The CompTIA Advanced Security Practitioner (CASP+) course is an in-depth training program aimed at experienced IT security professionals seeking to enhance their expertise in enterprise security, risk management, and incident response. This course covers a broad range of topics, including security architecture, operations, engineering, cryptography, and governance, risk, and compliance. Participants will learn to design, implement, and manage secure solutions in complex enterprise environments.
The course delves into critical areas such as integrating secure software applications, implementing data security techniques, ensuring proper authentication and authorization, and managing secure cloud solutions. It also addresses emerging technologies, threat management, vulnerability assessment, and forensic analysis. By the end of the course, learners will be equipped to achieve the Security Practitioner Certification and demonstrate high-level security competencies.
Course Prerequisites
To ensure a productive learning experience in the CASP+ (CAS-004) course, the following prerequisites are recommended:
-
A minimum of ten years of IT administration experience, including at least five years of hands-on technical security experience.
-
Familiarity with enterprise security domains, such as network security, risk management, and incident response.
-
A solid understanding of various operating systems, virtualization software, and network technologies.
-
Knowledge of identity management, cryptography, and security controls.
-
Experience with laws, regulations, and compliance standards relevant to information security.
-
Ability to analyze and understand business and technical documentation, including policies, standards, procedures, and guidelines.
While these prerequisites provide a strong foundation, a commitment to learning and an eagerness to advance in cybersecurity can also support success in the course. The program is designed to help participants achieve their educational and professional goals.
Target Audience
The CASP+ (CAS-004) course is designed for:
-
IT Security Architects
-
IT Security Engineers
-
Security Analysts
-
Security Consultants
-
Cybersecurity Specialists
-
Technical Lead Analysts
-
Information Security Officers
-
Network Security Administrators
-
Security Operations Center (SOC) staff
-
Risk Management Professionals
-
System Integrators
-
IT Auditors focusing on cybersecurity
-
IT Managers with a focus on security practices
-
Cloud Security Engineers
-
Compliance Analysts
-
Disaster Recovery Managers
Course Outline
Module 1: Performing Risk Management Activities
-
Explain Risk Assessment Methods
-
Summarize the Risk Life Cycle
-
Assess and Mitigate Vendor Risk
Module 2: Governance and Compliance Strategies
-
Identifying Critical Data Assets
-
Compare and Contrast Regulation, Accreditation, and Standards
-
Explain Legal Considerations and Contract Types
Module 3: Implementing Business Continuity and Disaster Recovery
-
Explain the Role of Business Impact Analysis
-
Assess Disaster Recovery Plans
-
Explain Testing and Readiness Activities
Module 4: Identifying Infrastructure Services
-
Explain Critical Network Services
-
Explain Defensible Network Design
-
Implement Durable Infrastructures
Module 5: Performing Software Integration
-
Explain Secure Integration Activities
-
Assess Software Development Activities
-
Analyze Access Control Models and Best Practices
-
Analyze Development Models and Best Practices
Module 6: Virtualization, Cloud, and Emerging Technology
Module 7: Exploring Secure Configurations and System Hardening
Module 8: Security Considerations of Cloud and Specialized Platforms
Module 9: Implementing Cryptography
Module 10: Implementing Public Key Infrastructure (PKI)
Module 11: Threat and Vulnerability Management Activities
-
Explore Threat and Vulnerability Management Concepts
-
Explain Vulnerability and Penetration Test Methods
-
Explain Technologies Designed to Reduce Risk
Module 12: Developing Incident Response Capabilities
-
Analyzing and Mitigating Vulnerabilities
-
Identifying and Responding to Indicators of Compromise
-
Exploring Digital Forensic Concepts