CASP+

CASP+

Description

You will learn technical skills in security architecture and senior security engineering in traditional, cloud, and hybrid environments, governance, risk, and compliance skills, assessing an enterprise’s cybersecurity readiness, and leading technical teams to implement enterprise-wide cybersecurity solutions. 

The CASP+ (CompTIA Advanced Security Practitioner+) (CAS-004) certification is a vendor-neutral certification that validates your knowledge and ability to conduct advanced-level cybersecurity skills. This certification tests your ability to implement solutions within cybersecurity policies and frameworks.

The CASP+ exam is designed for the advanced-level technical cybersecurity professional (those with at least 5 years in the field).

The CompTIA Advanced Security Practitioner+ exam is focused on both security architecture and engineering, to validate a technical leader's ability to assess cyber readiness within an enterprise and design/implement the proper solutions to ensure your organization can defend itself against the next cyber attack.    

By the end of the course, you will be comfortable with the tasks required of a cyber security practitioner and be ready to take on a more advanced role within the cybersecurity team at your organization!

This course is designed to help prepare you for the CASP+ (CAS-004) certification exam and covers all four domains:

  • Security Architecture (29%)
  • Security Operations (30%)
  • Security Engineering and Cryptography (26%)
  • Governance, Risk, and Compliance (15%)

Who this course is for?

  • Students preparing for the CASP+ (CAS-004) Certification Exam
  • IT directors and team leads
  • Risk management professionals
  • Cybersecurity analysts
  • Penetration testers

Course Learning Objectives

  • Take and pass the CompTIA Advanced Security Practitioner+ (CASP+) (CAS-004) certification exam
  • Understand security architecture and operations concepts, techniques, and requirements
  • Explain risk analysis by interpreting trending data and indicators of compromise
  • Select appropriate cyber security controls in response to a given threat or scenario

Course prerequisites

  • You should have a solid understanding of networks and network security
  • Reviewed the concepts from the CompTIA Network+, Security+, CySA+, PenTest+, Linux+, and Cloud+ objectives

Course Curriculum

No.

Title

Type

Status

1.

Welcome

VIDEO

2.

Download your free study guide

PDF

3.

Lab: Exploring the Lab Environment

LAB

4.

Checkpoint: Introduction

QUIZ

No.

Title

Type

Status

1.

Data Considerations

VIDEO

2.

Data Security

VIDEO

3.

Data Classification

VIDEO

4.

Data Types

VIDEO

5.

Data Retention

VIDEO

6.

Data Destruction

VIDEO

7.

Data Ownership

VIDEO

8.

Data Sovereignty

VIDEO

9.

Checkpoint: Data Considerations

QUIZ

No.

Title

Type

Status

1.

Risk Management

VIDEO

2.

Risk Strategies

VIDEO

3.

Risk Management Lifecycle

VIDEO

4.

Risk Types

VIDEO

5.

Risk Handling

VIDEO

6.

Risk Tracking

VIDEO

7.

Risk Assessment

VIDEO

8.

When Risk Management Fails

VIDEO

9.

Checkpoint: Risk Management

QUIZ

No.

Title

Type

Status

1.

Policies and Frameworks

VIDEO

2.

Policies

VIDEO

3.

Frameworks

VIDEO

4.

Regulations

VIDEO

5.

Standards

VIDEO

6.

Contracts and Agreements

VIDEO

7.

Legal Considerations

VIDEO

8.

Integrating Industries

VIDEO

9.

Checkpoint: Policies and Frameworks

QUIZ

No.

Title

Type

Status

1.

Business Continuity

VIDEO

2.

Business Continuity Plan

VIDEO

3.

Business Impact Analysis

VIDEO

4.

Privacy Impact Assessment

VIDEO

5.

Incident Response Plan

VIDEO

6.

Testing Plans

VIDEO

7.

Lab: Understanding DR capabilities in the Azure Cloud

LAB

8.

Checkpoint: Business Continuity

QUIZ

No.

Title

Type

Status

1.

Risk Strategies

VIDEO

2.

Asset Value

VIDEO

3.

Access Control

VIDEO

4.

Aggregating Risk

VIDEO

5.

Scenario Planning

VIDEO

6.

