Advanced Security Practitioner Plus (CASP+)

SKU: NCX-CT-O-CA Category: Tags: , ,

CompTIA Advanced Security Practitioner Plus (CASP+)

CompTIA Advanced Security Practitioner Plus (CASP+) is the ideal certification for technical professionals who wish to remain immersed in technology as opposed to strictly managing it.

This course teaches advanced-level competency in risk management along with considerations in enterprise security operations and architecture, methodologies of research and collaboration, and integration of enterprise security.

CASP+ is compliant with ISO 17024 standards and approved by the US DoD to meet directive 8140/8570 requirements.

This course prepares the student to sit the CompTIA CASP+ exam.

Description

Advanced Security Practitioner Plus (CASP+) Training for CompTIA Certification

Course Objectives

  • Describe the enterprise security domain as it is expanded to include operations and architecture concepts, techniques, and requirements
  • Understand how to analyze risk through interpreting trend data and anticipating cyber defense needs to meet business goals
  • Explain security control topics as they relate to mobile and small form factor devices, as well as software vulnerability
  • Integrate cloud and virtualization technologies into a secure enterprise architecture
  • Implement cryptographic techniques, such as Blockchain, cryptocurrency, and mobile device encryption

Pre-Requisite Knowledge Advisory

  • At least 10 years’ experience in IT Administration, including at least 5 years of technical Security experience

Exam Required for CompTIA CASP Certification

To gain CASP certification, the student must pass the following exam:

  • Exam CAS-003 – CompTIA CASP+

Duration of exam: 165 minutes (90 questions)
Passing Score: Pass / Fail only

Advanced Security Practitioner (CASP) Course Outline

Module 1: Managing Risk

  • Identify the Importance of Risk Management
  • Assess Risk
  • Mitigate Risk
  • Integrate Documentation into Risk Management

Module 2: Integrating Computing, Communications, and Business Disciplines

  • Facilitate Collaboration Across Business Units
  • Secure Communications and Collaboration Solutions
  • Implement Security Activities Throughout the Technology Life Cycle

Module 3: Using Research and Analysis to Secure the Enterprise

  • Determine Industry Trends and Effects on the Enterprise
  • Analyze Scenarios to Secure the Enterprise

Module 4: Integrating Advanced Authentication and Authorization Techniques

  • Implement Authentication and Authorization Technologies
  • Implement Advanced Identity Management

Module 5: Implementing Cryptographic Techniques

  • Describe Cryptographic Concepts
  • Choose Cryptographic Techniques
  • Choose Cryptographic Implementations

Module 6: Implementing Security Controls for Hosts

  • Select Host Hardware and Software
  • Harden Hosts
  • Virtualize Servers and Desktops
  • Implement Cloud Augmented Security Services
  • Protect Boot Loaders

Module 7: Implementing Security Controls for Enterprise Storage

  • Identify Storage Types and Protocols
  • Implement Secure Storage Controls

Module 8: Analyzing and Implementing Network Security

  • Analyze Network Security Components and Devices
  • Analyze Network-Enabled Devices
  • Analyze Advanced Network Design
  • Configure Controls for Network Security

Module 9: Implementing Security Controls for Applications

  • Identify General Application Vulnerabilities
  • Identify Web Application Vulnerabilities
  • Implement Application Security Controls

Module 10: Integrating Hosts, Storage, Networks, and Applications in a Secure Environment

  • Enterprise Architecture
  • Implement Security Standards in the Enterprise
  • Select Technical Deployment Models
  • Secure the Design of the Enterprise Infrastructure
  • Secure Enterprise Application Integration Enablers

Module 11: Conducting Vulnerability Assessments

  • Select Vulnerability Assessment Methods
  • Select Vulnerability Assessment Tools

Module 12: Responding to and Recovering from Incidents

  • Design Systems to Facilitate Incident Response
  • Conduct Incident and Emergency Responses