Class Is Recorded with Unlimited Access for 90-Days
We Coach Until You Pass
100 % Exam Pass Guarantee
12-Additional Hours of Exam Review at No Charge
Overview
Welcome to CompTIA Advanced Security Practitioner CAS-003. This course provides the knowledge needed to implement security solutions within an enterprise policy framework, using a vendor-neutral format. This includes risk and vulnerability management programs, organizational policies and training, applied cryptography, system security, network security, identity management, and incident response. This course maps to the CompTIA CASP certification exam. Objective coverage is marked throughout the course.
Students will benefit most from this course if they intend to take a CompTIA Advanced Security Practitioner CASP-003 exam.
Benefits:
- Pass your exam, guaranteed (if you don’t pass, you’ll be coached until you do)
- Intensive Authorized Virtual-Live Training (online live sessions)
- Post-training Virtual-Live exam mentoring and coaching sessions for 3-weeks (6 total events or 12-hours of exam coaching) via the student portal
- YOUR live class is recorded and turned into eLearning with 3-months access via the student portal
- Message your trainer in-platform until you pass
- Access mock exams, exam prep, and assessments to ensure you are ready to test
Curriculum
Introduction
Course setup
Chapter 1: Risk management
Module A: Security concepts
Module B: Threats and vulnerabilities
Module C: Risk assessment
Module D: Risk management
Summary: Cybersecurity fundamentals
Chapter 2: Vulnerability management
Module A: Security research
Module B: Vulnerability assessment
Module C: Vulnerability management programs
Summary: Vulnerability management
Chapter 3: Organizational security
Module A: Security frameworks
Module B: Security policies
Module C: Controls and procedures
Module D: Training and coordination
Summary: Organizational Security
Chapter 4: Applied cryptography
Module A: Cryptographic principles
Module B: Public key infrastructure
Module C: Cryptographic protocols
Summary: Applied cryptography
Chapter 5: Secure systems integration
Module A: Architecture integration
Module B: Securing data
Module C: Resilience and business continuity
Module D: Fault tolerance and recovery
Summary: Secure systems integration
Chapter 6: Integrated host security
Module A: Securing hosts
Module B: Mobile device security
Module C: Virtual and cloud systems
Summary: Securing hosts and data
Chapter 7: Secure development
Module A: Software vulnerabilities
Module B: Software development
Summary: Secure development
Chapter 8: Network security architecture
Module A: Packet flow
Module B: Network security systems
Module C: Network access technologies
Summary: Network security architecture
Chapter 9: Secure network configuration
Module A: Hardening networks
Module B: Securing communications
Summary: Secure network configuration
Chapter 10: Scanning and monitoring
Module A: Reconnaissance techniques
Module B: Active reconnaissance
Module C: Network logging
Module D: Data analysis
Summary: Scanning and monitoring
Chapter 11: Identity management
Module A: Identity systems
Module B: Authentication technologies
Summary: Identity management
Chapter 12: Incident response
Module A: Incident response planning
Module B: Incident response procedures
Module C: Forensic toolkits
Summary: Incident response
Appendix A: Glossary