CompTIA Advanced Security Practitioner (CompTIA CASP+)
-
COURSE DATES AND LOCATIONS
DATE
Duration
LOCATION
FEES
Book Now
-
INTRODUCTION
CompTIA’s CASP – CompTIA Advanced Security Practitioner , is a vendor-neutral certification that validates IT professionals with advanced-level security skills and knowledge. This certification course covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers, while managing risk.
There is no required prerequisite for this course however, the CASP certification is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus at the enterprise level.
This CASP training course follows the CompTIA authorized objectives, ensuring you receive the training and knowledge needed to succeed.
-
COURSE OBJECTIVES
CompTIA Advanced Security Practitioner (CASP+) is an advanced cybersecurity certification for security engineers and senior security engineers charged with leading and improving an organization’s cybersecurity readiness.Skills covered in CASP+ address current risks and incident response scenarios inherent with cyber warfare, modern hacking techniques and cloud migration. CASP+ covers the technical knowledge and skills required to conceptualize, engineer, integrate and implement secure solutions across complex environments to support a resilient enterprise. By the end of the course, you‘ll be able to:
- Support IT governance in the enterprise with an emphasis on managing risk
- Leverage collaboration tools and technology to support enterprise security
- Use research and analysis to secure the enterprise
- Integrate advanced authentication and authorization techniques
- Implement cryptographic techniques
- Implement security controls for hosts
- Implement security controls for mobile devices
- Implement network security
- Implement security in the systems and software development lifecycle
- Integrate hosts, storage, networks, applications, virtual environments and cloud technologies in a secure enterprise architecture
- Conduct security assessments
- Respond to and recover from security incidents
-
COURSE AUDIENCE
This course is made for :
- An IT security professional who has a minimum of 10 years experience in IT administration including at least 5 years of hands-on technical security experience.
- IT professionals aiming to move into a specialist security position such as a risk manager or analyst, security architect, or penetration tester/ethical Hacker.
- Cyber Security / IS Professional,Information Security Analyst,Security Architect,IT Specialist INFOSEC,IT Specialist, Cybersecurity, Cybersecurity Risk Manager,Cybersecurity Risk Analyst
-
COURSE OUTLINE
Day One
Lesson 1: The Enterprise Security Architecture
- Topic 1A: The Basics of Enterprise Security
- Topic 1B: The Enterprise Structure
- Topic 1C: Enterprise Security Requirements.
Day Two
Lesson 2: Enterprise Security Technology
- Topic 2A: Common Network Security Components and Technologies
- Topic 2B: Communications and Collaboration Security
- Topic 2C: Cryptographic Tools and Techniques
- Topic 2D: Advanced Authentication
Lesson 3: Enterprise Resource Technology
- Topic 3A: Enterprise Storage Security Issues
- Topic 3B: Distributed, Shared, and Virtualized Computing
- Topic 3C: Cloud Computing and Security
Day Three
Lesson 4: Security Design and Solutions
- Topic 4A: Network Security Design
- Topic 4B: Conduct a Security Assessment
- Topic 4C: Host Security
Day Four
Lesson 5: Application Security Design
- Topic 5A: Application Security Basics
- Topic 5B: Web Application Security
Lesson 6: Managing Risk, Security Policies, and Security Procedures
- Topic 6A: Analyze Security Risk
- Topic 6B: Implement Risk Mitigation Strategies and Controls
- Topic 6C: Implement Enterprise-Level Security Policies and Procedures
- Topic 6D: Prepare for Incident Response and Recovery
Day Five
Lesson 7: Enterprise Security Integration
- Topic 7A: The Technology Life Cycle
- Topic 7B: Inter-Organizational Change
- Topic 7C: Integrate Enterprise Disciplines to Achieve Secure Solutions
Lesson 8: Security Research and Analysis
- Topic 8A: Perform an Industry Trends and Impact Analysis
- Topic 8B: Perform an Enterprise Security Analysis