CompTIA Advanced Security Practitioner (CASP) CAS 002

CompTIA Advanced Security Practitioner (CASP) CAS 002
4 Day Instructor Led | Onsite Testing Available


The CASP certification is a vendor-neutral, intensive exam that validates your knowledge and skills in enterprise security, risk management, research and analysis, and the integration of computing, communications and business disciplines. This exam preparation course provides in-depth review of the four domains included in the exam. Demonstrations and practice exams reinforce the concepts and provide the framework for a personalized study plan for exam success.

CompTIA Advanced Security Practitioner (CASP) CAS 002 Prerequisites
The CompTIA Security+ certification or equivalent experience is highly recommended.

What You'll Get in CompTIA Advanced Security Practitioner (CASP) CAS 002
Expert Level Instruction CompTIA Official Curriculum Daily Homework Questions (Over 600 Questions) Daily Quiz Questions (Over 600 Questions) Course Related Readings (Reinforcement) Daily Exercises to Reinforce Memory Recall - Cognitive Core

What You'll Learn in CompTIA Advanced Security Practitioner (CASP) CAS 002
Successfully prepare for the CompTIA Advanced Security Practitioner (CASP) Certification Exam Explore proven protocols and assessment tools to secure the enterprise Investigate end-point security and host hardenening to protect against attacks Examine risk management security policies and procedures Research potential security threats and identify appropriate countermeasures Evaluate collaboration methologies for security communications

CompTIA Advanced Security Practitioner (CASP) CAS 002 Certification
CompTIA Advanced Security Practitioner Certification CAS 002

CompTIA Advanced Security Practitioner (CASP) CAS 002 Outline

1. Managing Risk

  • Identify the Importance of Risk Management
  • Assess Risk
  • Mitigate Risk
  • Integrate Documentation into Risk Management

2. Integrating Computing, Communications, and Business Disciplines

  • Facilitate Collaboration Across Business Units
  • Secure Communications and Collaboration Solutions
  • Implement Security Activities Throughout the Technology Life Cycle

3. Using Research and Analysis to Secure the Enterprise

  • Determine Industry Trends and Effects on the Enterprise
  • Analyze Scenarios to Secure the Enterprise

4. Integrating Advanced Authentication and Authorization Techniques

  • Implement Authentication and Authorization Technologies
  • Implement Advanced Identity Management

5. Implementing Cryptographic Techniques

  • Describe Cryptographic Concepts
  • Choose Cryptographic Techniques
  • Choose Cryptographic Implementations

6. Implementing Security Controls for Hosts

  • Select Host Hardware and Software
  • Harden Hosts
  • Virtualize Servers and Desktops
  • Implement Cloud Augmented Security Services
  • Protect Boot Loaders

7. Implementing Security Controls for Enterprise Storage

  • Identify Storage Types and Protocols
  • Implement Secure Storage Controls

8. Analyzing and Implementing Network Security

  • Analyze Network Security Components and Devices
  • Analyze Network-Enabled Devices
  • Analyze Advanced Network Design
  • Configure Controls for Network Security

9. Implementing Security Controls for Applications

  • Identify General Application Vulnerabilities
  • Identify Web Application Vulnerabilities
  • Implement Application Security Controls

10. Integrating Hosts, Storage, Networks, and Applications in a Secure Enterprise Architecture

  • Implement Security Standards in the Enterprise
  • Select Technical Deployment Models
  • Secure the Design of the Enterprise Infrastructure
  • Secure Enterprise Application Integration Enablers

11. Conducting Vulnerability Assessments

  • Select Vulnerability Assessment Methods
  • Select Vulnerability Assessment Tools

12. Responding to and Recovering from Incidents

  • Design Systems to Facilitate Incident Response
  • Conduct Incident and Emergency Responses


Get More Information
* Denotes a required field.

