Course name:
CompTIA: Advanced Security Practitioner (CASP)
Description:
The CASP exam covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers, while managing risk.
Duration:
40 Hours
Audience:
Information Security Professionals
Prerequisites:
Information Security
Course outline:
<p>The CASP exam covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers, while managing risk.</p> <p>This course will prepare you for the CASP exam by teaching you how to apply critical thinking and judgment across a broad spectrum of security disciplines, in an effort to propose and implement solutions that map to enterprise drivers, while also managing risk.</p> <p>The current landscape of cybersecurity requires specialized skills to troubleshoot via customized hacks and build solid solutions. Each hack is unique and must be combated with master-level security skills and experience. As a CASP-certified IT professional, you will demonstrate that you can provide the best cybersecurity solutions and protection for organizations worldwide. CompTIA Advanced Security Practitioner (CASP) meets the growing demand for advanced IT security in the enterprise. Recommended for IT professionals with at least 5 years of experience, CASP certifies critical thinking and judgment across a broad spectrum of security disciplines and requires candidates to implement clear solutions in complex environments.</p> <p>CASP certified Information Security practitioners, across job titles such as Security Engineers, Information Security Analysts and Security Risk Managers. CompTIA Advanced Security Practitioner meets the ISO 17024 standard and is approved by U.S. Department of Defense to fulfill Directive 8570.01-M requirements. It is compliant with government regulations under the Federal Information Security Management Act (FISMA).</p> <p>Learning Objective&nbsp;</p> <p>Students will learn the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers, while managing risk.</p> <p>Outline</p> <p>Module 1: Underlying Security Models</p> <p>Module 2: Selecting Security</p> <p>Module 3: Cryptography</p> <p>Module 4: Storage</p> <p>Module 5: Virtual Computing</p> <p>Module 6: IPv6</p> <p>Module 7: Remote Access Security</p> <p>Module 8: Domain Name System</p> <p>Module 9: Directory Services</p> <p>Module 10: Firewall and VPN</p> <p>​Module 11: Security Configuration Management</p> <p>Module 12: Network Infrastructure Security</p> <p>Module 13: Secure Web Services</p> <p>Module 14: Buffer Overflows</p> <p>Module 15: SQL Injection</p> <p>Module 16: Access Control</p> <p>​Module 17: Single Sign-On</p> <p>Module 18: Risk Assessment</p> <p>Module 19: Testing and Assessment</p> <p>Module 20: Common Vulnerability</p> <p>Module 21: Common Criteria</p> <p>Module 22: Personally Identifiable Information</p> <p>Module 23: Risk Management</p> <p>Module 24: Frameworks</p> <p>Module 25: Interconnecting Systems</p> <p>Module 26: Security Services</p> <p>Module 27: Continuous Monitoring</p> <p>Module 28: Incident Handling</p> <p>Module 29: Forensic &amp; Incident Response</p> <p>Module 30: Requirements Processing</p> <p>Module 31: Standards Bodies</p> <p>Module 32: Secure System Life Cycle</p> <p>​Module 33: Email</p> <p>Module 34: Mobile and BYOD</p> <p>Module 35: Voiceover IP</p> <p>Module 36: Physical Facilities Assessment Process</p> <p>Module 37: Security Requirements Traceability Matrix</p>

Copyright © 2011-2014 Aziksa Inc, All rights reserved.