Chapter 1: Governance and compliance
Module A: Security governance
Module B: Regulatory compliance
Module C: Standards and frameworks
Chapter 2: Security program design
Module A: Controls and procedures
Module B: Security program management
Chapter 3: Risk management
Module A: Risk assessment
Module B: Risk management strategies
Chapter 4: Threat management
Module A: Threats and vulnerabilities
Module B: Threat intelligence sources
Module C: Applied intelligence
Chapter 5: Cryptographic techniques
Module A: Cryptographic principles
Module B: Ciphers and hashes
Chapter 6: Applied cryptography
Module A: Public key infrastructure
Module B: Cryptographic protocols
Chapter 7: Authentication and authorization
Module A: Access control components
Module B: Authentication technologies
Chapter 8: Secure architecture
Module A: Hardware security
Module B: Resilient architecture
Chapter 9: Automated systems
Module A: Security automation
Module B: Artificial intelligence
Chapter 10: Protecting hosts and data
Module A: Host security tools
Module B: Securing endpoints and servers
Module C: Data security
Chapter 11: Network security architecture
Module A: Network security infrastructure
Module B: Secure network configuration
Chapter 12: Threat detection
Module A: Threat detection systems
Module B: Network sensors
Chapter 13: Threat analysis
Module A: Data aggregation and analysis
Module B: Forensic analysis
Chapter 14: Specialized infrastructure security
Module A: Specialized systems
Module B: Secure cloud infrastructure
Chapter 15: Secure applications
Module A: Secure systems development
Module B: Application vulnerabilities
Chapter 16: Security assessment and testing
Module A: Security testing programs
Module B: Vulnerability and patch management
Our CompTIA SecurityX courseware is a complete instructor-led training solution with conceptual material and lab exercises covering all exam objectives. Within the courseware itself you will find instructions for downloading a lab environment based on virtual machines (VMs). After installation, you will be able to run all the exercises in the course. This lab option is included in the base price of the courseware.
You can also select the Online Labs option for an additional charge. With the Online Labs, there are no computer setup requirements other than an internet connection and a web browser. Each student is assigned a voucher code. After logging in, students will work in a VM-based lab environment (with accompanying instructions) right in their browsers. It’s the same labs and lab environment that are included with our standard course, just much easier to set up and access. Actually, there's no setup at all! The access period is six months from redemption of the voucher code. (Instructor codes are good for one year.)
For more information about our CompTIA lab options, please call 1-888-330-9071 or send an e-mail to sales@30bird.com.
Welcome to CompTIA SecurityX Certification CAS-005. This course provides the knowledge needed to implement security solutions within an enterprise policy framework, using a vendor-neutral format. This includes GRC and vulnerability management programs, applied cryptography, system and network security, identity management, secure development, and incident response. This course maps to the CompTIA CASP+ certification exam. Objective coverage is marked throughout the course. You can download an objective map for the course from http://www.30bird.com.
You will benefit most from this course if you intend to take a CompTIA SecurityX CAS-005 exam.
This course assumes that you have some applied knowledge of computers, TCP/IP networks, and cybersecurity principles. Knowledge equivalent to the CompTIA Security+ or CySA+ certification is helpful but not necessary.
ONLINE LABS AVAILABLE NOW!