Existing User Login

New User? Create An Account

Request new password

We Are All About You

XpertSkills - the parent company under which iCollege operates - was established in South Africa in 2003 and since then, we have grown globally in leaps and bounds with customers and partners in more than 120 countries. With employees on 3 continents and as a next-generation, virtual organization we are unconstrained by the limits that are usually associated with traditional “brick & mortar” companies.

This allows us to focus, without distraction, on reaching our ultimate goal – ensuring your ongoing success – by providing affordable, reliable, high quality and relevant learning products whilst remaining innovative and agile.

Contact Details:

Web: www.xpertskills.com
Skype: xpertskills
Mail: info@xpertskills.com
Phone: +27 10 020 2067

Physical Address:

Head Office - South Africa
16 Monte Carlo Crescent
Kyalami business Park
Johannesburg
South Africa 1684

You are here

CompTIA Advanced Security Practitioner (CASP)

E-COURSE:

CompTIA Advanced Security Practitioner (CASP)

Instructor-led video course with presentations, workbooks, games, flashcards and quizzes.
Overview

CompTIA Advanced Security (CASP+) is the only hands-on, performance-based certification for advanced security practitioners. This learning path covers the five CASP+ CAS-003 domains. Get the skills to become certified, from enterprise security architecture to research, development, and collaboration. There is no required prerequisite for this course however, the CASP certification is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus at the enterprise level.

Objectives
  • Integrate network and security components, concepts, and architectures
  • Integrate security controls for host devices
  • Integrate controls for mobile and small form factor devices
  • Select software security controls
  • Conduct security assessments
  • Select the proper security assessment tools
  • Implement incident response and recovery
  • Integrate hosts, storage, and applications in the enterprise
  • Integrate cloud and virtualization technologies in the enterprise
  • Integrate and troubleshoot advanced AAA technologies
  • Implement cryptographic techniques
  • Secure communication and collaboration solutions
  • Apply research methods for trend and impact analysis
  • Implement security activities across the technology lifecycle
  • Interact across diverse business units
Prerequisites

CompTIA requires that anyone taking the CASP exam has 10 years of experience in IT administration, including at least 5 years of hands-on technical security experience.

Target Audience
  • IT security professionals who have a minimum of 10 years of experience in IT administration, including at least 5 years of hands-on technical security experience
  • Systems/network/application security professionals who are preparing for the CASP exam
  • Any IT professional who wants to gain an advanced understanding of how to secure modern enterprises beyond the Security+ or SSCP certifications.

