How to plan for network security that matches your technology infrastructure from top to bottom.
CASP is CompTIA's first mastery-level certification for enterprise technical security leads. CASP certification is an international, vendor-neutral certification that designates IT professionals with advanced-level security skills and knowledge. Achieving CASP certification proves your competency in enterprise security, risk management, research and analysis, and integrating computing, communications, and business disciplines. Becoming CASP certified confirms that you have the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. CASP certifies that you can apply critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers.
CASP is designed for seasoned security specialists whose work deals with the day-to-day operations of an IT environment's security aspects. It takes what you learn in a CompTIA Security+ course and strengthen while reinforcing your expertise in this widely accepted standard for network security professionals. Besides enterprise level security, you will also further develop skills in areas such as research, analysis, and the integration of computing and communications in a business environment. This course is the perfect opportunity for seasoned IT security professionals to hone existing skills and build new ones in a wide range of security-related disciplines that will allow companies to carry on operations in safe and secure environments. As businesses throughout the area and across the world become more connected and more reliant on IT, the need for experts to act as administrators is only going to rise with time.
8570.1 Approved CASP certification is included in the approved list of certifications that meet the DoD Directive 8570.1 requirements. It is approved as a baseline certification for the IAT Level III, IAM Level II, and IASAE Level I and II.
Class Fee: |
$3,990 + $411 Exam fee |
Time: |
72 hrs |
Learning Level: |
Advanced |
Contact Hours: |
72 hr Lecture 22 hr labs |
Prerequisites: |
Understanding of TCP/IP Protocols |
Credits: |
72 CPE / 3 CEU |
Method of Delivery: |
Residential (100% face-to-face) or Hybrid |
Instructor: |
TBD |
Method of Evaluation: |
95 % attendance 2. 100 % completion of Lab |
Grading: |
Pass = Attendance+ labs & quizzes Fail > 95% Attendance |
Sample Job Titles:
Information Systems Security Engineer
Intrusion Detection System (IDS) Administrator
Intrusion Detection System (IDS) Engineer
Intrusion Detection System (IDS) Technician
Network Administrator/ Network Analyst
Network Security Engineer /Network Security Specialist
Security Analyst/ Security Engineer
Security Specialist/ Systems Security Engineer
This 72 hour accelerated class is taught using face to face modality or hybrid modality. Class includes 72 hours of contact studies, labs, reading assignments and final exam - passing the final exam is a requirement for graduation.
Who Should Attend
Individuals seeking the CompTIA Advanced Security Practitioner (CASP) certification (Exam CAS-002) IT professionals with a minimum of 10 years of experience in IT administration and at least five years of hands-on security in an enterprise environment. Enterprise Network Defense (END) Infrastructure Support - Tests, implements, deploys, maintains, reviews, and administers the infrastructure hardware, software, and documentation that are required to effectively manage network defense resources. Monitors the network to actively remediate unauthorized activities.
Text Materials: quiz labs, SU free Practice tests and resources.
Machines a Dual Core 1G RamM, 1 Gig drives, running MS OS, linux, and VMWare Workstation
KU Outcomes
- Students will be able to analyze system components and determine how they will interact in a composed system.
- Students will be able to analyze a system design and determine if the design will meet the system security requirements
CLICK TO ROLL DOWN OUR CLASS SYLLABUS
Learning Objectives - 40 hrs lecture/ 32 hrs labs
What You'll Learn
- Manage risk in the enterprise
- Integrate computing, communications, and business disciplines in the enterprise
- Use research and analysis to secure the enterprise
- Integrate advanced authentication and authorization techniques
- Implement cryptographic techniques
- Implement security controls for hosts
- Implement security controls for storage
- Analyze network security concepts, components, and architectures, and implement controls
- Implement security controls for applications
- Integrate hosts, storage, networks, and applications in a secure enterprise architecture
- Conduct vulnerability assessments
- Conduct incident and emergency responses
CompTIA Advanced Security Practitioner (CASP) Course Outline
Domain 1 Risk Management and Incident Response
Lesson 1A: Information Security Concepts and Terminology
Lesson 1B:Risks Associated with Business and Industry Influences;
Lesson 1C:Risk Mitigation Planning, Strategies, and Controls;
Lesson 1D:Security and Privacy Policies, Standards, and Procedures;
Lesson 1E:Incident Response and Recovery Procedures
Domain 2 Enterprise Security
Lesson 2A: Cryptographic TConcepts Techniques
Lesson 2B: Host and Storage Security controls;
Lesson 2C: Application Security;
Lesson 2D: Network Security Components
Domain 3 Technical Integration of Enterprise Components
Lesson 3A: Enterprise Storage Security Integration of Hosts, Storage, Networks, and Applications
Lesson 3B: Integration of Advanced Authentication and Authorization Technologies
Domain 4 Integration of Computing, Communications, and Business Disciplines
Lesson 4A: Facilitation of Collaboration Across Business Units to Achieve Security Goals
Lesson 4B: Selection of Controls to Secure Communications and Collaboration
Lesson 4C: Designing and Implementing Security Activities Across the Technology Life Cycle
Domain 5 Research, Analysis, & Assessment
Lesson 5A: Research Methods to Determine Industry Trends and Impact to the Enterprise
Lesson 5B: Analyze Scenarios to Secure the Enterprise
Lesson 5c: Methods and Tools to Conduct Security Assessments
Why get CASP Certified?
