Overview

Overview 

  • Completion Certificate
  • NEW State of the art platform
  • Employment Advice available on completion
  • 12 Months Access

The CompTIA Advanced Security Practitioner course is a preparatory course for the exam CAS-003 conducted by The Computing Technology Industry Association (CompTIA). It covers the exam topics in detail and prepares the students in the areas of risk management; enterprise security operations and architecture; research and collaboration; and integration of enterprise security.

This certification course covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers, while managing risk.

There is no required prerequisite for this course however, the CASP certification is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus at the enterprise level.

Course Outline

Course Curriculum

Course Introduction
  •  Course Introduction 
  •  Instructor Introduction 
Chapter 01 - Understanding Risk Management
  •  Chapter Introduction 
  •  Topic A: Understanding Business and Industry Influences 
  •  Ongoing Risk Management 
  •  New Products and User Behaviors 
  •  Business Models and Strategies
  •  Cloud Technologies 
  •  Acquisitions and Mergers 
  •  Due Diligence Team 
  •  Data Ownership 
  •  Data Reclassification 
  •  Integrating Diverse Industries 
  •  Common Regulations 
  •  Geographic Differences 
  •  Data Sovereignty 
  •  Internal and External Influences 
  •  De-perimeterization 
  •  Understand Changes in Network Boundaries 
  •  Topic B: Policies and Procedures 
  •  Understanding Policies and Procedures
  •  Policy Life Cycle
  •  Process Life Cycle
  •  Reviewing Policies and Processes
  •  Common Business Documents 
  •  Security for Contracts 
  •  Contract Requirements 
  •  General Privacy Principles
  •  Standard Security Practices 
  •  Demo - Examining Security Policies
  •  Topic C: Risk Mitigation and Control 
  •  Introduction to Risk Mitigation 
  •  Categorizing Data 
  •  Incorporating Stakeholder Input 
  •  Aggregate CIA Scores 
  •  Selecting and Implementing Controls 
  •  Security Control Frameworks 
  •  Options for Frameworks 
  •  Extreme Scenario Planning 
  •  System-Specific Risk Analysis 
  •  Qualitative Risk Analysis 
  •  Quantitative Risk Analysis 
  •  Risk Impact 
  •  Likelihood of Threat 
  •  Return on Investment
  •  Understanding Payback
  •  Total Cost of Ownership 
  •  TCO Guidelines 
  •  Translate to Business Terms 
  •  Risk Management Strategies 
  •  Risk Management Processes 
  •  Information and Asset Value and Costs
  •  Vulnerabilities and Threat Identification 
  •  Additional Factors 
  •  Topic D: Business Continuity Planning 
  •  Continuity Planning 
  •  BCP Components 
  •  BCP Steps 
  •  Additional Plans 
  •  Conducting Business Impact Analysis
  •  Chapter 01 Review 
  •  Quiz 1
Chapter 02 - Network and Security Components and Architecture
  •  Chapter Introduction 
  •  Topic A: Physical and Virtual Network Security Devices 
  •  Unified Threat Management
  •  Analyzing UTM 
  •  Intrusion Detection and Prevention
  •  In-Line Network Encryptor 
  •  Network Access Control 
  •  SIEM
  •  Firewalls 
  •  Firewall Architecture
  •  Wireless Controller 
  •  Routers and Switches 
  •  Proxy Servers 
  •  Topic B: Application and Protocol Level Security 
  •  Web Application Firewalls
  •  Hardware Security Modules 
  •  Vulnerability Scanners 
  •  Topic C: Advanced Network Design
  •  Virtual Private Networks 
  •  VPN Protocols 
  •  IP Security (IPSec) 
  •  IPSec Modes 
  •  Demo - Examining IPSec Policies 
  •  Secure Sockets Layer (SSL) 
  •  Transport Layer Security (TLS) 
  •  Additional Security Protocols 
  •  Authentication Protocols 
  •  Topic D: Network Solutions for Data Flow 
  •  Data Loss Prevention 
  •  Data Flow Enforcement 
  •  Network Flow 
  •  Topic E: Secure Baselines of Networking and Security Components 
  •  Securing Device Configurations 
  •  Access Control Lists (ACLs) 
  •  ACL Rule Sets 
  •  Change Monitoring 
  •  Configuration Lockdown 
  •  Availability Controls 
  •  Disk Availability 
  •  Key Availability Terms 
  •  Topic F: Advanced Configuration of Network Devices 
  •  Additional Configurations 
  •  Transport Security 
  •  Trunking Security 
  •  Port Security 
  •  Ports and Sockets 
  •  Security Zones 
  •  Network Segmentation 
  •  Network Access Control
  •  NAC Concepts 
  •  Network Enabled Devices 
  •  Automation Systems 
  •  Physical Security 
  •  Chapter 02 Review 
 

