cropped-Artboard-1.png

Captiva Solutions, Cybersecurity Fundamentals (CSF)

This 3-day course is for those looking to enhance their cybersecurity knowledge and can be used for training towards ISACA’s® Cybersecurity NeXus (CSX) Fundamentals Certificate. It provides a foundational look at today’s cybersecurity landscape and the tools to evaluate and manage security controls in information systems. The CSX Cybersecurity Fundamentals certificate and related training are ideal for IS/IT practitioners, students and recent graduates to build knowledge of cybersecurity or get started on a career in the field. It is essential for professionals in any organizational role who wish to learn the fundamentals of cybersecurity and pursue a career in this booming field. This knowledge is in high demand, as cyberthreats continue to impact virtually every field of information systems and enterprises around the world.

$99.00

Description

This 3-day course is for those looking to enhance their cybersecurity knowledge and can be used for training towards ISACA’s® Cybersecurity NeXus (CSX) Fundamentals Certificate. It provides a foundational look at today’s cybersecurity landscape and the tools to evaluate and manage security controls in information systems. The CSX Cybersecurity Fundamentals certificate and related training are ideal for IS/IT practitioners, students and recent graduates to build knowledge of cybersecurity or get started on a career in the field. It is essential for professionals in any organizational role who wish to learn the fundamentals of cybersecurity and pursue a career in this booming field. This knowledge is in high demand, as cyberthreats continue to impact virtually every field of information systems and enterprises around the world.

Nullam quis risus eget urna mollis ornare vel eu leo. Aenean lacinia bibendum nulla sed 

Level 1

An organization must demonstrate basic cyber hygiene practices, such as ensuring employees change passwords regularly to protect Federal Contract Information (FCI). FCI is “information, not intended for public release, that is provided by or generated for the Government under a contract to develop or deliver a product or service to the Government.”

Level 2

An organization must have an institutionalized management plan to implement good cyber hygiene practices to safeguard CUI, including all the NIST 800-171 r2 security requirements and processes

Level 3 – Expert.

An organization must have standardized and optimized processes in place and additional enhanced practices that detect and respond to changing tactics, techniques and procedures (TTPs) of advanced persistent threats (APTs).

An APT is an adversary that possesses sophisticated levels of cyber expertise and significant resources to conduct attacks from multiple vectors. Capabilities include having resources to monitor, scan, and process data forensics.