CompTIA Advanced Security Practitioner

This course can help you develop the skill set you need to confidently perform your duties as an advanced security professional.

CompTIA Advanced Security Practitioner (CASP)

Cyber security challenges demands IT professionals to demonstrate high level skill and the information and activities.

This course can help you develop the skill set you need to confidently perform your duties as an advanced security professional.

The course is designed for delegates who are seeking the CompTIA Advanced Security Practitioner (CASP) skill and certification.

To be ready for this course, delegates are advised to possess foundational knowledge of information security.

Skill Knowledge and certification in CompTIA Security+ or CompTIA CSA+ may be an advantage

We also suggest that you either undertake the following courses or possess the equivalent knowledge in the areas of computer networking and computer maintenance: CompTIA A+ and Network+

     Course Content

Managing Risk

·        Identify the Importance of Risk Management

·        Assess Risk

·        Mitigate Risk

·        Integrate Documentation into Risk Management

Integrating Computing, Communications, and Business Disciplines

·        Facilitate Collaboration Across Business Units

·        Secure Communications and Collaboration Solutions

·        Implement Security Activities Throughout the Technology Life Cycle

Using Research and Analysis to Secure the Enterprise

·        Determine Industry Trends and Effects on the Enterprise

·        Analyze Scenarios to Secure the Enterprise

Integrating Advanced Authentication and Authorization Techniques

·        Implement Authentication and Authorization Technologies

·        Implement Advanced Identity Management

Implementing Cryptographic Techniques

·        Describe Cryptographic Concepts

·        Choose Cryptographic Techniques

·        Choose Cryptographic Implementations

Implementing Security Controls for Hosts

·        Select Host Hardware and Software

·        Harden Hosts

·        Virtualize Servers and Desktops

·        Implement Cloud Augmented Security Services

           Implementing Security Controls for Enterprise Storage

·        Identify Storage Types and Protocols

·        Implement Secure Storage Controls

  Analyzing and Implementing Network Security

·        Analyze Network Security Components and Devices

·        Analyze Network-Enabled Devices

·        Analyze Advanced Network Design

·        Configure Controls for Network Security

Implementing Security Controls for Applications

·        Identify General Application Vulnerabilities

·        Identify Web Application Vulnerabilities

·        Implement Application Security Controls

Integrating Hosts, Storage, Networks, and Applications in a Secure Enterprise Architecture

·        Implement Security Standards in the Enterprise

·        Select Technical Deployment Models

·        Secure the Design of the Enterprise Infrastructure

·        Secure Enterprise Application Integration Enablers

Conducting Vulnerability Assessments

·        Select Vulnerability Assessment Methods

·        Select Vulnerability Assessment Tools

Responding to and Recovering from Incidents

·        Design Systems to Facilitate Incident Response

·        Conduct Incident and Emergency Responses

Fill Form

Training Type:CoorporatePrivate