Advanced Security Practitioner (CASP)

SKU: NCX-CT-O-CA Category: Tags: , ,

CompTIA Advanced Security Practitioner (CASP)

CompTIA Advanced Security Practitioner (CASP) is the ideal certification for technical professionals who wish to remain immersed in technology as opposed to strictly managing it.

This course teaches advanced-level competency in risk management along with considerations in enterprise security operations and architecture, methodologies of research and collaboration, and integration of enterprise security.

CASP is compliant with ISO 17024 standards and approved by the US DoD to meet directive 8140/8570.01-M requirements.

This course prepares the student to sit the CompTIA CASP exam.


Advanced Security Practitioner (CASP) Training for CompTIA Certification

Course Objectives

  • Describe the enterprise security domain as it is expanded to include operations and architecture concepts, techniques, and requirements
  • Understand how to analyze risk through interpreting trend data and anticipating cyber defense needs to meet business goals
  • Explain security control topics as they relate to mobile and small form factor devices, as well as software vulnerability
  • Integrate cloud and virtualization technologies into a secure enterprise architecture
  • Implement cryptographic techniques, such as Blockchain, cryptocurrency, and mobile device encryption


  • At least 10 years’ experience in IT Administration, including at least 5 years of technical Security experience

Exam Required for CompTIA CASP Certification

To gain CASP certification, the student must pass the following exam:

  • Exam CAS-003 – CompTIA CASP

Duration of exam: 165 minutes (90 questions)
Passing Score: Pass / Fail only

Advanced Security Practitioner (CASP) Course Outline

Module 1: Managing Risk

  • Identify the Importance of Risk Management
  • Assess Risk
  • Mitigate Risk
  • Integrate Documentation into Risk Management

Module 2: Integrating Computing, Communications, and Business Disciplines

  • Facilitate Collaboration Across Business Units
  • Secure Communications and Collaboration Solutions
  • Implement Security Activities Throughout the Technology Life Cycle

Module 3: Using Research and Analysis to Secure the Enterprise

  • Determine Industry Trends and Effects on the Enterprise
  • Analyze Scenarios to Secure the Enterprise

Module 4: Integrating Advanced Authentication and Authorization Techniques

  • Implement Authentication and Authorization Technologies
  • Implement Advanced Identity Management

Module 5: Implementing Cryptographic Techniques

  • Describe Cryptographic Concepts
  • Choose Cryptographic Techniques
  • Choose Cryptographic Implementations

Module 6: Implementing Security Controls for Hosts

  • Select Host Hardware and Software
  • Harden Hosts
  • Virtualize Servers and Desktops
  • Implement Cloud Augmented Security Services
  • Protect Boot Loaders

Module 7: Implementing Security Controls for Enterprise Storage

  • Identify Storage Types and Protocols
  • Implement Secure Storage Controls

Module 8: Analyzing and Implementing Network Security

  • Analyze Network Security Components and Devices
  • Analyze Network-Enabled Devices
  • Analyze Advanced Network Design
  • Configure Controls for Network Security

Module 9: Implementing Security Controls for Applications

  • Identify General Application Vulnerabilities
  • Identify Web Application Vulnerabilities
  • Implement Application Security Controls

Module 10: Integrating Hosts, Storage, Networks, and Applications in a Secure Environment

  • Enterprise Architecture
  • Implement Security Standards in the Enterprise
  • Select Technical Deployment Models
  • Secure the Design of the Enterprise Infrastructure
  • Secure Enterprise Application Integration Enablers

Module 11: Conducting Vulnerability Assessments

  • Select Vulnerability Assessment Methods
  • Select Vulnerability Assessment Tools

Module 12: Responding to and Recovering from Incidents

  • Design Systems to Facilitate Incident Response
  • Conduct Incident and Emergency Responses