CompTIA: Advanced Security Practitioner (CASP)

Icon-videos

ELEARNING (SELF-PACED)

Duration: 40 Hours

Videos: 0

COST: $99

AUDIENCE: Information Security Professionals

PREREQS:

Information Security

The CASP exam covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers, while managing risk.

This course will prepare you for the CASP exam by teaching you how to apply critical thinking and judgment across a broad spectrum of security disciplines, in an effort to propose and implement solutions that map to enterprise drivers, while also managing risk.

The current landscape of cybersecurity requires specialized skills to troubleshoot via customized hacks and build solid solutions. Each hack is unique and must be combated with master-level security skills and experience. As a CASP-certified IT professional, you will demonstrate that you can provide the best cybersecurity solutions and protection for organizations worldwide. CompTIA Advanced Security Practitioner (CASP) meets the growing demand for advanced IT security in the enterprise. Recommended for IT professionals with at least 5 years of experience, CASP certifies critical thinking and judgment across a broad spectrum of security disciplines and requires candidates to implement clear solutions in complex environments.

CASP certified Information Security practitioners, across job titles such as Security Engineers, Information Security Analysts and Security Risk Managers. CompTIA Advanced Security Practitioner meets the ISO 17024 standard and is approved by U.S. Department of Defense to fulfill Directive 8570.01-M requirements. It is compliant with government regulations under the Federal Information Security Management Act (FISMA).

Learning Objective 

Students will learn the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers, while managing risk.

Outline

Module 1: Underlying Security Models

Module 2: Selecting Security

Module 3: Cryptography

Module 4: Storage

Module 5: Virtual Computing

Module 6: IPv6

Module 7: Remote Access Security

Module 8: Domain Name System

Module 9: Directory Services

Module 10: Firewall and VPN

​Module 11: Security Configuration Management

Module 12: Network Infrastructure Security

Module 13: Secure Web Services

Module 14: Buffer Overflows

Module 15: SQL Injection

Module 16: Access Control

​Module 17: Single Sign-On

Module 18: Risk Assessment

Module 19: Testing and Assessment

Module 20: Common Vulnerability

Module 21: Common Criteria

Module 22: Personally Identifiable Information

Module 23: Risk Management

Module 24: Frameworks

Module 25: Interconnecting Systems

Module 26: Security Services

Module 27: Continuous Monitoring

Module 28: Incident Handling

Module 29: Forensic & Incident Response

Module 30: Requirements Processing

Module 31: Standards Bodies

Module 32: Secure System Life Cycle

​Module 33: Email

Module 34: Mobile and BYOD

Module 35: Voiceover IP

Module 36: Physical Facilities Assessment Process

Module 37: Security Requirements Traceability Matrix

Icon-linkedin Icon-twitter Icon-fb Icon-youtube