BECOME A RESELLER
SELL YOUR COURSES
You are here
CompTIA Advanced Security Practitioner CASP CAS-003
CompTIA Advanced Security Practitioner CASP CAS-003
CompTIA Advanced Security Practitioner (CASP+) is the ideal certification for technical professionals who wish to remain immersed in technology as opposed to strictly managing resources. CASP+ is the only hands-on, performance-based certification for practitioners - not managers - at the advanced skill level of cybersecurity. While cybersecurity managers help identify what cybersecurity policies and frameworks could be implemented, CASP-certified professionals figure out how to implement solutions within those policies and frameworks. The CASP+ certification validates advanced-level competency in risk management; enterprise security operations and architecture; research and collaboration; and integration of enterprise security.
Instructor: Chrys Thorsen
- Implement cryptographic techniques.
- Implement security controls for mobile devices.
- Use research and analysis to secure the enterprise.
- Integrate advanced authentication and authorization techniques.
- Support IT governance in the enterprise with an emphasis on managing risk.
- Implement security controls for hosts.
- Leverage collaboration tools and technology to support enterprise security.
- Implement network security.
- Implement security in the systems and software development lifecycle.
- Integrate hosts, storage, networks, applications, virtual environments, and cloud technologies in secure enterprise architecture.
- Respond to and recover from security incidents.
- Conduct security assessments.
To be fit for this advanced course, you should have at least a foundational knowledge of information security. This includes, but is not limited to:
- Knowledge of computer networking concepts and implementations, such as the TCP/IP model and configuration of routers and switches.
- Knowledge of cryptographic concepts and common implementations, such as Secure Sockets Layer/Transport Layer Security (SSL/TLS) and public key infrastructure (PKI).
- Knowledge of identity and access management (IAM) concepts and common implementations, such as authentication factors and directory services.
- Knowledge of common security technologies used to safeguard the enterprise, such as anti-malware solutions, firewalls, and VPNs.
This course is designed for IT professionals who want to acquire the technical knowledge and skills needed to conceptualize, engineer, integrate, and implement secure solutions across complex enterprise environments. The target student should aspire to apply critical thinking and judgment across a broad spectrum of security disciplines to propose and implement sustainable security solutions that map to organizational strategies; translate business needs into security requirements; analyze risk impact, and respond to security incidents.
This course is also designed for students who are seeking the CompTIA Advanced Security Practitioner (CASP+) certification and who want to prepare for Exam CAS-003. Students seeking CASP+ certification should have at least 10 years of experience in IT management, with at least 5 years of hands-on technical security experience.
Module 1 - Risk Management
1.1 Exploring Cloud Services Act
1.1 Acquisition Merger Demerger
1.1 Acquisition Merger Demerger Part2
1.2 Compare and Contrast
1.3 Given Scenario Execute Risk1.3 Given Scenario Execute Risk Part2
1.3 Continuing Terminology IT Governance
1.4 Analyze Security Solution Metrics and Attributes
1.4 Analyze Risk
1.4 Trend Analysis Act
Module 2 - Enterprise Security Architecture
2 Enterprise Security Architecture
2.1 Network Device Security Act
2.1 Application and Protocol
2.1 Advanced Network Security Act
2.1 Complex Network Security Solution
2.1 Implementing VLANs Switchport Sec Act
2.1 Implementing VLANs Switchport Sec Act Part2
2.1 Distributed Denial of Service
2.1 Exploring DoS Attacks Act
2.1 Security Zones
2.1 Network Access Control
2.1 Searching for Vulnerablie ICS-SCADA Act
2.2 Analyze a Scenario Integrate Security
2.2 Configuring Windows Firewall Act
2.2 Log Monitoring and Auditing
2.2 Group Policy Act
2.2 Patch Management
2.2 Management Interface
2.2 Measured Launch
2.3 Analyze a Scenario to Integrate Security Controls
2.3 Security Implications Privacy
2.4 Given Software Vulnerabilty Scenarios
2.4 SQL Injection Act
2.4 Improper Error and Exception Handling
2.4 Buffer Overflows Act
2.4 Memory Leaks
2.4 Researching Vulnerabilities Exploits Act
Module 3 - Enterprise Security Operations
3 Enterprise Security Operations
3 Runtime Debugging
3.1 Fingerprinting an OS Services Act
3.1 Code Review
3.1 Conducting OSINT Act
3.1 Conducting a Vulnerability Assessment Act
3.2 Analyze a Scenario Output
3.2 Network Sniffing Act
3.2 Security Content Automation
3.2 Using a SCAP Scanner Act
3.2 Network Enumerator
3.2 Password Cracking Act
3.2 Host Vulnerability Scanner
3.2 Using Command Line Tools Act
3.2 Scanning for Heartbleed Act
3.2 Local Exploitation Tools
3.2 Verifying File Integrity with SFC Act
3.2 Log Analysis Tools
3.3 Given Scenario Implement Incident
3.3 Facilitate Incident Detection Response
3.3 Using Incident Response Support Tools Act
3.3 Severity of Incident Detection Breach
Module 4 - Technical Integration of Enterprise Security
4 Technical Integration of Enterprise
4 Technical Integration of Enterprise Part2
4.1 DataSecurity Considerations
4.1 Examing Network Diagrams Act
4.1 Security and Privacy Considerations of Storage integration
4.1 Exploring Directory Services and DNS Act
4.2 Given Scenario Integrate Cloud and Virtualization
4.2 Taking Another Look at Cloud Services Act
4.2 Security Advantages and Disadvanatges of Virtualization
4.2 Using Virtualization Act
4.2 Cloud Augmented Security
4.3 Given Scenario Integrate and Troubleshoot Advanced Authentication
4.4 Given Scenario Cryptographic
4.4 Cryptographic Part2
4.4 Mobile Device Encryption
4.4 Cryptography Act
4.5 Select the Appropriate Control
4.5 Phising Act
4.5 Telephony VoIP Integration
Module 5 - Research, Development and Collaboration
5 Research Methods to Determine Industry Trends
5.1 Practicing Threat Intelligence Act
5.2 Scenario Implememt Security Activities Across
5.2 Static Testing
5.3 Explain the Importance of Interaction
- Hours Of learning28:00:00
- Receive a Certificate of Excellence on successful completion
- Presented by highly qualified, industry leading experts
- 12 Months access
- 10-Day money-back guarantee