0345 4506120

CompTIA Advanced Security Practitioner (CASP)

Course Details

Name CompTIA Advanced Security Practitioner (CASP)
Description
URL
Location:
Virtual Classroom
Start Date:
Working Days:
Price:
£1699.00 +vat
Availability:
Exam:
Residential:
Course ID:
456471

Overview

Special Notices

This course leads to a certification.

In this course, which prepares you for the CompTIA Advanced Security Practitioner exam,you will expand on your knowledge of information security to apply more advanced principles that will keep your organization safe from the many ways it can be threatened. You'll apply critical thinking and judgment across a broad spectrum of security disciplines to propose and implement sustainable security solutions that map to organizational strategies; translate business needs into security requirements; support IT governance and risk management; architect security for hosts, networks, and software; respond to security incidents; and more.

Learning Objectives

In this course, you will analyze and apply advanced security concepts, principles, and implementations that contribute to enterprise-level security.

You will:

  • Support IT governance in the enterprise with an emphasis on managing risk.
  • Leverage collaboration tools and technology to support enterprise security.
  • Use research and analysis to secure the enterprise.
  • Integrate advanced authentication and authorization techniques.
  • Implement cryptographic techniques, security controls for hosts and mobile devices, network security, and security in the systems and software development lifecycle.
  • Integrate hosts, storage, networks, applications, virtual environments, and cloud technologies in a secure enterprise architecture.
  • Conduct security assessments; responding to and recovering from security incidents.

Pre-Requisites

Before attending this course, you should have:

Network & Security Foundation, Cyber Analyst or equivalent knowledge e.g. Foundation Certificate in Cyber Security or Network Security Foundation.

This course is designed for IT professionals in the cybersecurity industry whose primary job responsibility is to secure complex enterprise environments. The target student should have real-world experience with the technical administration of these enterprise environments. It is recommended for students with at least 10 years of experience in IT management, with at least 5 of those years in hands-on technical security.

Course Content

1 - SUPPORTING IT GOVERNANCE AND RISK MANAGEMENT

  • Identify the Importance of IT Governance and Risk Management
  • Assess Risk
  • Mitigate Risk
  • Integrate Documentation into Risk Management

2 - LEVERAGING COLLABORATION TO SUPPORT SECURITY

  • Facilitate Collaboration Across Business Units
  • Secure Communications and Collaboration Solutions

3 - USING RESEARCH AND ANALYSIS TO SECURE THE ENTERPRISE

  • Determine Industry Trends and Their Effects on the Enterprise
  • Analyze Scenarios to Secure the Enterprise

4 - INTEGRATING ADVANCED AUTHENTICATION AND AUTHORIZATION TECHNIQUES

  • Implement Authentication and Authorization Technologies
  • Implement Advanced Identity and Access Management

5 - IMPLEMENTING CRYPTOGRAPHIC TECHNIQUES

  • Select Cryptographic Techniques
  • Implement Cryptography

6 - IMPLEMENTING SECURITY CONTROLS FOR HOSTS

  • Select Host Hardware and Software
  • Harden Hosts
  • Virtualize Servers and Desktops
  • Protect Boot Loaders

7 - IMPLEMENTING SECURITY CONTROLS FOR MOBILE DEVICES

  • Implement Mobile Device Management
  • Address Security and Privacy Concerns for Mobile Devices

8 - IMPLEMENTING NETWORK SECURITY

  • Plan Deployment of Network Security Components and Devices
  • Plan Deployment of Network-Enabled Devices
  • Implement Advanced Network Design
  • Implement Network Security Controls

9 - IMPLEMENTING SECURITY IN THE SYSTEMS AND SOFTWARE DEVELOPMENT LIFECYCLE

  • Implement Security Throughout the Technology Lifecycle
  • Identify General Application Vulnerabilities
  • Identify Web Application Vulnerabilities
  • Implement Application Security Controls

10 - INTEGRATING ASSETS IN A SECURE ENTERPRISE ARCHITECTURE

  • Integrate Standards and Best Practices in Enterprise Security
  • Select Technical Deployment Models
  • Integrate Cloud-Augmented Security Services
  • Secure the Design of the Enterprise Infrastructure
  • Integrate Data Security in the Enterprise Architecture
  • Integrate Enterprise Applications in a Secure Architecture

