CASP+ – CompTIA Advanced Security Practitonier (CAS-003)

  • Vendor: CompTIA
  • Class: 5 Days
  • Voucher: Yes
  • Certification: CASP Certified
  • Exam Method: Virtual Exam at Home
  • 5 Days
  • Virtual - Live

Class Is Recorded with Unlimited Access for 90-Days

We Coach Until You Pass

100 % Exam Pass Guarantee

12-Additional Hours of Exam Review at No Charge

Overview

Welcome to CompTIA Advanced Security Practitioner CAS-003. This course provides the knowledge needed to implement security solutions within an enterprise policy framework, using a vendor-neutral format. This includes risk and vulnerability management programs, organizational policies and training, applied cryptography, system security, network security, identity management, and incident response. This course maps to the CompTIA CASP certification exam. Objective coverage is marked throughout the course.

Students will benefit most from this course if they intend to take a CompTIA Advanced Security Practitioner CASP-003 exam.

Benefits:

  1. Pass your exam, guaranteed (if you don’t pass, you’ll be coached until you do)
  2. Intensive Authorized Virtual-Live Training (online live sessions)
  3. Post-training Virtual-Live exam mentoring and coaching sessions for 3-weeks (6 total events or 12-hours of exam coaching) via the student portal
  4. YOUR live class is recorded and turned into eLearning with 3-months access via the student portal
  5. Message your trainer in-platform until you pass
  6. Access mock exams, exam prep, and assessments to ensure you are ready to test

Curriculum

Introduction

Course setup

Chapter 1: Risk management

Module A: Security concepts

Module B: Threats and vulnerabilities

Module C: Risk assessment

Module D: Risk management

Summary: Cybersecurity fundamentals

Chapter 2: Vulnerability management

Module A: Security research

Module B: Vulnerability assessment

Module C: Vulnerability management programs

Summary: Vulnerability management

Chapter 3: Organizational security

Module A: Security frameworks

Module B: Security policies

Module C: Controls and procedures

Module D: Training and coordination

Summary: Organizational Security

Chapter 4: Applied cryptography

Module A: Cryptographic principles

Module B: Public key infrastructure

Module C: Cryptographic protocols

Summary: Applied cryptography

Chapter 5: Secure systems integration

Module A: Architecture integration

Module B: Securing data

Module C: Resilience and business continuity

Module D: Fault tolerance and recovery

Summary: Secure systems integration

Chapter 6: Integrated host security

Module A: Securing hosts

Module B: Mobile device security

Module C: Virtual and cloud systems

Summary: Securing hosts and data

Chapter 7: Secure development

Module A: Software vulnerabilities

Module B: Software development

Summary: Secure development

Chapter 8: Network security architecture

Module A: Packet flow

Module B: Network security systems

Module C: Network access technologies

Summary: Network security architecture

Chapter 9: Secure network configuration

Module A: Hardening networks

Module B: Securing communications

Summary: Secure network configuration

Chapter 10: Scanning and monitoring

Module A: Reconnaissance techniques

Module B: Active reconnaissance

Module C: Network logging

Module D: Data analysis

Summary: Scanning and monitoring

Chapter 11: Identity management

Module A: Identity systems

Module B: Authentication technologies

Summary: Identity management

Chapter 12: Incident response

Module A: Incident response planning

Module B: Incident response procedures

Module C: Forensic toolkits

Summary: Incident response

Appendix A: Glossary

Upcoming Public Training

Upcoming Classes

Do not sell my info