CompTIA Advanced Security Practitioner (CASP) CAS-002

    £495.00

    Description

    Description

    CompTIA’s CASP – CompTIA Advanced Security Practitioner , is a vendor-neutral certification that validates IT professionals with advanced-level security skills and knowledge. This certification course covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers, while managing risk.
     
    There is no required prerequisite for this course however, the CASP certification is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus at the enterprise level.
     
    This CASP training course follows the CompTIA authorized objectives, ensuring you receive the training and knowledge needed to succeed.
     

    CompTIA CASP – CompTIA Advanced Security Practitioner Exam Objectives:

     
    Domain and percentage of Examination:
    1.0 Enterprise Security: 30%
    2.0 Risk Management and Incident Response: 20%
    3.0 Research and Analysis: 18%
    4.0 Integration of Computing, Communications and Business Disciplines: 16%
    5.0 Technical Integration of Enterprise Components: 16%
     
    Course Syllabus:
     

    CompTIA CASP – CompTIA Advanced Security Practitioner – Course CAS-002 Curriculum

    Introduction

    Course Overview

     

    Module 1 – Business Influences and Associated Security Risks

    Risk Management
    Business Model Strategies
    Integrating Diverse Industries
    Third Party Information Security and Providers
    Internal and External Influences
    Impact of De-Perimeterization
     

    Module 2 – Risk Mitigation Planning – Strategies and Controls

    CIA Triad
    Business Classifications
    Information Life Cycle and Steak-Holder Input
    Implementing Technical Controls
    Determine Aggregate CIA Score
    Worst Case Scenario Planning
    Calculation Tools and Attacker Motivation
    Return Of Investment
    Total Cost of Ownership and Risk Strategies
    Risk Management Process
    Identifying Vulnerabilities and Threats
    Security Architecture Frameworks
    Business Continuity Planning
    IT Governance
    Security Policies
     

    Module 3 – Security-Privacy Policies and Procedures

    Policy Development Updates
    Developing Processes and Procedures
    Legal Compliance
    Security Policy Business Documents
    Outage Impact and Estimating Downtime Terms
    Sensitive Information-Internal Security Policies
    Incident Response Process
    Forensic Tasks
    Employment and Termination Procedures
    Network Auditing
     

    Module 4 – Incident Response and Recovery Procedures

    E-Discovery and Data Retention Policies
    Data Recovery-Storage and Backup Schemes
    Data Owner and Data Handling
    Disposal Terms and Concepts
    Data Breach and Data Analysis
    Incident Response Guidelines
    Incident and Emergency Response
    Media-Software and Network Analysis
    Order of Volatility
     

    Module 5 – Industry Trends

    Performing Ongoing Research
    Security Practices
    Evolution of Technology
    Situational Awareness and Vulnerability Assessments
    Researching Security Implications
    Global Industry Security Response
    Threat Actors
    Contract Security Requirements
    Contract Documents
     

    Module 6 – Securing the Enterprise

    Benchmarks and Baselines
    Prototyping and Testing Multiple Solutions
    Cost/Benefit Analysis
    Metrics Collection and Trend Data
    Security Controls-Reverse Engineering and Deconstructing
    Security Solutions Business Needs
    Lesson Learned- After Action Report
     

    Module 7 – Assessment Tools and Methods

    Port Scanners and Vulnerability Scanners
    Protocol Analyzer- Network Enumerator-Password Cracker
    Fuzzers and HTTP Interceptors
    Exploitation Tools
    Passive Reconnaissance Tools
    Vulnerability Assessments and Malware Sandboxing
    Memory Dumping and Penetration Testing
    Reconnaissance and Fingerprinting
    Code Review
    Social Engineering
     

    Module 8 – Social Cryptographic Concepts and Techniques

    Cryptographic Benefits and Techniques
    Hashing Algorithms
    Message Authentication Code
    Cryptographic Concepts
    Transport Encryption Protocol
    Symmetric Algorithms
    Asymmetric Algorithms
    Hybrid Encryption and Digital Signatures
    Public Key Infrastructure
    Digital Certificate Classes and Cypher Types
    Des Modes
    Cryptographic Attacks
    Strength vs Performance and Cryptographic Implementations
     

