CompTIA CASP+® Training

Course Outline

This CASP+ Training course prepares you for the CompTIA CASP+ certification exam (CAS-004) and demonstrates your knowledge and skills in enterprise security, risk management, research and analysis, and the integration of computing, communications, and business disciplines. You will learn through a CompTIA-approved CASP+ training program and receive after-course instructor coaching and an exam voucher. 

The course is available in-person or online, with virtual instructor-led training and virtual classroom options, providing a flexible and convenient learning experience.

Passing the CompTIA CASP+ Certification Exam meets U.S. DoD Directive 8140/8570.01 Technical (IAT) Level-III, Management (IAM) Level-II and Information Assurance Security Architect/Engineer (IASAE) Level-I and Level II requirements.

CompTIA CASP+® Training Benefits

  • In this course, you will learn how to:

    • Experience an Official CompTIA- CASP+ training program.
    • Receive after-course instructor coaching and an exam voucher.
    • Prepare for the CompTIA Advanced Security Practitioner (CASP+) Certification Exam.
    • Investigate enterprise storage requirements.
    • Examine risk management security policies and procedures.
    • Research potential threats and identify appropriate countermeasures.
    • Evaluate collaboration methodologies for secure communications.
    • Continue learning and face new challenges with after-course one-on-one instructor coaching.
  • Training Prerequisites

    • Learning Tree course 446, CompTIA Security+® Training, or equivalent experience
    • Ten years of IT (Information Technology) administration experience, including at least five years of hands-on technical security experience
  • Certification Information

    You must pass the CompTIA Advanced Security Practitioner (CASP+) certification exam to earn this certification. Exam vouchers are available upon request and included in the tuition fee.

CASP+ Training Outline

CASP+ Exam Overview

  • Examination and certification goals
  • The five domains of the exam
  • Learning techniques

Module 1: Enterprise Security

Identifying security concerns in scenarios

  • Exploring cryptographic techniques
  • Advanced PKI concepts

Distinguishing between cryptographic concepts

  • Entropy
  • Confusion and diffusion
  • Chain of trust

Securing enterprise storage

  • Examining storage types and protocols
  • Secure storage management

Analyzing network security architectures

  • Designing secure networks
  • Employing virtual networking solutions

Troubleshooting security controls for hosts

  • Host security: trusted OS (Operating System), endpoint, host hardening
  • Vulnerabilities in co-mingling of hosts

Differentiating application vulnerabilities

  • Web application security
  • Application security concerns
  • Mitigating client-side vs. server-side processing

Module 2: Risk Management and Incident Response

Interpreting business and industry influences and risks

  • Analyzing risk scenarios
  • Identifying the impact of de-perimeterization

Executing risk mitigation planning, strategies, and control

  • Assessing the CIA aggregate scores
  • Making risk determination

Privacy policies and procedures

  • Developing policies to support business objectives
  • Safeguarding Personally Identifiable Information (PII)

Conduct incident response and recovery procedures

  • Constructing a data inventory with e-discovery
  • Minimizing the severity of data breaches

Module 3: Research, Analysis, and Assessment

Determining industry trends impact to the enterprise

  • Performing ongoing research to support best practices
  • Researching security requirements for contracts

Appropriate security document usage

  • Request for Information (RFI)
  • Request for Quote (RFQ)
  • Request for Proposal (RFP)

Evaluating scenarios to determine how to secure the enterprise

  • Conducting cost-benefit and security solution analysis
  • Reviewing the effectiveness of existing security controls

Conducting an assessment and analyzing the results

  • Determining appropriate tools for data gathering
  • Identifying methods to perform assessments

Module 4: Integrating Computing, Communications, and Business Disciplines

Collaborating across diverse business units to achieve security goals

  • Communicating with stakeholders
  • Interpreting security requirements and providing guidance
  • Identifying secure communications goals

Selecting controls for secure communications

  • Utilizing unified collaboration tools
  • Mobile devices
  • Applying over-the-air technologies

Implementing security across the technology life cycle

  • Selecting security controls
  • Developing Security Requirements Traceability Matrices

Module 5: Technical Integration of Enterprise Components

Integrate devices into a secure enterprise architecture

  • Securing data following existing security standards
  • Applying technical deployment models
  • Integrating storage and applications into the enterprise

Integrating advanced authentication and authorization technologies

  • Implementing certificate-based and SSO authentication
  • Applying federation solutions
Course Dates - North America
Course Dates - Europe
Attendance Method
Additional Details (optional)