Getting your CASP certification will ensure that your services will always be in demand, no matter where you go
1. Managing Risk
Identify the Importance of Risk Management
Assess Risk
Mitigate Risk
Integrate Documentation into Risk Management
2. Integrating Computing, Communications, and Business Disciplines
Facilitate Collaboration across Business Units
Secure Communications and Collaboration Solutions
Implement Security Activities throughout the Technology Life Cycle
3. Using Research and Analysis to Secure the Enterprise
Determine Industry Trends and Effects on the Enterprise
Analyze Scenarios to Secure the Enterprise
4. Integrating Advanced Authentication and Authorization Techniques
Implement Authentication and Authorization Technologies
Implement Advanced Identity Management
5. Implementing Cryptographic Techniques
Describe Cryptographic Concepts
Choose Cryptographic Techniques
Choose Cryptographic Implementations
6. Implementing Security Controls for Hosts
Select Host Hardware and Software
Harden Hosts
Virtualize Servers and Desktops
Implement Cloud Augmented Security Services
Protect Boot Loaders
7. Implementing Security Controls for Enterprise Storage
Identify Storage Types and Protocols
Implement Secure Storage Controls
8. Analyzing and Implementing Network Security
Analyze Network Security Components and Devices
Analyze Network-Enabled Devices
Analyze Advanced Network Design
Configure Controls for Network Security
9. Implementing Security Controls for Applications
Identify General Application Vulnerabilities
Identify Web Application Vulnerabilities
Implement Application Security Controls
10. Integrating Hosts, Storage, Networks, and Applications in a Secure Enterprise Architecture
Implement Security Standards in the Enterprise
Select Technical Deployment Models
Secure the Design of the Enterprise Infrastructure
Secure Enterprise Application Integration Enablers
11. Conducting Vulnerability Assessments
Select Vulnerability Assessment Methods
Select Vulnerability Assessment Tools
12. Responding to and Recovering from Incidents
Design Systems to Facilitate Incident Response
Conduct Incident and Emergency Responses
Classroom Labs
Lab 1: Integrate Documentation into Risk Management
Lab 2: Secure Communications and Collaboration Solutions
Lab 3: Analyze Scenarios to Secure the Enterprise
Lab 4: Implement Authentication and Authorization Technologies
Lab 5; Choose Cryptographic Techniques
Lab 6: Harden Hosts
Lab 7: Virtualize Servers and Desktops
Lab 8: Protect Boot Loaders
Lab 9: Implement Secure Storage Controls
Lab 10: Configure Controls for Network Security
Lab 11: Implement Application Security Controls
Lab 12: Select Vulnerability Assessment Tools
Lab 13 Design Systems to Facilitate Incident Response
Lab 14: Conduct Incident and Emergency Response
Grades - All students must ordinarily take all quizzes, labs, final exam and submit the class practical in order to be eligible for a Q/ISP, Q/IAP, Q/SSE, or Q/WP credential unless granted an exception in writing by the President. Know that Q/ISP classes draws quite the spectrum of students, including "those less comfortable," "those more comfortable," and those somewhere in between. However, what ultimately matters in this course is not so much where you end up relative to your classmates but where you end up relative to yourself in on Friday of class. The course is graded as a pass or fail solely on your attendance and participation.
Books – Ebooks are provided for this course. No external books are required.