative analysis of hash algorithm output. Leveraging hashing tools, students will learn how to ensure that data is not compromised post-incident.|
|Web Server Backup||Beginner||Recover||Maintaining copies of non-compromised data and files are paramount to the incident response and disaster recovery process. This lab ensures that students understand how to archive and hash non-compromised data and back it up to a safe location.|
|DNS Packet Analysis||Beginner||Detect||Cybersecurity practitioners understand the importance of Domain Name System (DNS) packets and how they enable the flow of data across the Internet. They also understand that the subversion of DNS services on a network is a common attack seen in cybersecurity. In this lab, students will learn how to detect odd DNS activity and isolate samples of the traffic.|
|Scripts with Nmap||Beginner||Identify||Understanding if a system’s ports are open and exposed is only half the battle of fully identifying and understanding an asset. You must also assess which services may be running on the asset. Every cybersecurity practitioner should understand how to leverage tools to understand which services are running on their networks. Students will leverage Nmap to see which services their computers are running.|
|Forensics 1: Imaging||Beginner||Recover||The first step in computer forensics is obtaining a copy of the computers hard drive in question. This lab will guide students through that process.|
|Insider Threat Identification||Beginner||Detect||This lab takes students through a situation where a former employee poses a serious threat to the company network.|
|System Baselining||Beginner||Protect||Students will get more practice with MBSA, as well as be introduced to the Linux Tiger IDS in this lab.|
|Linux Baseline with Lynis||Beginner||Identify||Lynis is a security auditing tool designed specifically for Linux systems. Lynis is an open-source product that runs on the host itself and is essential when it comes to obtaining knowledge on Linux baselining.|
|Script Construction and Execution||Beginner||Identify||Assuming the role of a network security expert, who is responsible for creating, executing and then examining the output of a bash script and a batch file, students will learn the basics of scripting using both the Kali Linux bash and the Windows 10 command prompt.|
|Intrusion Detection System Implementation and Testing||Beginner||Detect||Students will evaluate the functionality and applicability of IDS tools provided by the Security Onion Linux distribution, by identifying incidents and responding to alerts within the network of responsibility.|
|Updating Firewall Rules||Intermediate||Protect||Cybersecurity professionals are often responsible for implementing acceptable use policies on their networks of responsibility. Thanks to the constant change of application usage and computing platforms, incident responders and technical professionals find themselves updating these policies regularly. In this lab, students learn how to change firewall rules to block unacceptable traffic.|
|Man-in-the-Middle Detection||Intermediate||Detect||One of the most common attacks in the field of cybersecurity is the Man-in-the-Middle (MitM) attack. Students taking this lab will learn how to detect when a potential MitM attack is occurring.|
|Threat Detection||Intermediate||Detect||Cybersecurity professionals are often given vague declarations of discontent from end-users experiencing technical difficulties. Understanding how to take minimal information and implement tools from their suite of capabilities to further understand the potential problems is key to proficiency. In this lab, students will implement typical network diagnostic tools to determine the type of issue an end user is having.|
|Cleaning Up After an Attack||Intermediate||Recover||Cybersecurity professionals understand that simply detecting and responding to an incident is not enough to adequately protect an organization’s business processes and corporate assets. Therefore, it is important that practitioners understand how to recover from an incident. In this lab, students will learn how to ensure no backdoors or additional compromises exist on a system after an attack.|
|Forensics 2: File Recovery||Intermediate||Recover||Once an image of the device in question has been obtained, file and recovery forensics can be attempted. In this lab, students will take the image created in a previous lab to investigate a possible data breach in their company.|
|Firewall Setup 2||Intermediate||Protect||Once the initial firewall setup has been completed it's time to start adding some rules to protect specific network devices from potential threats.|
|Mobile Forensics||Intermediate||Recover||This lab takes students through the nuances of mobile forensics. Mobile Applications, or Apps, utilize very specific technologies to store user data and configurations.|
|Data Leakage||Intermediate||Identify||In this lab, students will interact with a username and password leak from a web app.|
|Packet Construction and Kernel Hardening||Intermediate||Protect||In this lab, students will analyze a flood script built with Scapy, then configure their Linux kernel to detect flooding attacks.|
|CSX Volume 3, Challenge 1||Intermediate||Protect/Detect||As part of this challenge, students must capture packets with Wireshark, configure their firewalls, and use Burp to intercept traffic.|
