Aaralias Technologies

CompTIA Advanced Security Practitioner (CASP+) Certification Prep (Exam CAS-004)

Overview

Master the skills in developing security solutions to protect complex environments. CompTIA CASP+ course introduces experienced security professionals to enterprise security architecture and operations, risk management, cryptography, governance, risk, and compliance topics.

About the course

CISO Executive: Covers risk management, enterprise security architecture, security operations, and research and development for chief information security officers.

  • Risk Management
  • Technical Integration of Enterprise Security
  • Enterprise Security Architecture
  • Research, Development & Collaboration
  • Enterprise Security Operations

Course content

Course Outline

Security Architecture

  • Analyze the security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network
  • Analyze the organizational requirements to determine the proper infrastructure security design
  • Integrate software applications securely into an enterprise architecture
  • Implement data security techniques for securing enterprise architecture
  • Analyze the security requirements and objectives to provide the appropriate authentication and authorization controls
  • Implement secure cloud and virtualization solutions
  • Explain how cryptography and public key infrastructure (PKI) support security objectives and requirements
  • Explain the impact of emerging technologies on enterprise security and privacy

Security Operations

  • Perform threat management activities
  • Analyze indicators of compromise and formulate an appropriate response
  • Perform vulnerability management activities
  • Use the appropriate vulnerability assessment and penetration testing methods and tools
  • Analyze vulnerabilities and recommend risk mitigations
  • Use processes to reduce risk
  • Implement the appropriate response
  • Explain the importance of forensic concepts
  • Use forensic analysis tools

Security Engineering and Cryptography

  • Apply secure configurations to enterprise mobility
  • Configure and implement endpoint security controls
  • Explain security considerations impacting specific sectors and operational technologies
  • Explain how cloud technology adoption impacts organizational security
  • Implement the appropriate PKI solution
  • Implement the appropriate cryptographic protocols and algorithms
  • Troubleshoot issues with cryptographic implementations

Governance, Risk, and Compliance

  • Apply the appropriate risk strategies
  • Explain the importance of managing and mitigating vendor risk
  • Explain compliance frameworks and legal considerations, and their organizational impact
  • Explain the importance of business continuity and disaster recovery concepts