11 - CONDUCTING SECURITY ASSESSMENTS

  • Select Security Assessment Methods
  • Perform Security Assessments with Appropriate Tools

12 - RESPONDING TO AND RECOVERING FROM INCIDENTS

  • Prepare for Incident Response and Forensic Investigations
  • Conduct Incident Response and Forensic Analysis

Attend From Anywhere

Description:

How Attend from Anywhere works

Our ‘Attend from Anywhere’ courses allow you to access award-winning classroom training without leaving your home or office. We use WebEx web and video conferencing platform by Cisco. Before you book you should check to ensure you meet the WebEx system requirements and run a test meeting to ensure the software is compatible with your firewall settings (if it doesn’t work you should adjust your settings or contact your IT department about permitting the website).

WebEx system requirements >

Run a WebEx test meeting >

  • Up to three weeks before the start of the course we will send you Joining Instructions by email.
  • You should enter ‘My Virtual Account’ to update your address for courseware and book a pre-test with a member of the Virtual Learning Team, who will check everything works.
  • 15 minutes before the course begins you should launch the software, connect your audio and familiarise yourself with the interface and how the virtual interactions work.
  • The course will be split into multiple sessions, with short breaks in between so you can stay focused and refreshed.
  • Throughout the course the learning professional will use an electronic whiteboard, which will transmit all the notes directly to your screen.
  • You can ask the learning professional a question at any time, either by simply speaking aloud through your microphone or by clicking the virtual ‘raise-a-hand’ button on the interface.
  • Towards the end of the course there will be plenty of time for detailed Q&As with the learning professional, just as if you were physically in the classroom.
  • Following the course you will be asked to complete a course evaluation form, which will allow you to give detailed feedback on your experience and help us to make future improvements.
  • For four weeks after the course has finished you will have on-demand access to helpful videos on the subject matter, and we may send you useful emails reminding you of the ‘Key Learning Points’.

Benefits of Attend from Anywhere

Access to experts

Receive full support from our subject-matter experts for the duration of your course.

Convenient

Access your training from home, the office, or anywhere with internet access.

Cost-effective

Save money on training and expenses like transport, hotels, meals and childcare.

Quality

Our technology makes our online courses the same high quality as our classroom training.

Time-efficient

Reduce time out of the office and time spent travelling to and from training centres.

FAQ

What equipment do I need for an Attend from Anywhere course?

You will need an internet-connected computer and a USB headset with an in-built mic to interact with the trainer. Two monitors are recommended; one to stream the video from the classroom and the other to display the interactive interface.

How reliable are Attend from Anywhere courses?

We use leading Cisco technology and our classrooms are specifically optimised to improve sound quality for remote attendees. We also offer a pre-test so you can test everything is working before the course starts.

How are remote attendees made to fell included?

Our trainers are specially trained on how to interact with remote attendees and our technology allows them to take over remote PCs. Our remote labs ensure all participants can take part in hands-on class exercises wherever they are.

What makes Attend from Anywhere courses cost effective?

Our technology makes our Attend from Anywhere courses the same high-quality experience as our classroom training, so we do not price them differently. However, organisations and individuals do make significant financial savings by booking this type of course when associated costs (such as travel, expenses, hotels, food and childcare) are factored in.

How can I take the exam remotely?

You may be able to take your exam via one of our accredited remote live proctors. Where this is not possible you may be issued with an exam voucher or required to attend a classroom in order to take the exam. Please contact us for specific details in relation to your course.

If you are able to take your exam remotely you need to book it before the course begins  and switch on a webcam to enable invigilation and show photo ID (please note that exam slots are subject to availability with the live proctors and may not be available during the week of the exam. Exam slots are booked on a first come first served basis).

Click here to test if your hardware is compatible

 

This exam will test the technical knowledge and skills you require to conceptualise, engineer, integrate and implement secure solutions across complex environments to support a resilient enterprise.

Number of Questions: Maximum of 90 questions

Type of Questions: Multiple choice and performance-based

Length of Test: 165 Minutes

Passing Score: Pass/Fail only, no scaled score

Exam voucher provided

Our Customers Include