Chapter 1: Governance and compliance
Module A: Security governance
Module B: Regulatory compliance
Module C: Standards and frameworks
Chapter 2: Security policies
Module A: Policy design
Module B: Controls and procedures
Module C: Training and coordination
Chapter 3: Risk management
Module A: Risk assessment
Module B: Risk management strategies
Chapter 4: Enterprise resilience
Module A: BCDR planning
Module B: Resilient architecture
Chapter 5: Threat management
Module A: Threats and vulnerabilities
Module B: Threat intelligence sources
Module C: Applied intelligence
Chapter 6: Cryptographic techniques
Module A: Cryptographic principles
Module B: Ciphers and hashes
Chapter 7: Applied cryptography
Module A: Public key infrastructure
Module B: Cryptographic protocols
Chapter 8: Authentication and authorization
Module A: Access control components
Module B: Authentication technologies
Chapter 9: Network security architecture
Module A: Network vulnerabilities
Module B: Network security infrastructure
Module C: Secure network configuration
Chapter 10: Protecting hosts and data
Module A: Host security
Module B: Data security
Chapter 11: Threat detection and response
Module A: Threat detection systems
Module B: Network sensors
Module C: Data analysis
Chapter 12: Specialized system security
Module A: Mobile device security
Module B: Operational technologies
Chapter 13: Virtual and cloud infrastructure
Module A: Virtual and cloud systems
Module B: Secure cloud infrastructure
Chapter 14: Secure applications
Module A: Software assurance
Module B: Application vulnerabilities
Chapter 15: Security assessment and testing
Module A: Security testing programs
Module B: Vulnerability assessments
Module C: Vulnerability and patch management
Chapter 16: Incident response
Module A: Incident response planning
Module B: Incident response procedures
Module C: Digital forensics
Appendix A: Glossary
Our CASP courseware is a complete instructor-led training solution with conceptual material and lab exercises covering all exam objectives. Within the courseware itself you will find instructions for downloading a lab environment based on virtual machines (VMs). After installation, you will be able to run all the exercises in the course. This lab option is included in the base price of the courseware.
You can also select the Online Labs option for an additional charge. With the Online Labs, there are no computer setup requirements other than an internet connection and a web browser. Each student is assigned a voucher code. After logging in, students will work in a VM-based lab environment (with accompanying instructions) right in their browsers. It’s the same labs and lab environment that are included with our standard course, just much easier to set up and access. Actually, there's no setup at all! The access period is six months from redemption of the voucher code. (Instructor codes are good for one year.)
For more information about our CompTIA lab options, please call 1-888-330-9071 or send an e-mail to sales@30bird.com.
Welcome to CompTIA Advanced Security Practitioner (CASP+) CAS-004. This course provides the knowledge needed to implement security solutions within an enterprise policy framework, using a vendor-neutral format. This includes GRC and vulnerability management programs, applied cryptography, system and network security, identity management, secure development, and incident response. This course maps to the CompTIA CASP+ certification exam. Objective coverage is marked throughout the course. You can download an objective map for the course from http://www.30bird.com.
You will benefit most from this course if you intend to take a CompTIA CASP+ CAS-004 exam.
This course assumes that you have some applied knowledge of computers, TCP/IP networks, and cybersecurity principles. Knowledge equivalent to the CompTIA Security+ or CySA+ certification is helpful but not necessary.
To request the PowerPoints for this course, please e-mail sales@30bird.com.