
In this course, which prepares you for the CompTIA Advanced Security Practitioner exam (CAS-003),you will expand on your knowledge of information security to apply more advanced principles that will keep your organization safe from the many ways it can be threatened.
Address
Training @ any New Horizons Training Centers View mapCategories
Cyber SecurityCourse Description
Information security is a crucial field in the world of business. You have experience in this field, and now you’re ready to take that experience to the next level. In this course, you will expand on your knowledge of information security to apply more advanced principles that will keep your organization safe from the many ways it can be threatened. You’ll apply critical thinking and judgment across a broad spectrum of security disciplines to propose and implement sustainable security solutions that map to organizational strategies; translate business needs into security requirements; support IT governance and risk management; architect security for hosts, networks, and software; respond to security incidents; and more.
Today’s IT climate demands individuals with demonstrable skills, and the information and activities in this course can help you develop the skill set you need to confidently perform your duties as an advanced security practitioner.
Target Student/Prerequisites
This course is designed for IT professionals in the cybersecurity industry whose primary job responsibility is to secure complex enterprise environments. The target student should have real-world experience with the technical administration of these enterprise environments.
This course is also designed for students who are seeking the CompTIA® Advanced Security Practitioner (CASP+®) certification and who want to prepare for Exam CAS-003. Students seeking CASP+ certification should have at least 10 years of experience in IT management, with at least 5 years of hands-on technical security experience.
Course Content
Topic A: Identify the Importance of IT Governance and Risk Management
Topic B: Assess Risk
Topic C: Mitigate Risk
Topic D: Integrate Documentation into Risk Management
Topic A: Facilitate Collaboration across Business Units
Topic B: Secure Communications and Collaboration Solutions
Topic A: Determine Industry Trends and Their Effects on the Enterprise
Topic B: Analyze Scenarios to Secure the Enterprise
Topic A: Implement Authentication and Authorization Technologies
Topic B: Implement Advanced Identity and Access Management
Topic A: Select Cryptographic Techniques
Topic B: Implement Cryptography
Topic A: Select Host Hardware and Software
Topic B: Harden Hosts
Topic C: Virtualize Servers and Desktops
Topic D: Protect Boot Loaders
Topic A: Implement Mobile Device Management
Topic B: Address Security and Privacy Concerns for Mobile Devices
Topic A: Plan Deployment of Network Security Components and Devices
Topic B: Plan Deployment of Network-Enabled Devices
Topic C: Implement Advanced Network Design
Topic D: Implement Network Security Controls
Topic A: Implement Security throughout the Technology Life-cycle
Topic B: Identify General Application Vulnerabilities
Topic C: Identify Web Application Vulnerabilities
Topic D: Implement Application Security Controls
Analysis
Topic A: Integrate Standards and Best Practices in Enterprise Security
Topic B: Select Technical Deployment Models
Topic C: Integrate Cloud-Augmented Security Services
Topic D: Secure the Design of the Enterprise Infrastructure
Topic E: Integrate Data Security in the Enterprise Architecture
Topic F: Integrate Enterprise Applications in a Secure Architecture
Topic A: Select Security Assessment Methods
Topic B: Perform Security Assessments with Appropriate Tools
Topic A: Prepare for Incident Response and Forensic Investigations
Topic B: Conduct Incident Response and Forensic