Security Controls

VIDEO

7.

Security Solutions

VIDEO

8.

Cost Of A Data Breach

VIDEO

9.

Checkpoint: Risk Strategies

QUIZ

No.

Title

Type

Status

1.

Vendor Risk

VIDEO

2.

Business Models

VIDEO

3.

Influences

VIDEO

4.

Organizational Changes

VIDEO

5.

Shared Responsibility Model

VIDEO

6.

Viability and Support

VIDEO

7.

Dependencies

VIDEO

8.

Considerations

VIDEO

9.

Supply Chain

VIDEO

10.

Checkpoint: Vendor Risk

QUIZ

No.

Title

Type

Status

1.

Securing Networks

VIDEO

2.

Switches

VIDEO

3.

Routers

VIDEO

4.

Wireless and Mesh

VIDEO

5.

Firewalls

VIDEO

6.

Lab: Implementing a Web Application Firewall

LAB

7.

Proxies

VIDEO

8.

Gateways

VIDEO

9.

IDS and IPS

VIDEO

10.

Network Access Control (NAC)

VIDEO

11.

Remote Access

VIDEO

12.

Unified Communications

VIDEO

13.

Cloud vs On-premise

VIDEO

14.

DNSSEC

VIDEO

15.

Lab: Understanding the Role of SPF Records and DNSSEC

LAB

16.

Load Balancer

VIDEO

17.

Checkpoint: Securing Networks

QUIZ

No.

Title

Type

Status

1.

Securing Architectures

VIDEO

2.

Traffic Mirroring

VIDEO

3.

Network Sensors

VIDEO

4.

Host Sensors

VIDEO

5.

Layer 2 Segmentation

VIDEO

6.

Network Segmentation

VIDEO

7.

Server Segmentation

VIDEO

8.

Zero Trust

VIDEO

9.

Merging Networks

VIDEO

10.

Software-Defined Networking (SDN)

VIDEO

11.

Checkpoint: Securing Architectures

QUIZ

No.

Title

Type

Status

1.

Infrastructure Design

VIDEO

2.

Scalability

VIDEO

3.

Resiliency Issues

VIDEO

4.

Automation

VIDEO

5.

Performance Design

VIDEO

6.

Virtualization

VIDEO

7.

Containerization

VIDEO

8.

Lab: Implementing and Updating Containers on Windows Server 2019

LAB

9.

Lab: Performing Container Update Tasks

LAB

10.

Checkpoint: Infrastructure Design

QUIZ

No.

Title

Type

Status

1.

Cloud and Virtualization

VIDEO

2.

Cloud Deployment Models

VIDEO

3.

Cloud Service Models

VIDEO

4.

Deployment Considerations

VIDEO

5.

Provider Limitations

VIDEO

6.

Extending Controls

VIDEO

7.

Provision and Deprovision

VIDEO

8.

Storage Models

VIDEO

9.

Virtualization

VIDEO

10.

Lab: Implementing a VNet in Azure

LAB

11.

Lab: Implementing Virtual Private Cloud (VPC) in AWS

LAB

12.

Checkpoint: Cloud and Virtualization

QUIZ

No.

Title

Type

Status

1.

Software Applications

VIDEO

2.

Systems Development Life Cycle

VIDEO

3.

Software Development Life Cycle

VIDEO

4.

Development Approaches

VIDEO

5.

Software Assurance

VIDEO

6.

Baselines and Templates

VIDEO

7.

Best Practices

VIDEO

8.

Integrating Applications

VIDEO

9.

Checkpoint: Software Applications

QUIZ

No.

Title

Type

Status

1.

Data Security

VIDEO

2.

Data Life Cycle

VIDEO

3.

Data Classification

VIDEO

4.

Labeling and Tagging

VIDEO

5.

Deidentification

VIDEO

6.

Data Encryption

VIDEO

7.

Data Loss Prevention (DLP)

VIDEO

8.

DLP Detection

VIDEO

9.

Data Loss Detection

VIDEO

10.

Lab: Using Automation to Identify and Label Sensitive Data

LAB

11.

Checkpoint: Data Security

QUIZ

No.

Title

Type

Status

1.

Authentication and Authorization

VIDEO

2.

