CompTIA Advanced Security Practitioner (CASP)

Overview:

This course is intended for IT professionals who have the technical knowledge and skills required to conceptualize, design and engineer secure solutions across complex enterprise environments. Students should have a minimum of 10 years of experience, including at least 5 years of hands-on, technical security experience.

Duration:  

48 hours

Objectives:

Upon successful completion of this course, students will have learned to:

  • Manage risk in the enterprise
  • Integrate computing, communications, and business disciplines in the enterprise
  • Use research and analysis to secure the enterprise
  • Integrate advanced authentication and authorization techniques
  • Implement cryptographic techniques
  • Implement security controls for hosts
  • Implement security controls for storage
  • Analyze network security concepts, components, and architectures, and implement controls
  • Implement security controls for applications
  • Integrate hosts, storage, networks, and applications in a secure enterprise architecture
  • Conduct vulnerability assessments
  • Conduct incident and emergency responses
Prerequisites

None, although it is strongly recommended that you have your CompTIA A+, Network+, and Security+ certifications. You should also have a minimum of 10 years of experience, including at least 5 years of hands-on, technical security experience.

Course outlines:

1.      Risk Management

    • Summarize business and industry influences and associated security risks
    • Compare and contrast security, privacy policies and procedures based on organizational requirements
    • Given a scenario, execute risk mitigation strategies and controls
    • Analyze risk metric scenarios to secure the enterprise

    2.      Enterprise Security Architecture

      • Analyze a scenario and integrate network and security components, concepts and architectures to meet security requirements
      • Analyze a scenario to integrate security controls for host devices to meet security requirements
      • Analyze a scenario to integrate security controls for mobile and small form factor devices to meet security requirements
      • Given software vulnerability scenarios, select appropriate security controls

      3.      Enterprise Security Operations

        • Given a scenario, conduct a security assessment using the appropriate methods
        • Analyze a scenario or output, and select the appropriate tool for a security assessment
        • Given a scenario, implement incident response and recovery procedures

        4.      Technical Integration of Enterprise Security

          • Given a scenario, integrate hosts, storage, networks and applications into a secure enterprise architecture
          • Given a scenario, integrate cloud and virtualization technologies into a secure enterprise architecture
          • Given a scenario, integrate and troubleshoot advanced authentication and authorization technologies to support enterprise security objectives
          • Given a scenario, implement cryptographic techniques
          • Given a scenario, select the appropriate control to secure communications and collaboration solutions

          5.      Research, Development and Collaboration

            • Given a scenario, apply research methods to determine industry trends and their impact to the enterprise
            • Given a scenario, implement security activities across the technology life cycle
            • Explain the importance of interaction across diverse business units to achieve security goals
            • Học tại Hồ Chí Minh

            • Học tại Hà Nội

            • Học trực tuyến


            Các khóa học khác