Courses
Social Media Security Training
Schedule
Get a quote

Training
Training Effectiveness Assurance
Compliance Management Framework
Mentoring & Student Support Process
Department of Defense Training and 8570.1 Compliance


Testimonials
About Us

UKI Recognized as 2013
IT Training Mover & Shaker

2013 IT Training Mover & Shaker

Upcoming Public Course Dates

Nothing Scheduled
please check back soon

Excellent! It was much more advanced than anything else I've ever had, which was good because we utilized labs and something new was always being introduced. By the end of the week we were all able to employ a network that we couldn't set up on the first day. Kept you on the edge waiting for what was coming next. JT Rockenshire CLB-22, 2d Marine Logistics Group


This class has been a great experience...mind opening. I was enlightened as to where my knowledge level really is and (instructor) definitely added to it. (Instructor had a wealth of knowledge, was able to answer any question in depth, with detail and enthusiasm. Paul Johnson ALIMS


The instructor created labs that reflect situations that we will face implementing topics that were taught during class. Absolutely one of the best classes; lots of knowledge gained that will be implemented. CWO Scott Clawson MWCS-28, Cherry Point, NC




UKI Twitter Feed

We Provide Expert Instruction in the Following Courses:
Certified Information Systems Security Professional (CISSP) Certification Training | CCNA v3.0 - CCNA Routing and Switching Boot Camp Certification Training | REDHAT Linux Essentials - RH033 Certification Training | Fiber Optic Installer Certification Training | CompTIA A+ Certification Training | CompTIA Linux+ Certification Training | Interconnecting Cisco Network Devices Part 1 (ICND1) Certification Training | Interconnecting Cisco Networking Devices, Part 2 (ICND2) Certification Training | Enterprise Wi-Fi Fundamentals (CWTS) Certification Training | Certified Information Security Manager (CISM) Certification Training | Systems Security Certified Practitioner (SSCP) Certification Training | Architecting on AWS Certification Training | UKI Social Media Security Professional (SMSP) - Online Only Certification Training | Certified Ethical Hacker (CEH) Certification Training | ITIL® Foundation Certification Training | Installing and Configuring Windows Server 2012 (M20410) Certification Training | Certified Authorization Professional (CAP) Certification Training | UKI Social Media Engineering & Forensics Professional (SMEFP) Certification Training | RedHat Linux System Administration Foundations Certification Training | CCNP Voice Certification Training | Certified Information Systems Auditor (CISA) Certification Training | CCNA Voice Certification Training | Computer Hacking Forensic Investigator (CHFI) Certification Training | Certified Security Analyst/LPT (ECSA) Certification Training | CISSP - Information Systems Security Engineering Professional (ISSEP) Certification Training | MCITP: Enterprise and Server Administrator Certification Training | MCTS: Windows 7 Desktop Administrator 70-680 Certification Training | UKI Social Media Security Professional (SMSP) Certification Training | CCNP Certification Training | Administering Microsoft Windows Server 2012 (M20411) Certification Training | Implementing Desktop Application Environments (M20416) Certification Training | Configuring Advanced Windows Server 2012 Services (M20412) Certification Training | Designing and Implementing a Server Infrastructure on Windows 2012 (M20413) Certification Training | CCNA Security Certification Training | Certified Wireless Network Administrator Certification Training | UKI Social Media Management & Governance Professional (SMMGP) Certification Training | UKI Social Media Governance Certification Training | Core Solutions of Microsoft Exchange Server 2013 (20341B) Certification Training | TSHOOT - Troubleshooting and Maintaining Cisco IP Networks v2.0 Certification Training | Oracle 12c Database Administration I Certification Training | Oracle 12c Security Administration Certification Training | Core Solutions of Microsoft SharePoint Server 2013 (20331B) Certification Training | CompTIA Project+ Certification Training | Certified Incident Handler (ECIH) Certification Training | CompTIA Security+ SY0-401 Certification Training | UKI Social Media Security Hybrid Training Course Certification Training | Deploying and Managing Windows 10 Using Enterprise Services (20697-2B) Certification Training | Implementing an Advanced Server Infrastructure (M20414) Certification Training | MCSA: Windows Server 2012 Boot Camp Certification Training | Advanced Solutions of Microsoft SharePoint Server 2013 (20332B) Certification Training | Server Virtualization with Windows Server Hyper-V and System Center (20409B) Certification Training | Planning and Deploying System Center 2012 