This CASP+ Training course prepares you for the CompTIA CASP+ certification exam (CAS-004) and demonstrates your knowledge and skills in enterprise security, risk management, research and analysis, and the integration of computing, communications, and business disciplines. You will learn through a CompTIA-approved CASP+ training program and receive after-course instructor coaching and an exam voucher.
The course is available in-person or online, with virtual instructor-led training and virtual classroom options, providing a flexible and convenient learning experience.
Passing the CompTIA CASP+ Certification Exam meets U.S. DoD Directive 8140/8570.01 Technical (IAT) Level-III, Management (IAM) Level-II and Information Assurance Security Architect/Engineer (IASAE) Level-I and Level II requirements.
CASP+ Training Delivery Methods
CASP+ Training Information
In this course, you will learn how to:
- Experience an Official CompTIA- CASP+ training program.
- Receive after-course instructor coaching and an exam voucher.
- Prepare for the CompTIA Advanced Security Practitioner (CASP+) Certification Exam.
- Investigate enterprise storage requirements.
- Examine risk management security policies and procedures.
- Research potential threats and identify appropriate countermeasures.
- Evaluate collaboration methodologies for secure communications.
- Continue learning and face new challenges with after-course one-on-one instructor coaching.
- Learning Tree course 446, CompTIA Security+® Training, or equivalent experience
- Ten years of IT (Information Technology) administration experience, including at least five years of hands-on technical security experience
You must pass the CompTIA Advanced Security Practitioner (CASP+) certification exam to earn this certification. Exam vouchers are available upon request and included in the tuition fee.
CASP+ Training Outline
- Examination and certification goals
- The five domains of the exam
- Learning techniques
Identifying security concerns in scenarios
- Exploring cryptographic techniques
- Advanced PKI concepts
Distinguishing between cryptographic concepts
- Confusion and diffusion
- Chain of trust
Securing enterprise storage
- Examining storage types and protocols
- Secure storage management
Analyzing network security architectures
- Designing secure networks
- Employing virtual networking solutions
Troubleshooting security controls for hosts
- Host security: trusted OS (Operating System), endpoint, host hardening
- Vulnerabilities in co-mingling of hosts
Differentiating application vulnerabilities
- Web application security
- Application security concerns
- Mitigating client-side vs. server-side processing
Interpreting business and industry influences and risks
- Analyzing risk scenarios
- Identifying the impact of de-perimeterization
Executing risk mitigation planning, strategies, and control
- Assessing the CIA aggregate scores
- Making risk determination
Privacy policies and procedures
- Developing policies to support business objectives
- Safeguarding Personally Identifiable Information (PII)
Conduct incident response and recovery procedures
- Constructing a data inventory with e-discovery
- Minimizing the severity of data breaches
Determining industry trends impact to the enterprise
- Performing ongoing research to support best practices
- Researching security requirements for contracts
Appropriate security document usage
- Request for Information (RFI)
- Request for Quote (RFQ)
- Request for Proposal (RFP)
Evaluating scenarios to determine how to secure the enterprise
- Conducting cost-benefit and security solution analysis
- Reviewing the effectiveness of existing security controls
Conducting an assessment and analyzing the results
- Determining appropriate tools for data gathering
- Identifying methods to perform assessments
Collaborating across diverse business units to achieve security goals
- Communicating with stakeholders
- Interpreting security requirements and providing guidance
- Identifying secure communications goals
Selecting controls for secure communications
- Utilizing unified collaboration tools
- Mobile devices
- Applying over-the-air technologies
Implementing security across the technology life cycle
- Selecting security controls
- Developing Security Requirements Traceability Matrices
Integrate devices into a secure enterprise architecture
- Securing data following existing security standards
- Applying technical deployment models
- Integrating storage and applications into the enterprise
Integrating advanced authentication and authorization technologies
- Implementing certificate-based and SSO authentication
- Applying federation solutions