|CSX Volume 3, Challenge 2||Intermediate||Protect/Detect||Students will detect and respond to a cyber attack.|
|Spectre Mitigation||Intermediate||Protect||Spectre exploits crucial and vital susceptibilities in today's processors. Spectre uses speculative execution on processors using branch prediction. In other terms, Spectre takes advantages of the processors' performance techniques.|
|Meltdown Mitigation||Intermediate||Protect||Meltdown exploits crucial and vital susceptibilities in today's processors. Meltdown is similar to Spectre but there are some differences. Meltdown allows access to ANY data that is mapped to current memory space.|
|Chrome Extension Testing||Intermediate||Detect||In early 2018, security researchers discovered several nefarious Chrome extensions that were making unwanted calls to ad servers. This resulted in the removal of these Chrome extensions from the Google Extension Store and a heightened awareness to the possible effects of Chrome extensions on business networks.|
|Securing Web Browsers||Intermediate||Protect||Ensuring web browsing security is an integral part of cybersecurity as a whole. Google Chrome and Mozilla Firefox are both used in this lab.|
|Passive Computer Forensics||Intermediate||Recover||Leveraging the Kali and Clonezilla Linux distributions, students will image a file system, inspect identified files and leverage tools to identify nefarious deleted emails.|
|Triaging Incidents||Intermediate||Respond||Students will generate malicious traffic, examine the generated traffic, and respond to the incidents based upon their order of importance. These actions will enable the student to understand an incident from an attacker's perspective, as well as a responder.|
|IOT Device Indicators||Intermediate||Detect||Students will analyze a collection of IOT device communications packets and correlate the timing of data spikes with IOT user habits.|
|Home Automation Device Patterns||Intermediate||Detect||This lab will teach a student how to analyze wireless data collection in order to map and characterize a network and the devices resident upon said network.|
|Browser Attacks||Advanced||Detect||Phishing attacks are the lynchpin of many organizational breaches and exploitations. Cybersecurity professionals that understand this also understand that many of these attacks are successful due to lack of understanding by end users. This course will teach cybersecurity professionals how to perform a phishing attack and illustrate the importance of cyber security awareness when browsing the internet.|
|Restoring Data with Secure Copy||Advanced||Recover||Every cybersecurity professional should understand the importance of obtaining, maintaining, and implementing a baseline of key system element in case of an incident. During the recovery process, pushing out clean baselines is paramount to restore system operations. In this lab, students will learn how to restore important, unaltered information by leveraging secure copy.|
|Testing Web Applications||Advanced||Protect||Part of a comprehensive defense-in-depth implementation includes testing new capabilities and applications before implementing them into an organizations production network. This course illustrates how students can conduct testing against newly developed web applications to ensure they do not pose a risk to organizational assets.|
|Malware Analysis||Advanced||Respond||Part of combating an incident or ensuring that an incident does not re-occur includes conducting in-depth analysis on the elements which compromised the network of the system. Thus, malware analysis has become a key capability which is applied during and after an incident. In this lab, students will gain an understanding of how to conduct malware analysis.|
|Scanning and Enumeration Challenge||Advanced||In this challenge, you will have to utilize some of the knowledge you acquired in the previous labs to complete a few tasks. Please make sure to read all instructions carefully and save all results or reports into the specified files. These files are case sensitive and can change results.|
|Integrity and Malware Analysis Challenge||Advanced||In this challenge, you will have to utilize some of the knowledge you acquired in the previous labs to complete a few tasks. Please make sure to read all instructions carefully and save all results or reports into the specified files. These files are case sensitive and can change results.|
|SQL Injection||Advanced||Detect||In this lab, students will be exposed to SQL injection attacks and learn how to implement the elements of prevention.|
|Firewall Setup 1||Advanced||Detect||Firewall routers will help protect your network from external and internal threats. This lab takes students through the first step of setting up a firewall.|
|DDoS Detection||Advanced||Detect||Students will experience the different components of a distributed denial of service attack.|
|Session Hijacking||Advanced||Detect||Students will identify web application cookies, interact with Burp, and a MITM attack.|
|Malware Detection and Removal with Baseline||Advanced||Respond||In addition to Lynis, this lab features Difference, ClamAV, and other vital Linux tools. This lab fuses these essentials together in order to present a challenge.|
|Domain Detection||Advanced||Detect||This challenge lab will be testing your packet analysis and domain detections skills.|
