ELEARNING (SELF-PACED)
Duration: 40 Hours
Videos: 0
COST: $99
AUDIENCE: Information Security Professionals
Information Security
The CASP exam covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers, while managing risk.
This course will prepare you for the CASP exam by teaching you how to apply critical thinking and judgment across a broad spectrum of security disciplines, in an effort to propose and implement solutions that map to enterprise drivers, while also managing risk.
The current landscape of cybersecurity requires specialized skills to troubleshoot via customized hacks and build solid solutions. Each hack is unique and must be combated with master-level security skills and experience. As a CASP-certified IT professional, you will demonstrate that you can provide the best cybersecurity solutions and protection for organizations worldwide. CompTIA Advanced Security Practitioner (CASP) meets the growing demand for advanced IT security in the enterprise. Recommended for IT professionals with at least 5 years of experience, CASP certifies critical thinking and judgment across a broad spectrum of security disciplines and requires candidates to implement clear solutions in complex environments.
CASP certified Information Security practitioners, across job titles such as Security Engineers, Information Security Analysts and Security Risk Managers. CompTIA Advanced Security Practitioner meets the ISO 17024 standard and is approved by U.S. Department of Defense to fulfill Directive 8570.01-M requirements. It is compliant with government regulations under the Federal Information Security Management Act (FISMA).
Learning Objective
Students will learn the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers, while managing risk.
Outline
Module 1: Underlying Security Models
Module 2: Selecting Security
Module 3: Cryptography
Module 4: Storage
Module 5: Virtual Computing
Module 6: IPv6
Module 7: Remote Access Security
Module 8: Domain Name System
Module 9: Directory Services
Module 10: Firewall and VPN
Module 11: Security Configuration Management
Module 12: Network Infrastructure Security
Module 13: Secure Web Services
Module 14: Buffer Overflows
Module 15: SQL Injection
Module 16: Access Control
Module 17: Single Sign-On
Module 18: Risk Assessment
Module 19: Testing and Assessment
Module 20: Common Vulnerability
Module 21: Common Criteria
Module 22: Personally Identifiable Information
Module 23: Risk Management
Module 24: Frameworks
Module 25: Interconnecting Systems
Module 26: Security Services
Module 27: Continuous Monitoring
Module 28: Incident Handling
Module 29: Forensic & Incident Response
Module 30: Requirements Processing
Module 31: Standards Bodies
Module 32: Secure System Life Cycle
Module 33: Email
Module 34: Mobile and BYOD
Module 35: Voiceover IP
Module 36: Physical Facilities Assessment Process
Module 37: Security Requirements Traceability Matrix