CompTIA Advanced Security Practitioner (CASP+) Certification Prep (Exam CAS-004)
Overview
Master the skills in developing security solutions to protect complex environments. CompTIA CASP+ course introduces experienced security professionals to enterprise security architecture and operations, risk management, cryptography, governance, risk, and compliance topics.
About the course
CISO Executive: Covers risk management, enterprise security architecture, security operations, and research and development for chief information security officers.
- Risk Management
- Technical Integration of Enterprise Security
- Enterprise Security Architecture
- Research, Development & Collaboration
- Enterprise Security Operations
Course content
Course Outline
Security Architecture
- Analyze the security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network
- Analyze the organizational requirements to determine the proper infrastructure security design
- Integrate software applications securely into an enterprise architecture
- Implement data security techniques for securing enterprise architecture
- Analyze the security requirements and objectives to provide the appropriate authentication and authorization controls
- Implement secure cloud and virtualization solutions
- Explain how cryptography and public key infrastructure (PKI) support security objectives and requirements
- Explain the impact of emerging technologies on enterprise security and privacy
Security Operations
- Perform threat management activities
- Analyze indicators of compromise and formulate an appropriate response
- Perform vulnerability management activities
- Use the appropriate vulnerability assessment and penetration testing methods and tools
- Analyze vulnerabilities and recommend risk mitigations
- Use processes to reduce risk
- Implement the appropriate response
- Explain the importance of forensic concepts
- Use forensic analysis tools
Security Engineering and Cryptography
- Apply secure configurations to enterprise mobility
- Configure and implement endpoint security controls
- Explain security considerations impacting specific sectors and operational technologies
- Explain how cloud technology adoption impacts organizational security
- Implement the appropriate PKI solution
- Implement the appropriate cryptographic protocols and algorithms
- Troubleshoot issues with cryptographic implementations
Governance, Risk, and Compliance
- Apply the appropriate risk strategies
- Explain the importance of managing and mitigating vendor risk
- Explain compliance frameworks and legal considerations, and their organizational impact
- Explain the importance of business continuity and disaster recovery concepts