Module 1: Underlying Security Models

1.0 Course Guide

1.1 Underlying Security Models Part 1

1.2 Underlying Security Models Part 2

1.3 Underlying Security Models Part 3

1.4 Underlying Security Models Part 4

1.5 Underlying Security Models Part 5

1.6 Underlying Security Models Part 6

1.7 Underlying Security Models Part 7

1.8 General Security Part 1

1.9 General Security Part 2

Module 2: Selecting Security

2.0 Selecting Security Products Part 1

2.1 Selecting Security Products Part 2

2.2 Selecting Security Products Part 3

2.3 Control Selection Process Part 1

2.4 Control Selection Process Part 2

Module 3: Cryptography

3.0 Cryptography Symmetric and Asymmetric Part 1

3.1 Cryptography Symmetric and Asymmetric Part 2

3.2 Cryptography Symmetric and Asymmetric Part 3

3.3 Cryptography Symmetric and Asymmetric Part 4

3.4 Cryptography Message Integrity Controls Part 1

3.5 Cryptography Message Integrity Controls Part 2

3.6 Cryptography Message Integrity Controls Part 3

3.7 Cryptography Digital Signatures Part 1

3.8 Cryptography Digital Signatures Part 2

3.9 Cryptography PKI and PGP Part 1

3.10 Cryptography PKI and PGP Part 2

3.11 Cryptography PKI and PGP Part 3

3.12 Cryptography PKI and PGP Part 4

Module 4: Storage

4.0 Storage Part 1

4.1 Storage Part 2

4.2 Storage Part 3

4.3 Storage Part 4

Module 5: Virtual Computing

5.0 Virtual Computing

5.1 Cloud Computing Part 1

5.2 Cloud Computing Part 2

5.3 Cloud Computing Part 3

5.4 Cloud Computing Part 4

5.5 Cloud Computing Part 5

Module 6: IPv6

6.0 IPV6 Part 1

6.1 IPV6 Part 2

Module 7: Remote Access Security

7.0 Remote Access Security Part 1

7.1 Remote Access Security Part 2

Module 8: Domain Name System

8.0 Domain Name System Part 1

8.1 Domain Name System Part 2

8.2 Domain Name System Part 3

8.3 Domain Name System Part 4

8.4 Domain Name System Part 5

8.5 Domain Name System Part 6

8.6 Domain Name System Part 7

8.7 Domain Name System Part 8

Module 9: Directory Services

9.0 Directory Services

Module 10: Firewall and VPN

10.0 Firewall and VPN Part 1

10.1 Firewall and VPN Part 2

10.2 Firewall and VPN Part 3

10.3 Firewall and VPN Part 4

10.4 Firewall Policy Part 1

10.5 Firewall Policy Part 2

10.6 Firewall Policy Part 3

10.7 Firewall Policy Part 4

Module 11: Security Configuration Management

11.0 Security Configuration Management Part 1

11.1 Security Configuration Management Part 2

11.2 Security Configuration Management Part 3

Module 12: Network Infrastructure Security

12.0 Network Infrastructure Security Part 1

12.1 Network Infrastructure Security Part 2

12.2 Network Infrastructure Security Part 3

12.3 Network Infrastructure Security Part 4

Module 13: Secure Web Services

13.0 Secure Web Services Part 1

13.1 Secure Web Services Part 2

13.2 OWASP top Ten Part 1

13.3 OWASP top Ten Part 2

13.4 OWASP top Ten Part 3

13.5 OWASP top Ten Part 4

13.6 OWASP top Ten Part 5

Module 14: Buffer Overflows

14.0 Buffer Overflows Part 1

14.1 Buffer Overflows Part 2

Module 15: SQL Injection

15.0 SQL Injection Part 1

15.1 SQL Injection Part 2

Module 16: Access Control

16.0 Access Control Part 1

16.1 Access Control Part 2

Module 17: Single Sign-On

17.0 Single Sign-On Part 1

17.1 Single Sign-On Part 2

17.2 Single Sign-On Part 3

Module 18: Risk Assessment

18.0 Risk Assessment Part 1

18.1 Risk Assessment Part 2

Module 19: Testing and Assessment

19.0 Testing and Assessment Part 1

19.1 Testing and Assessment Part 2

19.2 Testing and Assessment Part 3

Module 20: Common Vulnerability

20.0 Common Vulnerability Scoring System Part 1

20.1 Common Vulnerability Scoring System Part 2

20.2 Common Vulnerability Scoring System Part 3

20.3 Common Vulnerability Scoring System Part 4

Module 21: Common Criteria

21.0 Common Criteria Part 1

21.1 Common Criteria Part 2

21.2 Common Criteria Part 3

21.3 Common Criteria Part 4

21.4 Common Criteria Part 5

Module 22: Personally Identifiable Information

22.0 Personally Identifiable Information Part 1

22.1 Personally Identifiable Information Part 2

Module 23: Risk Management

23.0 Risk Management Part 1

23.1 Risk Management Part 2

23.2 Risk Management Part 3

Module 24: Frameworks

24.0 Frameworks Part 1

24.1 Frameworks Part 2

24.2 Frameworks Part 3

24.3 Frameworks Part 4

Module 25: Interconnecting Systems

25.0 Interconnecting Systems Part 1

25.1 Interconnecting Systems Part 2

Module 26: Security Services

26.0 Security Services Part 1

26.1 Security Services Part 2

26.2 Security Services Part 3

26.3 Security Services Part 4

Module 27: Continuous Monitoring

27.0 Continuous Monitoring Part 1

27.1 Continuous Monitoring Part 2

27.2 Continuous Monitoring Part 3

27.3 Continuous Monitoring Part 4

Module 28: Incident Handling

28.0 Incident Handling Part 1

28.1 Incident Handling Part 2

28.2 Incident Handling Part 3

28.3 Incident Handling Part 4

Module 29: Forensic & Incident Response

29.0 Forensic and Incident Response Part 1

29.1 Forensic and Incident Response Part 2

29.2 Forensic and Incident Response Part 3

Module 30: Requirements Processing

30.0 Requirements Processing Part 1

30.1 Requirements Processing Part 2

30.2 Requirements Processing Part 3

Module 31: Standards Bodies

31.0 Standards Bodies

Module 32: Secure System Life Cycle

32.0 Secure System Life Cycle Part 1

32.1 Secure System Life Cycle Part 2

32.2 Secure System Life Cycle Part 3

Module 33: Email

33.0 Email

Module 34: Mobile and BYOD

34.0 Mobile and BYOD Part 1
34.1 Mobile and BYOD Part 2

Module 35: Voiceover IP

35.0 Voice over IP

Module 36: Physical Facilities Assessment Process

36.0 Physical Facilities Assessment Process Part 1

36.1 Physical Facilities Assessment Process Part 2

Module 37: Security Requirements Traceability Matrix

37.0 Security Requirements Traceability Matrix

  1. CASP - Module 1
6
Start
Third Party Information Security and Providers
7
Start
Internal and External Influences
8
Start
Impact of De-Perimeterization
  1. CASP - Module 2
9
Start
Risk Mitigation Planning - Strategies and Controls
10
Start
CIA Triad
11
Start
Business Classifications
12
Start
Information Life Cycle and Steak-Holder Input
13
Start
Implementing Technical Controls
14
Start
Determine Aggregate CIA Score
15
Start
Worst Case Scenario Planning
16
Start
Calculation Tools and Attacker Motivation
17
Start
Return Of Investment
18
Start
Total Cost of Ownership and Risk Strategies
19
Start
Risk Management Process
20
Start
Identifying Vulnerabilities and Threats
21
Start
Security Architecture Frameworks
22
Start
Business Continuity Planning
23
Start
IT Governance
24
Start
Security Policies
  1. CASP - Module 3
25
Start
Security-Privacy Policies and Procedures
25
Start
Security-Privacy Policies and Procedures
26
Start
Policy Development Updates
27
Start
Developing Processes and Procedures
28
Start
Legal Compliance
28
Start
Legal Compliance
29
Start
Security Policy Business Documents
30
Start
Outage Impact and Estimating Downtime Terms
31
Start
Sensitive Information-Internal Security Policies
32
Start
Incident Response Process
33
Start
Forensic Tasks
E-COURSE E-Learning Expert-led video course with presentations, workbooks, quizzes, games and flashcards.
USD 195 USD 95 51% OFF
  • 07:59:26
    + Hours Of learning
  • Includes video, presentations, workbooks, quizzes, flashcards & games
  • Receive a Certificate of Excellence on successful completion
  • Presented by highly qualified, industry leading experts
  • 12 Months access (Unless indicated otherwise)
  • 10-Day money-back guarantee
Back to Top