Level: Advanced

CompTIA Advanced Security Practitioner (CASP) CAS 003

5 Day | Instructor Led

The CASP certification is a vendor-neutral, intensive exam that validates your knowledge and skills in enterprise security, risk management, research and analysis, and the integration of computing, communications and business disciplines. This exam preparation course provides in-depth review of the four domains included in the exam. Demonstrations and practice exams reinforce the concepts and provide the framework for a personalized study plan for exam success.

Inquire About
CompTIA Advanced Security Practitioner (CASP) CAS 003

Ideal Candidates for CompTIA Advanced Security Practitioner (CASP) CAS 003 Class

Individuals seeking the CompTIA Advanced Security Practitioner (CASP) certification (Exam CAS-003)
IT professionals with a minimum of 10 years of experience in IT administration and at least five years of hands-on security in an enterprise environment

CompTIA Advanced Security Practitioner (CASP) CAS 003 Prerequisites

The CompTIA Security+ certification or equivalent experience is highly recommended.

What You'll Get in CompTIA Advanced Security Practitioner (CASP) CAS 003

Expert Level Instruction
CompTIA Official Curriculum
Daily Homework Questions (Over 600 Questions)
Daily Quiz Questions (Over 600 Questions)
Course Related Readings (Reinforcement)
Daily Exercises to Reinforce Memory Recall - Cognitive Core

What You'll Learn in CompTIA Advanced Security Practitioner (CASP) CAS 003

Successfully prepare for the CompTIA Advanced Security Practitioner (CASP) Certification Exam
Explore proven protocols and assessment tools to secure the enterprise
Investigate end-point security and host hardenening to protect against attacks
Examine risk management security policies and procedures
Research potential security threats and identify appropriate countermeasures
Evaluate collaboration methologies for security communications

CompTIA Advanced Security Practitioner (CASP) CAS 003 Certification

CompTIA Advanced Security Practitioner Certification CAS 003

CompTIA Advanced Security Practitioner (CASP) CAS 003 Outline

1. Managing Risk

  • Identify the Importance of Risk Management
  • Assess Risk
  • Mitigate Risk
  • Integrate Documentation into Risk Management

2. Integrating Computing, Communications, and Business Disciplines

  • Facilitate Collaboration Across Business Units
  • Secure Communications and Collaboration Solutions
  • Implement Security Activities Throughout the Technology Life Cycle

3. Using Research and Analysis to Secure the Enterprise

  • Determine Industry Trends and Effects on the Enterprise
  • Analyze Scenarios to Secure the Enterprise

4. Integrating Advanced Authentication and Authorization Techniques

  • Implement Authentication and Authorization Technologies
  • Implement Advanced Identity Management

5. Implementing Cryptographic Techniques

  • Describe Cryptographic Concepts
  • Choose Cryptographic Techniques
  • Choose Cryptographic Implementations

6. Implementing Security Controls for Hosts

  • Select Host Hardware and Software
  • Harden Hosts
  • Virtualize Servers and Desktops
  • Implement Cloud Augmented Security Services
  • Protect Boot Loaders

7. Implementing Security Controls for Enterprise Storage

  • Identify Storage Types and Protocols
  • Implement Secure Storage Controls

8. Analyzing and Implementing Network Security

  • Analyze Network Security Components and Devices
  • Analyze Network-Enabled Devices
  • Analyze Advanced Network Design
  • Configure Controls for Network Security

9. Implementing Security Controls for Applications

  • Identify General Application Vulnerabilities
  • Identify Web Application Vulnerabilities
  • Implement Application Security Controls

10. Integrating Hosts, Storage, Networks, and Applications in a Secure Enterprise Architecture

  • Implement Security Standards in the Enterprise
  • Select Technical Deployment Models
  • Secure the Design of the Enterprise Infrastructure
  • Secure Enterprise Application Integration Enablers

11. Conducting Vulnerability Assessments

  • Select Vulnerability Assessment Methods
  • Select Vulnerability Assessment Tools

12. Responding to and Recovering from Incidents

  • Design Systems to Facilitate Incident Response
  • Conduct Incident and Emergency Responses

Testimonials

A. Erlich

RITSC, N6C

I just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.

Wilder Guerra

US Navy Reserve

This course is definitely an eye opener. With how much social media has taken over, it is important to be fully aware of the capabilities along with all the risks it brings. It is important to get this course because social media is the new norm.

Rebekah Coughlin

MicroTech

The Social Media and Security Training course offered by UKI is a great and beneficial course combining technical training to fully understand TCP IP networking, DNS, and the harms of malware and cross-site scripting; as well as practical training that allowed attendees to play with open source social intelligence gathering solutions. This is the perfect class for those involved in IT security and interested in social media and identity theft.


Top Related Courses

Advanced Cyber Range Environment (ACRE) - Ransomware Exercise

The Ransomware exercise is a customized, six-hour, live fire Cyber Range training exercise hosted on ACRE. This exercise is led by expert cyber security engineers and can be executed in a classroom as well as remotely. In this exercise, a ransomware-based attack (i.e., “WannaKry”) is launched via a malicious spear phishing originated compromise. This exercise includes a hands-on keyboard interface, which creates realistic technical training and management interaction opportunities. This exercise is not simulated – it is real malware, detonated in representative network enviroment. Participants are encouraged to view the attack as if it were happening to their institutions in real time, and asked to share what they have done or would do based on the facts provided. Such “range-based” exercises help institutions better understand the impact of an attack and prompt them to improve the ways in which their network defenders respond, communicate, request assistance, and recover from real-world cyber attacks. Institutions that have participated in this exercise have benefited directly by building greater interaction with their security community, as well as increasing capability maturity levels and resiliency across their specific customer sector.


Certified Ethical Hacker (CEH)

This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. CEH provides a comprehensive ethical hacking and network security-training program to meet the standards of highly skilled security professionals. Hundreds of SMEs and authors have contributed towards the content presented in the CEH courseware. Latest tools and exploits uncovered from the underground community are featured in the new package.


CompTIA Cybersecurity Analyst (CSA+)

CompTIA's Cybersecurity Analyst (CSA+) training from UKI teaches students to apply behavioral analytics to improve the overall state of IT security, providing critical knowledge and skills that are required to prevent, detect and combat cybersecurity threats.


© 2018 Ultimate Knowledge Insitute | All Rights Reserved | GSA# GS-35F-0469W