Access Control

VIDEO

3.

Credential Management

VIDEO

4.

Password Policies

VIDEO

5.

Multifactor Authentication

VIDEO

6.

Authentication Protocols

VIDEO

7.

Federation

VIDEO

8.

Root of Trust

VIDEO

9.

Attestation

VIDEO

10.

Identity Proofing

VIDEO

11.

Checkpoint: Authentication and Authorization

QUIZ

No.

Title

Type

Status

1.

Cryptography

VIDEO

2.

Privacy and Confidentiality

VIDEO

3.

Integrity and Non-repudiation

VIDEO

4.

Compliance and Policy

VIDEO

5.

Data States

VIDEO

6.

Cryptographic Use Cases

VIDEO

7.

PKI Use Cases

VIDEO

8.

Checkpoint: Cryptography

QUIZ

No.

Title

Type

Status

1.

Emerging Technology

VIDEO

2.

Artificial Intelligence & Machine Learning (AI & ML)

VIDEO

3.

Deep Learning

VIDEO

4.

Big Data

VIDEO

5.

Blockchain & Distributed Consensus

VIDEO

6.

Passwordless Authentication

VIDEO

7.

Homomorphic Encryption

VIDEO

8.

Virtual/Augmented Reality

VIDEO

9.

3D Printing

VIDEO

10.

Quantum Computing

VIDEO

11.

Checkpoint: Emerging Technology

QUIZ

No.

Title

Type

Status

1.

Enterprise Mobility

VIDEO

2.

Enterprise Mobility Management (EMM)

VIDEO

3.

WPA3

VIDEO

4.

Lab: Analyze and Attack Wireless Network Protections

LAB

5.

Connectivity Options

VIDEO

6.

Security Configurations

VIDEO

7.

DNS Protection

VIDEO

8.

Lab: Understanding DNS over HTTPS (DoH)

LAB

9.

Deployment Options

VIDEO

10.

Reconnaissance Concerns

VIDEO

11.

Mobile Security

VIDEO

12.

Checkpoint: Enterprise Mobility

QUIZ

No.

Title

Type

Status

1.

Endpoint Security Controls

VIDEO

2.

Device Hardening

VIDEO

3.

Patching

VIDEO

4.

Security Settings

VIDEO

5.

Mandatory Access Controls (MAC)

VIDEO

6.

Secure Boot

VIDEO

7.

Hardware Encryption

VIDEO

8.

Endpoint Protections

VIDEO

9.

Logging and Monitoring

VIDEO

10.

Lab: Using Security Incident and Event Management (SIEM) Features

LAB

11.

Resiliency

VIDEO

12.

Checkpoint: Endpoint Security Controls

QUIZ

No.

Title

Type

Status

1.

Cloud Technologies

VIDEO

2.

Business Continuity/Disaster Recovery (BC/DR)

VIDEO

3.

Cloud Encryption

VIDEO

4.

Serverless Computing

VIDEO

5.

Software-Defied Networking (SDN)

VIDEO

6.

Log Collection and Analysis

VIDEO

7.

Lab: Configure Monitoring in the AWS Cloud

LAB

8.

Cloud Access Security Broker (CASB)

VIDEO

9.

Cloud Misconfigurations

VIDEO

10.

Lab: Deploying a Hardened Server Image in the Azure Cloud

LAB

11.

Checkpoint: Cloud Technologies

QUIZ

No.

Title

Type

Status

1.

Operational Technologies

VIDEO

2.

Embedded Systems

VIDEO

3.

ICS and SCADA

VIDEO

4.

ICS Protocols

VIDEO

5.

Industries and Sectors

VIDEO

6.

Checkpoint: Operational Technologies

QUIZ

No.

Title

Type

Status

1.

Hashing and Symmetric Algorithms

VIDEO

2.

Hashing

VIDEO

3.

Message Authentication

VIDEO

4.

Symmetric Algorithms

VIDEO

5.

Stream Ciphers

VIDEO

6.

Block Ciphers

VIDEO

7.

Lab: Implementing Data Protection using Symmetric Encryption

LAB

8.

Checkpoint: Hashing and Symmetric Algorithms

QUIZ

No.

Title

Type

Status

1.

