CompTIA Advanced Security Practitioner (CASP+) (Exam CAS-004), Instructor Edition

CompTIA Advanced Security Practitioner (CASP+) (Exam CAS-004)

Course Specifications

Course Number: BIR84–044_rev1.0

Course Length: 5 days

Course Description

Welcome to CompTIA Advanced Security Practitioner CAS-004. This course provides the knowledge needed to implement security solutions within an enterprise policy framework, using a vendor-neutral format. This includes GRC and vulnerability management programs, applied cryptography, system and network security, identity management, secure development, and incident response. This course maps to the CompTIA CASP+ certification exam. Objective coverage is marked throughout the course. You can download an objective map for the course from http://www.30bird.com.

You will benefit most from this course if you intend to take a CompTIA CASP+ CAS-004 exam.

This course assumes that you have some applied knowledge of computers, TCP/IP networks, and cybersecurity principles. Knowledge equivalent to the CompTIA Security+ or CySA+ certification is helpful but not necessary.

Course Content

Introduction

Course setup

Chapter 1: Governance and compliance

Module A: Security governance
Module B: Regulatory compliance
Module C: Standards and frameworks

Chapter 2: Security policies

Module A: Policy design
Module B: Controls and procedures
Module C: Training and coordination

Chapter 3: Risk management

Module A: Risk assessment
Module B: Risk management strategies

Chapter 4: Enterprise resilience

Module A: BCDR planning
Module B: Resilient architecture

Chapter 5: Threat management

Module A: Threats and vulnerabilities
Module B: Threat intelligence sources
Module C: Applied intelligence

Chapter 6: Cryptographic techniques

Module A: Cryptographic principles
Module B: Ciphers and hashes

Chapter 7: Applied cryptography

Module A: Public key infrastructure
Module B: Cryptographic protocols

Chapter 8: Authentication and authorization

Module A: Access control components
Module B: Authentication technologies

Chapter 9: Network security architecture

Module A: Network vulnerabilities
Module B: Network security infrastructure
Module C: Secure network configuration

Chapter 10: Protecting hosts and data

Module A: Host security
Module B: Data security

Chapter 11: Threat detection and response

Module A: Threat detection systems
Module B: Network sensors
Module C: Data analysis

Chapter 12: Specialized system security

Module A: Mobile device security
Module B: Operational technologies

Chapter 13: Virtual and cloud infrastructure

Module A: Virtual and cloud systems
Module B: Secure cloud infrastructure

Chapter 14: Secure applications

Module A: Software assurance
Module B: Application vulnerabilities

Chapter 15: Security assessment and testing

Module A: Security testing programs
Module B: Vulnerability assessments
Module C: Vulnerability and patch management

Chapter 16: Incident response

Module A: Incident response planning
Module B: Incident response procedures
Module C: Digital forensics

Appendix A: Glossary

Index