CompTIA Advanced Security Practitioner (CASP+)
5-Day Course

Course Overview

CompTIA Advanced Security Practitioner (CASP) CAS-003 course provides the knowledge needed to implement security solutions within an enterprise policy framework, using a vendor-neutral format. This includes risk and vulnerability management programs, organizational policies and training, applied cryptography, system security, network security, identity management, and incident response. This course maps to the CompTIA CASP certification exam. Objective coverage is marked throughout the course.

Contact Us

Why Choose 327 Solutions for CompTIA Training?

327 Solutions has been delivering CompTIA training for decades

327 Solutions deploys our trainers to world class education center and institutions of higher education

327 Solutions guarantees that you will pass your exam, or you can resit any class at no-charge

327 Solutions utilizes a blended learning model with pre-class level setting, intensive in-class training with labs, and post-training support

Every class attendee will receive 40 PDU/CEUs and a Certificate of Completion

Course Outline

Course Objectives

  • Enterprise security domain expanded to include operations and architecture concepts, techniques and requirements
  • More emphasis on analyzing risk through interpreting trend data and anticipating cyber defense needs to meet business goals
  • Expanding security control topics to include mobile and small-form factor devices, as well as software vulnerability
  • Broader coverage of integrating cloud and virtualization technologies into a secure enterprise architecture
  • Inclusion of implementing cryptographic techniques, such as blockchain, cryptocurrency and mobile device encryption
  • Compliant with ISO 17024 and approved for DoD 8140/8570

Course Content

Chapter 1: Cybersecurity fundamentals

  • Module A: Security concepts
  • Module B: Risk management
  • Module C: Threats and vulnerabilities

Chapter 2: Recognizing vulnerabilities

  • Module A: Common vulnerabilities
  • Module B: Network vulnerabilities
  • Module C: Application exploits

Chapter 3: Vulnerability management

  • Module A: Vulnerability assessment
  • Module B: Vulnerability management programs

Chapter 4: Reconnaissance

  • Module A: Reconnaissance techniques
  • Module B: Active reconnaissance
  • Module C: Analyzing scan results

Chapter 5: Monitoring networks

  • Module A: Network security systems
  • Module B: Logging and monitoring
  • Module C: Network analysis

Chapter 6: Policy design

  • Module A: Security frameworks
  • Module B: Security policies
  • Module C: Controls and procedures

Chapter 7: Secure network design

  • Module A: Hardening networks
  • Module B: Cryptography
  • Module C: Hardening hosts and devices
  • Module D: Secure application development

Chapter 8: Identity management

  • Module A: Identity systems
  • Module B: Authentication technologies

Chapter 9: Incident response

  • Module A: Incident response planning
  • Module B: Incident response procedures
  • Module C: Forensic toolkits

Appendix A: Glossary


A minimum of 5-years cybersecurity experience recommended.

Who Should Attend

Executive leadership and practitioners who implement security solutions within an enterprise environment, and those seeking 8140/8570 compliance

Need more information? Contact us now!