CompTIA CASP+® Training
Course 2046
5 DAY COURSE

Course Outline

This CASP+ Training course prepares you for the CompTIA CASP+ certification exam (CAS-004) and demonstrates your knowledge and skills in enterprise security, risk management, research and analysis, and the integration of computing, communications, and business disciplines. You will learn through a CompTIA-approved CASP+ training program and receive after-course instructor coaching and an exam voucher. 

The course is available in-person or online, with virtual instructor-led training and virtual classroom options, providing a flexible and convenient learning experience.

Passing the CompTIA CASP+ Certification Exam meets U.S. DoD Directive 8140/8570.01 Technical (IAT) Level-III, Management (IAM) Level-II and Information Assurance Security Architect/Engineer (IASAE) Level-I and Level II requirements.

CompTIA CASP+® Training Benefits

  • In this course, you will learn how to:

    • Experience an Official CompTIA- CASP+ training program.
    • Receive after-course instructor coaching and an exam voucher.
    • Prepare for the CompTIA Advanced Security Practitioner (CASP+) Certification Exam.
    • Investigate enterprise storage requirements.
    • Examine risk management security policies and procedures.
    • Research potential threats and identify appropriate countermeasures.
    • Evaluate collaboration methodologies for secure communications.
    • Continue learning and face new challenges with after-course one-on-one instructor coaching.
  • Training Prerequisites

    • Learning Tree course 446, CompTIA Security+® Training, or equivalent experience
    • Ten years of IT (Information Technology) administration experience, including at least five years of hands-on technical security experience
  • Certification Information

    You must pass the CompTIA Advanced Security Practitioner (CASP+) certification exam to earn this certification. Exam vouchers are available upon request and included in the tuition fee.

CASP+ Training Outline

CASP+ Exam Overview

  • Examination and certification goals
  • The five domains of the exam
  • Learning techniques

Module 1: Enterprise Security

Identifying security concerns in scenarios

  • Exploring cryptographic techniques
  • Advanced PKI concepts

Distinguishing between cryptographic concepts

  • Entropy
  • Confusion and diffusion
  • Chain of trust

Securing enterprise storage

  • Examining storage types and protocols
  • Secure storage management

Analyzing network security architectures

  • Designing secure networks
  • Employing virtual networking solutions

Troubleshooting security controls for hosts

  • Host security: trusted OS (Operating System), endpoint, host hardening
  • Vulnerabilities in co-mingling of hosts

Differentiating application vulnerabilities

  • Web application security
  • Application security concerns
  • Mitigating client-side vs. server-side processing

Module 2: Risk Management and Incident Response

Interpreting business and industry influences and risks

  • Analyzing risk scenarios
  • Identifying the impact of de-perimeterization

Executing risk mitigation planning, strategies, and control

  • Assessing the CIA aggregate scores
  • Making risk determination

Privacy policies and procedures

  • Developing policies to support business objectives
  • Safeguarding Personally Identifiable Information (PII)

Conduct incident response and recovery procedures

  • Constructing a data inventory with e-discovery
  • Minimizing the severity of data breaches

Module 3: Research, Analysis, and Assessment

Determining industry trends impact to the enterprise

  • Performing ongoing research to support best practices
  • Researching security requirements for contracts

Appropriate security document usage

  • Request for Information (RFI)
  • Request for Quote (RFQ)
  • Request for Proposal (RFP)

Evaluating scenarios to determine how to secure the enterprise

  • Conducting cost-benefit and security solution analysis
  • Reviewing the effectiveness of existing security controls

Conducting an assessment and analyzing the results

  • Determining appropriate tools for data gathering
  • Identifying methods to perform assessments

Module 4: Integrating Computing, Communications, and Business Disciplines

Collaborating across diverse business units to achieve security goals

  • Communicating with stakeholders
  • Interpreting security requirements and providing guidance
  • Identifying secure communications goals

Selecting controls for secure communications

  • Utilizing unified collaboration tools
  • Mobile devices
  • Applying over-the-air technologies

Implementing security across the technology life cycle

  • Selecting security controls
  • Developing Security Requirements Traceability Matrices

Module 5: Technical Integration of Enterprise Components

Integrate devices into a secure enterprise architecture

  • Securing data following existing security standards
  • Applying technical deployment models
  • Integrating storage and applications into the enterprise

Integrating advanced authentication and authorization technologies

  • Implementing certificate-based and SSO authentication
  • Applying federation solutions
Course Dates
Attendance Method
Note about the Certification Exam

The exam is not included in the tuition. DIR will cover the cost if you choose to take the exam. When you register for the course, you will be prompted to choose Y/N to take the exam. Please be advised that if you do choose to take the exam, the Certification Organization has agreed to provide DIR the pass/fail status of your exam. DIR will only share this information in an aggregated report to state leadership that reflects total exam pass or fails. No individual names of any students will be included in any reports.

If you wish to pursue certification, DIR requires that you submit the request within one month of the last day of your course to request your exam voucher. DIR requires that you take your exam within six months of the last day of your course.

Additional comments or questions (optional)

Private Team Training

Interested in courses outside the scope of the DIR InfoSec Academy? Your organization has the option to purchase additional courses for your team through our DIR IT training contract DIR-TSO-4006