|Incident Response Script Implementation||Advanced||Respond||This lab will challenge students to create scripts and appropriately leverage tools within Security Onion to enhance IDS implementation and response times.|
|Forensic Data Recovery and Analysis||Advanced||Detect||This lab will challenge students to leverage tools such as Photorec and Wireshark to conduct forensic analysis in order to identify potential malicious activity indicators.|
CSX Practitioner Exam Prep Course
Our new CSX Practitioner Exam Prep Course is an intensive training course focused on more complex technical cybersecurity skills and scenarios, and recommended for staff who have intermediate or higher technical skills or as the next step in the CSX learning path after successful completion of CSX Cybersecurity Fundamentals and Foundations Series training courses. The course will help your staff build technical skills critical to perform successfully in key cybersecurity positions ̶ and to prepare for the CSX Practitioner certification exam.
The CSX Practitioner Exam Prep Course:
- Offers 40 hours of immersive, practical training that combines in-depth instruction on key cybersecurity concepts with hands-on lab work to help staff build and hone critical technical cybersecurity skills.
- Teaches staff will to use the same tools, within the context of current threats and scenarios, they would encounter working in the real world.
- Provides relevant and comprehensive training – with each lesson and corresponding lab focused on skills and concepts in one of five areas aligned to existing global cybersecurity frameworks: Identify, Protect, Detect, Respond and Recover.
- Prompts students to effectively detect and mitigate live cyber incidents throughout the training, in line with NIST, ISO and ISA guidelines.
- Allows your team members to learn at their own pace and schedules, with “anytime, anywhere” access
- Provides trainees, upon completion of each lab, with a detailed analytic report – giving them immediate insight into strengths and weaknesses, and helping to direct continued training efforts.
- Enables staff to earn up to 48 continuing professional education credit hours that can be applied to the maintenance of their professional certifications.
The CSX Practitioner Exam can be added on to your package to help certify your team and validate technical skill and ability. The CSX Practitioner certification is the first vendor-neutral, performance certification that measures and validates technical cybersecurity skills and abilities.
Practitioners can learn foundations of security such as, packet analysis, Linux and networking in an on-demand environment
CSX Packet Analysis
This course provides students an understanding of packet and protocol analysis. Students will work with real network traffic captures in real environments and will analyze different communication types and their components. Upon completion, students will be able to passively analyze packet captures and create network topologies and device characterizations – valuable traits in the cybersecurity field.
This comprehensive training course on Packet Analysis leverages hands-on lab training and in-depth instruction in this critical area. Learn More >>
CSX Network Application and Configuration
This course provides students with an understanding of network connections, protocols, and routing. Through interacting with live traffic in a network environment, students will learn how to direct, create, and deny traffic as it flows through a network of their creation and moderation. Learn More >>
CSX Linux Application and Configuration
This course provides students with an understanding of the Linux operating system. Through interacting with live systems in a real environment, students will learn key commands, create user accounts and items, establish network connections, and learn the secrets of the Linux terminal. Learn More >>
CSX Penetration Testing Overview Course
The CSX Penetration Testing Overview course provides students an introductory understanding of penetration testing and ethical hacking. Students will work with real systems in real environments and will leverage real vulnerability analysis and exploitation tools in a live environment. Upon completion, students will understand the overall concepts guiding penetration testing from a practical, hands-on vantage point. Learn More >>
CSX Vulnerability and Exploitation Course
The CSX Vulnerability and Exploitation Course provides students, who possess a basic understanding of penetration testing, a deeper understanding of vulnerability identification and exploitation capabilities. Students will work with real systems in real environments and will leverage real vulnerability analysis and exploitation tools in a live environment. Upon completion, students will understand the how to successfully exploit and maintain a presence within information systems. Learn More >>
CSX Advanced Exploitation Course
The CSX Advanced Exploitation Course provides students, who possess an in-depth understanding of penetration testing, a deeper understanding of traversing complex networks. Students will work with real systems in real environments and will leverage real exploitation and pivoting tools in a live environment. Upon completion, students will understand the how to successfully exploit and move through a number of hosts on a network. Learn More >>
Open Source Tools Utilized in CSX Training Platform Instructional Courses and Labs
Use the Same Tools and Scenarios You’ll Encounter Working in the Real World.