Asymmetric Algorithms

VIDEO

2.

Using Asymmetric Algorithms

VIDEO

3.

SSL/TLS and Cipher Suites

VIDEO

4.

S/MIME and SSH

VIDEO

5.

EAP

VIDEO

6.

IPSEC

VIDEO

7.

Elliptic Curve Cryptography (ECC)

VIDEO

8.

Forward Secrecy

VIDEO

9.

Authenticated Encryption with Associated Data (AEAD)

VIDEO

10.

Key Stretching

VIDEO

11.

Checkpoint: Asymmetric Algorithms

QUIZ

No.

Title

Type

Status

1.

Public Key Infrastructure

VIDEO

2.

PKI Components

VIDEO

3.

Digital Certificates

VIDEO

4.

Using Digital Certificates

VIDEO

5.

Trust Models

VIDEO

6.

Certificate Management

VIDEO

7.

Certificate Validity (CRL and OCSP)

VIDEO

8.

Protecting Web Traffic

VIDEO

9.

Lab: Implementing HTTP Server Certificates

LAB

10.

Troubleshooting Certificates

VIDEO

11.

Lab: Troubleshooting HTTP Server Certificates

LAB

12.

Troubleshooting Keys

VIDEO

13.

Checkpoint: Public Key Infrastructure

QUIZ

No.

Title

Type

Status

1.

Threat and Vulnerability Management

VIDEO

2.

Threat Intelligence

VIDEO

3.

Threat Hunting

VIDEO

4.

Intelligence Collection

VIDEO

5.

Threat Actors

VIDEO

6.

Threat Management Frameworks

VIDEO

7.

Lab: Exploring MITRE ATT&CK Navigator

LAB

8.

Vulnerability Management Activities

VIDEO

9.

Security Content Automation Protocol (SCAP)

VIDEO

10.

Checkpoint: Threat and Vulnerability Management

QUIZ

No.

Title

Type

Status

1.

Vulnerability Assessments

VIDEO

2.

Penetration Test

VIDEO

3.

PenTest Steps

VIDEO

4.

PenTest Requirements

VIDEO

5.

Code Analysis

VIDEO

6.

Lab: Performing Static Code Analysis

LAB

7.

Protocol Analysis

VIDEO

8.

Analysis Utilities

VIDEO

9.

Checkpoint: Vulnerability Assessments

QUIZ

No.

Title

Type

Status

1.

Risk Reduction

VIDEO

2.

Deceptive Technologies

VIDEO

3.

Security Data Analytics

VIDEO

4.

Preventative Controls

VIDEO

5.

Application Controls

VIDEO

6.

Lab: Implementing an Application Blocklist Policy

LAB

7.

Security Automation

VIDEO

8.

Physical Security

VIDEO

9.

Checkpoint: Risk Reduction

QUIZ

No.

Title

Type

Status

1.

Analyzing Vulnerabilities

VIDEO

2.

Race Conditions

VIDEO

3.

Buffer Overflows

VIDEO

4.

Authentication and References

VIDEO

5.

Ciphers and Certificates

VIDEO

6.

Improper Headers

VIDEO

7.

Software Composition

VIDEO

8.

Vulnerable Web Applications

VIDEO

9.

Lab: Analyzing Web Application Vulnerabilities

LAB

10.

Checkpoint: Analyzing Vulnerabilities

QUIZ

No.

Title

Type

Status

1.

Attacking Vulnerabilities

VIDEO

2.

Directory Traversals

VIDEO

3.

Cross-Site Scripting (XSS)

VIDEO

4.

Cross-Site Request Forgery (CSRF)

VIDEO

5.

SQL Injections

VIDEO

6.

XML Injections

VIDEO

7.

Other Injection Attacks

VIDEO

8.

Lab: Exploiting Web Applications – Stored XSS, SQL Injection

LAB

9.

Authentication Bypass

VIDEO

10.

VM Attacks

VIDEO

11.

Network Attacks

VIDEO

12.

Lab: Exploiting the Server Message Block (SMB) Protocol

LAB

13.

Lab: Analyzing SMB Vulnerabilities

LAB

14.

Social Engineering

VIDEO

15.

Checkpoint: Attacking Vulnerabilities

QUIZ

No.

