Levi, Ray & Shoup, Inc.
  • Courses
  • Site Content

ATCASP - CompTIA® Advanced Security Practitioner (CASP) (Exam CAS-002)

You have experience in the increasingly crucial field of information security, and now you're ready to take that experience to the next level. CompTIA® Advanced Security Practitioner (CASP) (Exam CAS-002) is the course you will need to take if your job responsibilities include securing complex enterprise environments. In this course, you will expand on your knowledge of information security to apply more advanced principles that will keep your organization safe from the many ways it can be threatened. Today's IT climate demands individuals with demonstrable skills, and the information and activities in this course can help you develop the skill set you need to confidently perform your duties as an advanced security professional.

This course can also benefit you if you intend to pass the CompTIA Advanced Security Practitioner (CAS-002) certification examination. What you learn and practice in this course can be a significant part of your preparation.

Click here to print this page »

Prerequisites


To be fit for this advanced course, you should have at least a foundational knowledge of information security. You can obtain this level of knowledge by taking the CompTIA® Security+ (SY0-401) course offered by Logical Operations. You may also demonstrate this level of knowledge by passing the Security+ (SY0-401) exam.
Although not required, we suggest that you either take the following Logical Operations courses or possess the equivalent knowledge in the areas of computer networking and computer maintenance:
  • CompTIA® Network+® (N10-005) or CompTIA® Network+® (N10-006)
  • CompTIA® A+®: A Comprehensive Approach (Exams 220-801 and 220-802)

Detailed Class Syllabus


Lesson 1: Managing Risk


Topic A: Identify the Importance of Risk Management
Topic B: Assess Risk
Topic C: Mitigate Risk
Topic D: Integrate Documentation into Risk Management

Lesson 2: Integrating Computing, Communications, and Business Disciplines


Topic A: Facilitate Collaboration Across Business Units
Topic B: Secure Communications and Collaboration Solutions
Topic C: Implement Security Activities Throughout the Technology Life Cycle

Lesson 3: Using Research and Analysis to Secure the Enterprise


Topic A: Determine Industry Trends and Effects on the Enterprise
Topic B: Analyze Scenarios to Secure the Enterprise

Lesson 4: Integrating Advanced Authentication and Authorization Techniques


Topic A: Implement Authentication and Authorization Technologies
Topic B: Implement Advanced Identity Management

Lesson 5: Implementing Cryptographic Techniques


Topic A: Describe Cryptographic Concepts
Topic B: Choose Cryptographic Techniques
Topic C: Choose Cryptographic Implementations

Lesson 6: Implementing Security Controls for Hosts


Topic A: Select Host Hardware and Software
Topic B: Harden Hosts
Topic C: Virtualize Servers and Desktops
Topic D: Implement Cloud Augmented Security Services
Topic E: Protect Boot Loaders

Lesson 7: Implementing Security Controls for Enterprise Storage


Topic A: Identify Storage Types and Protocols
Topic B: Implement Secure Storage Controls

Lesson 8: Analyzing and Implementing Network Security


Topic A: Analyze Network Security Components and Devices
Topic B: Analyze Network-Enabled Devices
Topic C: Analyze Advanced Network Design
Topic D: Configure Controls for Network Security

Lesson 9: Implementing Security Controls for Applications


Topic A: Identify General Application Vulnerabilities
Topic B: Identify Web Application Vulnerabilities
Topic C: Implement Application Security Controls

Lesson 10: Integrating Hosts, Storage, Networks, and Applications in a Secure Enterprise Architecture


Topic A: Implement Security Standards in the Enterprise
Topic B: Select Technical Deployment Models
Topic C: Secure the Design of the Enterprise Infrastructure
Topic D: Secure Enterprise Application Integration Enablers

Lesson 11: Conducting Vulnerability Assessments


Topic A: Select Vulnerability Assessment Methods
Topic B: Select Vulnerability Assessment Tools

Lesson 12: Responding to and Recovering from Incidents


Topic A: Design Systems to Facilitate Incident Response
Topic B: Conduct Incident and Emergency Responses