CompTIA Advanced Security Practitioner (CompTIA CASP+)

DATE

Duration

LOCATION

FEES

Book Now

15 Jan
- 19 Jan 2024

5 Days

Dubai

$4,250

15 Jul
- 19 Jul 2024

5 Days

Dubai

$4,250

22 Apr
- 26 Apr 2024

5 Days

Virtual Online

$3,450

7 Oct
- 11 Oct 2024

5 Days

Virtual Online

$3,450

CompTIA’s CASP – CompTIA Advanced Security Practitioner , is a vendor-neutral certification that validates IT professionals with advanced-level security skills and knowledge. This certification course covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers, while managing risk.

There is no required prerequisite for this course however, the CASP certification is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus at the enterprise level.
This CASP training course follows the CompTIA authorized objectives, ensuring you receive the training and knowledge needed to succeed.

CompTIA Advanced Security Practitioner (CASP+) is an advanced cybersecurity certification for security engineers and senior security engineers charged with leading and improving an organization’s cybersecurity readiness.Skills covered in CASP+ address current risks and incident response scenarios inherent with cyber warfare, modern hacking techniques and cloud migration. CASP+ covers the technical knowledge and skills required to conceptualize, engineer, integrate and implement secure solutions across complex environments to support a resilient enterprise. By the end of the course, you‘ll be able to:

  • Support IT governance in the enterprise with an emphasis on managing risk
  • Leverage collaboration tools and technology to support enterprise security
  • Use research and analysis to secure the enterprise
  • Integrate advanced authentication and authorization techniques
  • Implement cryptographic techniques
  • Implement security controls for hosts
  • Implement security controls for mobile devices
  • Implement network security
  • Implement security in the systems and software development lifecycle
  • Integrate hosts, storage, networks, applications, virtual environments and cloud technologies in a secure enterprise architecture
  • Conduct security assessments
  • Respond to and recover from security incidents

This course is made for :

  • An IT security professional who has a minimum of 10 years experience in IT administration including at least 5 years of hands-on technical security experience.
  • IT professionals aiming to move into a specialist security position such as a risk manager or analyst, security architect, or penetration tester/ethical Hacker.
  • Cyber Security / IS Professional,Information Security Analyst,Security Architect,IT Specialist INFOSEC,IT Specialist, Cybersecurity, Cybersecurity Risk Manager,Cybersecurity Risk Analyst

Day One
Lesson 1: The Enterprise Security Architecture

  • Topic 1A: The Basics of Enterprise Security
  • Topic 1B: The Enterprise Structure
  • Topic 1CEnterprise Security Requirements.

Day Two

Lesson 2: Enterprise Security Technology

  • Topic 2A: Common Network Security Components and Technologies
  • Topic 2B: Communications and Collaboration Security
  • Topic 2C: Cryptographic Tools and Techniques
  • Topic 2DAdvanced Authentication

Lesson 3: Enterprise Resource Technology

  • Topic 3A: Enterprise Storage Security Issues
  • Topic 3B: Distributed, Shared, and Virtualized Computing
  • Topic 3CCloud Computing and Security

Day Three

Lesson 4: Security Design and Solutions

  • Topic 4A: Network Security Design
  • Topic 4B: Conduct a Security Assessment
  • Topic 4CHost Security

Day Four

Lesson 5: Application Security Design

  • Topic 5A: Application Security Basics
  • Topic 5B: Web Application Security

Lesson 6: Managing Risk, Security Policies, and Security Procedures

  • Topic 6A: Analyze Security Risk
  • Topic 6B: Implement Risk Mitigation Strategies and Controls
  • Topic 6C: Implement Enterprise-Level Security Policies and Procedures
  • Topic 6D: Prepare for Incident Response and Recovery

Day Five

Lesson 7: Enterprise Security Integration

  • Topic 7A: The Technology Life Cycle
  • Topic 7B: Inter-Organizational Change
  • Topic 7C: Integrate Enterprise Disciplines to Achieve Secure Solutions

Lesson 8: Security Research and Analysis

  • Topic 8A: Perform an Industry Trends and Impact Analysis
  • Topic 8B: Perform an Enterprise Security Analysis
Training Subject
Training Location