Prepare for the CompTIA CASP+ exam with the course CASP+ CompTIA Advanced Security Practitioner (CAS-004). The course contains assessment questions, test sets, interactive lessons with knowledge checks and quizzes, and labs to provide a hands-on learning experience of security in a safe, online environment. It provides complete coverage of the CAS-004 exam objectives and it is designed to give you insight into the working world of IT security. It describes the types of tasks and activities that a security professional with 5–10 years of experience carries out.
What do you get:
The CompTIA CASP+ (CAS-004) certification is a globally recognized widely-trusted vendor-neutral credential. CASP+ covers the technical knowledge and skills required to architect, engineer, integrate, and implement secure solutions across complex environments to support a resilient enterprise while considering the impact of governance, risk, and compliance requirements. It is an advanced-level cybersecurity certification for security architects and senior security engineers charged with leading and improving an enterprise’s cybersecurity readiness.
Lessons 1: Introduction
- Before You Begin the CompTIA CASP+ Certification Exam
- Who Should Read This Course
- What You Will Learn
- How This Course Is Organised
- How to Use This Course
- Tips for Taking the CASP+ Exam
- CompTIA CASP+ Study Guide Exam Objectives
- The CASP+ Exam Objective Map
Lessons 2: Risk Management
- Risk Terminology
- The Risk Assessment Process
- Policies Used to Manage Employees
- Cost-Benefit Analysis
- Continuous Monitoring
- Enterprise Security Architecture Frameworks and Governance
- Training and Awareness for Users
- Best Practices for Risk Assessments
- Business Continuity Planning and Disaster Recovery
- Reviewing the Effectiveness of Existing Security Controls
- Conducting Lessons Learned and After-Action Reviews
- Creation, Collection, and Analysis of Metrics
- Analysing Security Solutions to Ensure They Meet Business Needs
- Testing Plans
- Internal and External Audits
- Using Judgment to Solve Difficult Problems
- Summary
- Exam Essentials
Lessons 3: Configure and Implement Endpoint Security Controls
- Hardening Techniques
- Trusted Operating Systems
- Compensating Controls
- Summary
- Exam Essentials
Lessons 4: Security Operations Scenarios
- Threat Management
- Actor Types
- Intelligence Collection Methods
- Frameworks
- Indicators of Compromise
- Response
- Summary
- Exam Essentials
Lessons 5: Security Ops: Vulnerability Assessments and Operational Risk
- Terminology
- Vulnerability Management
- Vulnerabilities
- Inherently Vulnerable System/Application
- Proactive Detection
- Summary
- Exam Essentials
Lessons 6: Compliance and Vendor Risk
- Shared Responsibility in Cloud Computing
- Security Concerns of Integrating Diverse Industries
- Regulations, Accreditations, and Standards
- Contract and Agreement Types
- Third-Party Attestation of Compliance
- Legal Considerations
- Summary
- Exam Essentials
Lessons 7: Cryptography and PKI
- The History of Cryptography
- Cryptographic Goals and Requirements
- Supporting Security Requirements
- Risks with Data
- Hashing
- Symmetric Algorithms
- Asymmetric Encryption
- Public Key Infrastructure Hierarchy
- Digital Certificates
- Implementation of Cryptographic Solutions
- Recognizing Cryptographic Attacks
- Troubleshooting Cryptographic Implementations
- Summary
- Exam Essentials
Lessons 8: Incident Response and Forensics
- The Incident Response Framework
- Forensic Concepts
- Forensic Analysis Tools
- Summary
- Exam Essentials
Lessons 9: Security Architecture
- Security Requirements and Objectives for a Secure Network Architecture
- Organisational Requirements for Infrastructure Security Design
- Integrating Applications Securely into an Enterprise Architecture
- Data Security Techniques for Securing Enterprise Architecture
- Security Requirements and Objectives for Authentication and Authorisation Controls
- Summary
- Exam Essentials
Lessons 10: Secure Cloud and Virtualisation
- Implement Secure Cloud and Virtualisation Solutions
- How Cloud Technology Adoption Impacts Organisation Security
- Summary
- Exam Essentials
Lessons 11: Mobility and Emerging Technologies
- Emerging Technologies and Their Impact on Enterprise Security and Privacy
- Secure Enterprise Mobility Configurations
- Security Considerations for Technologies, Protocols, and Sectors
- Summary
- Exam Essentials
Hands-on LAB Activities
Configure and Implement Endpoint Security Controls
- Running a Security Scanner to Identify Vulnerabilities
- Bypassing Command Shell Restrictions
Security Operations Scenarios
- Using the Social Engineering Toolkit
- Using WinDump
- Configuring a Standard ACL
Security Ops: Vulnerability Assessments and Operational Risk
- Using Burpsuite
- Simulating a DoS Attack
- Tracking Vulnerabilities in Software
- Performing Passive Reconnaissance
- Cracking Passwords using Pwdump7 and Cain and Abel
- Conducting Vulnerability Scanning using Nessus
- Performing Nmap Port Scanning
- Cracking a Linux Password using the John the Ripper To
- Using PuTTY
- Exploiting a Website using SQL Injection
- Conducting Cross-Site Request Forgery Attacks
- Attacking a Website using XSS Injection
Cryptography and PKI
- Observing an MD5-Generated Hash Value
- Using the SHA Series Algorithm
Incident Response and Forensics
- Using Steganography
- Observing an SHA256-Generated Hash Value
- Using TCPdump
- Using Netstat
- Using ExifTool
Security Architecture
- Configuring Iptables
- Testing an Antivirus Program
- Creating a Firewall Rule
- Attempting a Zone Transfer
- Installing and Configuring AD DS
Secure Cloud and Virtualisation
- Installing a Virtual Machine
- Capturing Packets using Wireshark
Exam FAQs
A minimum of ten years of general hands-on IT experience, with at least five years of broad hands-on security experience.
GBP £500
Pearson VUE
Summary
Standard:
Lessons:
11+ Lessons | 410+ Exercises | 200+ Quizzes | 313+ Flashcards | 209+ Glossary of Terms
Delivery Method:
Online
Language:
English