Title

Type

Status

1.

Indicators of Compromise

VIDEO

2.

Types of IoCs

VIDEO

3.

PCAP Files

VIDEO

4.

NetFlow

VIDEO

5.

Logs

VIDEO

6.

IoC Notifications

VIDEO

7.

Lab: Exploring and Interpreting Intrusion Detection System (IDS) Alerts

LAB

8.

Lab: Analyzing Intrusion Detection System Logs

LAB

9.

Response to IoCs

VIDEO

10.

Checkpoint: Indicators of Compromise

QUIZ

No.

Title

Type

Status

1.

Incident Response

VIDEO

2.

Triage

VIDEO

3.

Communication Plan

VIDEO

4.

Stakeholder Management

VIDEO

5.

Incident Response Process

VIDEO

6.

Playbooks

VIDEO

7.

Checkpoint: Incident Response

QUIZ

No.

Title

Type

Status

1.

Digital Forensics

VIDEO

2.

Forensic Process

VIDEO

3.

Chain of Custody

VIDEO

4.

Order of Volatility

VIDEO

5.

Forensic Analysis

VIDEO

6.

Lab: Exploring Cryptography and Cryptanalysis Using Visual Tools

LAB

7.

Checkpoint: Digital Forensics

QUIZ

No.

Title

Type

Status

1.

Digital Forensic Tools

VIDEO

2.

Forensic Workstations

VIDEO

3.

File Carving Tools

VIDEO

4.

Binary Analysis Tools

VIDEO

5.

Lab: Analyzing Firmware using Binary Analysis and Hardware Emulation

LAB

6.

Forensic Analysis Tools

VIDEO

7.

Imaging Tools

VIDEO

8.

Collection Tools

VIDEO

9.

Checkpoint: Digital Forensic Tools

QUIZ

No.

Title

Type

Status

1.

Conclusion

VIDEO

2.

CASP+ (CAS-004) Practice Exam

LAB

Meet Your Instructor

Jason Dion

Jason Dion

Lead Instructor

Jason Dion, CISSP No. 349867, is a former college professor and the lead instructor at Dion Training Solutions.

He has multiple information technology professional certifications, including Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Network Defense Architect (CNDA), Digital Forensic Examiner (DFE), Digital Media Collector (DMC), CySA+, Security+, Network+, A+, PRINCE2 Practitioner, and ITIL.

With networking experience dating back to 1992, Jason has been a network engineer, Deputy Director of a Network Operations Center, and an Information Systems Officer for large organizations around the globe.

He holds a Master’s of Science degree in Information Technology with a specialization in Information Assurance and a Bachelor’s of Science in Human Resources Management. He lives in Puerto Rico with his wife and two children.

Course Rating

( 5 average based on 2 reviews)
5 star
2
4 star
0
3 star
0
2 star
0
1 star
0

2 Reviews

Afroz Shaikh
Afroz Shaikh
Position: confidential

Not only good trainer but good person as well, very humble and he replies to every query and every doubt. One of the best cyber security instructor :)

Lee Sheridan
Lee Sheridan
Position: confidential

I have been learning with Dion Training for over a year now. Love the videos, fast responses for questions and thee personal touch in customer service. I will recommend their services to all my contacts.

CASP+
Course Preview
  • Price$399
  • InstructorJason Dion
  • Duration40+ hours
  • Lessons257
  • Quizzes12
  • Enrolled29 students
  • Access12 Months
  • Full Practice Exams
    Included
  • Official Textbook
    Included
  • 100% Pass Guarantee
    Included

100% Pass Guarantee


All the risk is on us, as it should be. You literally have nothing to lose.


We are so confident that you are going to learn everything you need to know to pass your CompTIA®, ITIL®, PRINCE2®, PRINCE2 Agile®, or Linux certification if you pass our courses at diontraining.com. So, if you do not pass your certification within 60 days of registering for and passing your course, simply send us your test score and your course completion letter, and we will pay for your exam retake.

guarantee
image

Authorized Training Organization


CompTIA Authorized Training Organization


All of our courses undergo a stringent review by the accreditation body prior to being published. When you take a course through us, you can be assured you are getting the highest quality training and an affordable price.