The course, which spends at least 50% of its time on numerous activities and exercises in simulated environments of real-world scenarios and Hands-On Labs on key security tools, prepares each candidate to pass the ISACA CSX Cybersecurity Practitioner (CSX-P) exam. It will: - Use vulnerability assessment processes and scanning toolsets to identify and document vulnerabilities based on the criticality of defined assets and technical impacts. - Obtain and aggregate information from multiple sources , such as logs, event data, network assessments, for use in threat intelligence, incident detection, and response . - Implement specific cybersecurity controls —for network, application, endpoint, server, and more—and verify that the controls function as required by corporate policies and procedures . - Implement and document changes to cybersecurity controls , such as endpoint security and network security, in accordance with change management procedures. - Identify anomalous activity and potential internal, external, and third-party threats to network resources using network traffic monitors or intrusion detection and prevention systems, as well as ensure timely detection of indicators of compromise . - Perform initial attack analysis to determine attack vectors, targets, scope, and potential impact . - Execute defined response plans to contain the damage to affected resources.