Configuration Manager (10748C) Certification Training | FireEye Enterprise Incident Response with MIR Certification Training | Security Operations on AWS Certification Training | Advanced VMware vSphere Design, Optimize, & Manage Certification Training | Project Management Professional (PMP) Certification Training | Avaya Aura® Communication Manager Administration Certification Training | CompTIA Advanced Security Practitioner (CASP) CAS 002 Certification Training | Implementing Cisco IOS Network Security 3.0 (IINS) Certification Training | Quick SharePoint 2013 Maintenance for the Part-Time Administrator Certification Training | CompTIA Network+ (N10-006) Certification Training | Security Design and Solutions, Network Security Design, Conduct a Security Assessment and Host Security Certification Training | Cyber Vanguard Series-Cyber Strike Certification Training | Cyber Vanguard Series- Enterprise Guardian Certification Training | CompTIA Cloud+ Certification Training | ITIL ® Service Strategy Certification Training | CISSP - Information Systems Security Architecture Professional (ISSAP) Certification Training | Certified Cloud Security Professional (CCSP) Certification Training | Cyber Vanguard Series- Cyber Storm Assault Tactics Certification Training | Risk Management Framework for DoD - Fundamentals Certification Training | SharePoint 2013 Site Collection and Site Administration (55033A) Certification Training | Programming in HTML5 with JavaScript and CSS3 Certification Training | Risk Management Framework for DoD - Deep Dive Certification Training | Developing Websites Using IBM Web Content Manager 8.5 Certification Training | FireEye Advanced MIR Certification Training | Splunk 6 Knowledge Objects Certification Training | Advanced Dashboards and Visualizations Certification Training | ITIL® Service Lifecycle: Service Design Certification Training | ITIL® Service Lifecycle: Service Transition Certification Training | Splunk Cloud Administration Certification Training | Oracle 12c Database Administration II Certification Training | Oracle 12c Advanced SQL Certification Training | Troubleshooting TCP/IP Networks with Wireshark Certification Training | VMware Horizon 7: Install, Configure, Manage v7 Certification Training | CompTIA Cybersecurity Analyst (CSA+) Certification Training | CISSP - Information Systems Security Management Professional (ISSMP) Certification Training | AWS Technical Essentials Certification Training | Big Data on AWS Certification Training | FireEye Forensics Fundamentals Certification Training | Oracle 12c Foundations: SQL & SQL*PLUS Certification Training | Avaya Aura Messaging Implementation, Administration, and Support Certification Training | Migrating to AWS Certification Training | Avaya Aura® Communication Manager Administration and Call Center Elite Fast Track Certification Training | Data Warehousing on AWS Certification Training | Avaya Aura® Communication Manager Administration, Maintenance, and Troubleshooting Fast Track Certification Training | Avaya Aura® Session Manager and System Manager Implementation (R6.3) Certification Training | Red Hat System Administration II (RH134) Certification Training | Red Hat System Administration III (RH254) Certification Training | Red Hat System Administration I (RH124) Certification Training | IBM Cognos Framework Manager: Design Metadata Models (v11.0) Certification Training | IBM Cognos Framework Manager: Design Metadata Models (V10.2) Certification Training | ITIL® Service Lifecycle: Service Operation Certification Training | ITIL® Service Lifecycle: Continual Service Improvement Certification Training | ITIL® Expert Qualification: Managing Across the Lifecycle Certification Training | VMware vSphere: Install, Configure, Manage V6.5 Certification Training | ROUTE - Implementing Cisco IP Routing v2.0 Certification Training | IBM InfoSphere DataStage Essentials (v11.5) Certification Training | Power Systems for AIX - Virtualization I: Implementing Virtualization Certification Training | WebSphere Application Server V8.5.5 Administration Certification Training | Enterprise Wi-Fi Security (CWSP) Certification Training | SWITCH - Implementing Cisco IP Switched Networks v2.0 Certification Training | Advanced Solutions of Microsoft Exchange Server 2013 (20342B) Certification Training | Installing and Configuring Windows 10 (20697-1B) Certification Training | VMware vSphere: Optimize and Scale v6.5 Certification Training | VMware vRealize Automation: Install, Configure, Manage v7.0 Certification Training |
Copyright © 2017 Ultimate Knowledge Institute | Privacy Policy
ITIL® is a registered trade mark of AXELOS® Limited.
IT Infrastructure Library® is a registered trade mark of AXELOS® Limited.
The Swirl logo™; is a trade mark of AXELOS® Limited.

All other trademarks mentioned in this web site are the property of their respective owners.