CompTIA CASP+ (CAS-003) Course
Duration
2 Days
Entry Requirements
Minimum High School Diploma
Tuition
$950 (In-Class)
$250 (Online)
Course Delivery
On-Campus
Online
Program Overview
The CompTIA CASP+ training offers preparation for exam CAS-003. Practical examples and real-world insights illustrate critical topics and show what essential practices look like on the ground, while detailed explanations of technical and business concepts give you the background you need to apply identify and implement appropriate security solutions.
The next few years will bring a 45-fold increase in digital data, and at least one-third of that data will pass through the cloud. The level of risk to data everywhere is growing in parallel, and organizations are in need of qualified data security professionals.
Accreditation
CompTIA CASP+ Certificate
Study Outline
Day 1
Chapter 1 Cryptographic Tools and Techniques
- The History of Cryptography
- Cryptographic Services
- Symmetric Encryption
- Asymmetric Encryption
- Hybrid Encryption
- Hashing
- Digital Signatures
- Public Key Infrastructure
- Implementation of Cryptographic Solutions
- Cryptographic Attacks
- Summary
- Exam Essentials
- Review Questions
Chapter 2 Comprehensive Security Solutions
- Advanced Network Design
- TCP/IP
- Secure Communication Solutions
- Secure Facility Solutions
- Secure Network Infrastructure Design
- Summary
- Exam Essentials
- Review Questions
Chapter 3 Securing Virtualized, Distributed, and Shared Computing
- Enterprise Security
- Cloud Computing
- Virtualization
- Virtual LANs
- Virtual Networking and Security Components
- Enterprise Storage
- Summary
- Exam Essentials
- Review Questions
Chapter 4 Host Security
- Firewalls and Network Access Control
- Host-Based Firewalls
- Persistent Agent
- Non-Persistent Agent
- Agent-Based Technology
- Agentless-Based Technology
- Trusted Operating Systems
- Endpoint Security Solutions
- Anti-Malware
- Host Hardening
- Asset Management
- Data Exfiltration
- Intrusion Detection and Prevention
- Network Management, Monitoring, and Security Tools
- Summary
- Exam Essentials
- Review Questions
Chapter 5 Application Security and Penetration Testing
- Application Security Design Considerations
- Specific Application Issues
- Application Sandboxing
- Application Security Frameworks
- Software Assurance
- Development Approaches
- Secure Coding Standards
- Documentation
- Validation and Acceptance Testing
- Application Exploits
- Privilege Escalation
- Improper Storage of Sensitive Data
- Secure Cookie Storage and Transmission
- Context-Aware Management
- Malware Sandboxing
- Pivoting
- Open-Source Intelligence
- Memory Dumping
- Client-Side Processing vs. Server-Side Processing
- Security Assessments and Penetration Testing
- Red, Blue, and White Teaming
- Vulnerability Assessment Areas
- Security Assessment and Penetration Test Tools
- Summary
- Exam Essentials
- Review Questions
Day 2
Chapter 6 Risk Management
- Risk Terminology
- Identifying Vulnerabilities
- Operational Risks
- The Risk Assessment Process
- Best Practices for Risk Assessments
- Summary
- Exam Essentials
- Resources
- Review Questions
Chapter 7 Policies, Procedures, and Incident Response
- A High-Level View of Documentation
- Business Documents Used to Support Security
- Documents and Controls Used for Sensitive Information
- Training and Awareness for Users
- Auditing Requirements and Frequency
- The Incident Response Framework
- Incident and Emergency Response
- Summary
- Exam Essentials
- Review Questions
Chapter 8 Security Research and Analysis
- Applying Research Methods to Determine Industry Trends and Their Impact on the Enterprise
- Analyze Scenarios to Secure the Enterprise
- Summary
- Exam Essentials
- Review Questions
Chapter 9 Enterprise Security Integration
- Integrate Enterprise Disciplines to Achieve Secure Solutions
- Integrate Hosts, Storage, Networks, and Applications into a Secure Enterprise Architecture
- Integrate Mobility Management
- Summary
- Exam Essentials
- Review Questions
Chapter 10 Security Controls for Communication and Collaboration
- Selecting the Appropriate Control to Secure Communications and Collaboration Solutions
- Integrate Advanced Authentication and Authorization Technologies to Support Enterprise Objectives
- Implement Security Activities across the Technology Life Cycle
- Physical Security Tools for Security Assessment
- Summary
- Exam Essentials
- Review Questions