What do you want to learn today?

CompTIA Advanced Security Practitioner (CASP+) Certification Prep (Exam CAS-003)

ENDED
Online Training by  NetCom Learning
Inquire Now
Online / Training

Details

The CompTIA Advanced Security Practitioner (CASP+) is the course you will need to take if your job responsibilities include securing complex enterprise environments. In this course, you will expand on your knowledge of information security to apply more advanced principles that will keep your organization safe from the many ways it can be threatened. Today's IT climate demands individuals with demonstrable skills, and the information and activities in this course can help you develop the skill set you need to confidently perform your duties as an advanced security professional. 

This course can also benefit you if you intend to pass the CompTIA Advanced Security Practitioner (CAS-003) certification examination. CASP+ certification is an international, vendor-neutral exam that proves competency in enterprise security. What you learn and practice in this course can be a significant part of your preparation. 

The exam covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers. 

Intended Audience
  • This course is designed for IT professionals who want to acquire the technical knowledge and skills needed to conceptualize, engineer, integrate, and implement secure solutions across complex enterprise environments.
  • The candidates seeking the CompTIA Advanced Security Practitioner (CASP+) certification and who want to prepare for Exam CAS-003.
Course Prerequisites
  • 10 years experience in IT administration, including at least 5 years of hands-on technical security experience
  • CompTIA Security+ Certification Prep (Exam SY0-401)

Outline

    1. Enterprise Security
      1. Identifying security concerns in scenarios
        1. Exploring cryptographic techniques
        2. Advanced PKI concepts
      2. Distinguishing between cryptographic concepts
        1. Entropy
        2. Confusion and diffusion
        3. Chain of trust
      3. Securing enterprise storage
        1. Examining storage types and protocols
        2. Secure storage management
      4. Analyzing network security architectures
        1. Designing secure networks
        2. Employing virtual networking solutions
      5. Troubleshooting security controls for hosts
        1. Host security: trusted OS, end-point, host hardening
        2. Vulnerabilities in co-mingling of hosts
      6. Differentiating application vulnerabilities
        1. Web application security
        2. Application security concerns
        3. Mitigating client-side vs. server-side processing
    2. Risk Management and Incident Response
      1. Interpreting business and industry influences and risks
        1. Analyzing risk scenarios
        2. Identifying the impact of de-perimeterization
      2. Executing risk mitigation planning, strategies and control
        1. Assessing the CIA aggregate scores
        2. Making risk determination
      3. Privacy policies and procedures
        1. Developing policies to support business objectives
        2. Safeguarding Personally Identifiable Information (PII)
      4. Conduct incident response and recovery procedures
        1. Constructing a data inventory with e-discovery
        2. Minimizing the severity of data breaches
    3. Research, Analysis and Assessment
      1. Determining industry trends impact to the enterprise
        1. Performing ongoing research to support best practices
        2. Researching security requirement for contracts
      2. Appropriate security document usage
        1. Request for Information (RFI)
        2. Request for Quote (RFQ)
        3. Request for Proposal (RFP)
      3. Evaluating scenarios to determine how to secure the enterprise
        1. Conducting cost benefit and security solution analysis
        2. Reviewing effectiveness of existing security controls
      4. Conducting an assessment and analyzing the results
        1. Determining appropriate tools for data gathering
        2. Identifying methods to perform assessments
    4. Integrating Computing, Communications and Business Disciplines
      1. Collaborating across diverse business units to achieve security goals
        1. Communicating with stakeholders
        2. Interpreting security requirements and providing guidance
        3. Identifying secure communications goals
      2. Selecting controls for secure communications
        1. Utilizing unified collaboration tools
        2. Mobile devices
        3. Applying over the air technologies
      3. Implementing security across technology life cycle
        1. Selecting security controls
        2. Developing Security Requirements Traceability Matrices
    5. Technical Integration of Enterprise Components
      1. Integrate devices into a secure enterprise architecture
        1. Securing data following existing security standards
        2. Applying technical deployment models
        3. Integrating storage and applications into the enterprise
      2. Integrating advanced authentication and authorization technologies
        1. Implementing certificate-based and SSO authentication
        2. Applying federation solutions
Reviews
Be the first to write a review about this course.
Write a Review

NetCom Learning helps build innovative learning organizations in the workplace by structuring a smarter workforce, supporting learning changes, and driving learning growth. Since 1998 we have been empowering organizations to reach optimal performance results and address challenges by managing all aspects of organizational learning.

With a team of dedicated and knowledgeable learning professionals having deep subject-matter expertise, NetCom Learning has serviced over 80% of Fortune 100 companies. We've helped over 10,000 organizations achieve their business goals by offering a full complement of Managed Learning Services, including IT and business training, curriculum design and content development, learning delivery and administration, consulting and advisory services, and management of learning technology.

NetCom Learning is honored to be recognized as Microsoft's Worldwide Training Partner of the Year by Microsoft and as a Top 20 IT Training Company by TrainingIndustry.com for three years. We offer over 1,500 courses available to organizations around the world, encompassing all your technology and business training needs. From authorized or foundational training to specialized certifications, we empower organizations to achieve a competitive advantage. In addition, we provide customers with a choice of customized private programs, convenient scheduling options, flexible delivery formats, and continuous learning support, all tailored towards minimizing the skills gap and gaining maximum business impact for your organization. ...

Sending Message
Please wait...
× × Speedycourse.com uses cookies to deliver our services. By continuing to use the site, you are agreeing to our use of cookies, Privacy Policy, and our Terms & Conditions.