    Module 9 – Enterprise Storage

    Virtual Storage Types and Challenges
    Cloud Storage
    Data Warehousing
    Data Archiving
    Storage Area Networks (SANs) and (VSANs)
    Network Attached Storage (NAS)
    Storage Protocols and Fiber Channel over Ethernet (FCoE)
    Storage Network File Systems
    Secure Storage Management Techniques
    LUN Masking/Mapping and HBA Allocation
    Replication and Encryption Methods
     

    Module 10 – Network and Security Components-Concepts-Security Architectures

    Remote Access Protocols
    IPv6 and Transport Encryption
    Network Authentication Methods
    802.1x and Mesh Networks
    Security Devices
    Network Devices
    Firewalls
    Wireless Controllers
    Router Security and Port Numbers
    Network Security Solutions
    Availability Controls-Terms and Techniques
    Advanced Router and Switch Configuration
    Data Flow Enforcement of Applications and Networks
    Network Device Accessibility and Security
     

    Module 11 – Security Controls for Hosts

    Trusted Operation Systems
    Endpoint Security Software and Data Loss Prevention
    Host Based Firewalls
    Log Monitoring and Host Hardening
    Standard Operating Environment and Group Policy Security
    Command Shell Restrictions
    Configuring and Managing Interface Security
    USB-Bluetooth-Firewire Restrictions and Security
    Full Disk Encryption
    Virtualization Security
    Cloud Security Services
    Boot Loader Protections
    Virtual Host Vulnerabilities
    Virtual Desktop Infrastructure
    Terminal Services
    Virtual TPM
     

    Module 12 – Application Vulnerabilities and Security Controls

    Web Application Security Design
    Specific Application Issues
    Session Management
    Input Validation
    Web Vulnerabilities and Input Mitigation Issues
    Buffer Overflow and other Application Issues
    Application Security Framework
    Web Service Security and Secure Coding Standards
    Software Development Methods
    Monitoring Mechanisms and Client-Server Side Processing
    Browser Extensions and Other Web Development Techniques
     

    Module 13 – Host-Storage-Network and Application Integration

    Securing Data Flows
    Standards Concepts
    Interoperability Issues
    In House Commercial and Customized Applications
    Cloud and Virtualization Models
    Logical and Physical Deployment Diagrams
    Secure Infrastructure Design
    Storage Integration Security
    Enterprise Application Integration Enablers
     

    Module 14 – Authentication and Authorization Technologies

    Authentication and Identity Management
    Password Types-Management and Policies
    Authentication Factors
    Biometrics
    Dual-Multi Factor and Certificate Authentication
    Single Sign On Issues
    Access Control Models and Open Authorization
    Extensible Access Control Markup Language (XACML)
    Service Provisioning Markup Language (SPML)
    Attestation and Identity Propagation
    Federation and Security Assertion Markup Language (SAML)
    OpenID-Shibboleth and WAYF
    Advanced Trust Models
     

    Module 15 – Business Unit Collaboration

    Identifying and Communicating Security Requirements
    Security Controls Recommendations
    Secure Solutions Collaboration
     

    Module 16 – Secure Communication and Collaboration

    Web-Video Conferencing-Instant Messaging
    Desktop Sharing
    Presence Guidelines
    Email Messaging Protocol
    Telephony-VoIP and Social Media
    Cloud Based Collaboration
    Remote Access and IPsec
    Mobile and Personal Device Management
    Over Air Technology Concerns
    WLAN Concepts-Terms-Standards
    WLAN Security and Attacks
     

    Module 17 – Security Across the Technology Life Cycle

    End to End Solution Ownership
    System Development Life Cycle
    Security Implications of Software Development Methodologies
    Asset Management
    Course End
     
    Course Delivery: Online