Courses and labs on the CSX Training Platform feature practical, up-to-date instruction and practice using the latest open-source tools, within real-world scenarios.
Employees will learn how to use the latest tools that they will need to use day-to-day in the real world, including:
- BURP Suite
- Native Linux Commands / Utilities
Assessing Cybersecurity Talent Just Got Easier
Gain Critical insight into how current an prospective team members perform
It’s never been possible to know how a security professional will handle a cyberattack on your organization—or whether a job candidate actually has the deep technical skills employers are looking for—until now.
The Cybersecurity Nexus™ (CSX) Skills Assessment Tool allows cybersecurity and HR managers to:
- More accurately Gauge an individual’s skills and abilities
- Measure technical competency across all five functions of the NIST Cybersecurity Framework* in just two hours
- Test users’ ability to identify and respond to real cybersecurity scenarios in a live environment
Assess and address: Learn your security team’s strengths and weaknesses. See how the CSX Skills Assessment Tool can help you identify and fill critical cybersecurity skill gaps in your organization. Read Article >>
*The National Institute of Standards and Technology (NIST) Cyber Security Framework consists of identify, protect, detect, respond, recover.
CYBERSECURITY FUNDAMENTALS COURSE
Gain new expertise and prepare to start or advance your role in the increasingly important and in-demand field of cybersecurity. Leverage the power of our Cybersecurity Fundamentals Online Course to enhance your understanding of the principles that frame and define cybersecurity and the integral role of cybersecurity professionals in protecting enterprise data and infrastructure.
Take advantage of the convenience of online learning through eight hours of instruction that covers key areas of cybersecurity:
- Cybersecurity objectives and roles and the difference between cybersecurity and information security.
- The Principles of Cybersecurity.
- Information Security within Lifecycle Management.
- Risks & Vulnerabilities.
- Incident Response.
The Course’s interactive, self-guided format provides a dynamic learning experience where you’ll learn to:
- Explain the core information assurance (IA) principles.
- Identify the key components of cybersecurity network architecture.
- Apply cybersecurity architecture principles.
- Describe risk management processes and practices.
- Identify security tools and hardening techniques.
- Distinguish system and application security threats and vulnerabilities.
- Describe different classes of attacks.
- Define types of incidents including categories, responses and timelines for response.
- Describe new and emerging IT and IS technologies.
- Analyze threats and risks within context of the cybersecurity architecture.
- Appraise cybersecurity incidents to apply appropriate response.
- Evaluate decision making outcomes of cybersecurity scenarios.
- Access additional external resources to supplement knowledge of cybersecurity.
WHO SHOULD TAKE THE COURSE?
The Course is ideal for college/university students and recent graduates, those new to the field, as well as those looking to change careers. It is also an excellent resource for professionals in the field looking for a cybersecurity refresher course.
The Course is an excellent way to gain foundational knowledge in cybersecurity and begin to build your knowledge and kick-start your career in this crucial area. It is also a great way to prepare to earn your Cybersecurity Fundamentals Certificate.
Cybersecurity Nexus (CSX) is a new program designed for the most ambitious cybersecurity professionals, empowering them to elevate their work, take control of their career paths, and earn their place amongst the best.