 

Who Is This For

This package is designed for any individual wishing to pursue or enhance their career in IT.

Our Online Courses is a cost-effective and successful approach for many individuals. It provides a flexible learning method, allowing candidates to schedule learning at a time that suits them and fits in with other commitments; ideal for those who find it difficult to take time away from their workplace. It also allows candidates to work at their own pace, and revisit sections of the course as often as needed, leading to a fuller understanding of all the topics covered.

In addition, there are none of the high costs of travel and accommodation associated with courses at an external venue.

Requirements

Our training works on all devices including Mobile phones, IPad’s, Android tablets, Macs and PC’s.

Media

CareerMatch provides industry leading online training courses for individuals and businesses alike.

We build our curriculum using proven educational concepts and sound instructional design principles to create the highest quality courses in the IT training field.

CareerMatch employs only the industry’s best instructors and course developers to create courses and certification preparation materials unrivaled in the marketplace.

With a passion for technology and a focus on being the first company to bring new technology courses to market, CareerMatch strives and succeeds in ALWAYS providing its student with the tools needed to succeed at the highest possible level and raise the benchmark in today’s IT industry.

Career Path

A list of Career Paths you can pursue:

  • 1st Line Support
  • 2nd Line Support
  • Computer Support Specialist
  • IT Technician
  • IT Engineer
  • IT Support Engineer
  • Desktop Support Technician
  • IT Support Analyst
  • Service Desk Administrator
  • Computer Support Administrator

Image result for job search
Please click the Job Boards below for current vacancies:


Reed – Logos Download
Image result for totaljob logo
Image result for monster jobs uk
Image result for monster recruitment

Training Features

  • EXPERT INSTRUCTOR-LED TRAINING

    Our Courseware uses only the industry’s finest instructors. They have a minimum of 15 years real-world experience and are subject matter experts in their fields. Unlike a live class, you can fast-forward, repeat or rewind all your lectures. This creates a personal learning experience and gives you all the benefit of hands-on training with the flexibility of doing it around your schedule 24/7.

  • QUIZZES & EXAM SIMULATORS

    Our custom practice exams prepare you for your exams differently and more effectively than the traditional exam preps on the market. You will have practice quizzes after each module to ensure you are confident on the topic you have completed before proceeding. This will allow you to gauge your effectiveness before moving to the next module in your course. Our Courses also include practice exams designed to replicate and mirror the environment in the testing centre. These exams are on average 100 questions to ensure you are 100% prepared before taking your certification exam.

  • VISUAL DEMONSTRATIONS & MULTIMEDIA PRESENTATIONS

    Our courseware includes instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor. Our Courseware always focuses on real world scenarios and skill-set development.

  • NAVIGATION & CONTROLS

    Our self-paced training programs are designed in a modular fashion to allow you the flexibility to work with expert level instruction anytime 24/7. All courses are arranged in defined sections with navigation controls allowing you to control the pace of your training. This allows students to learn at their own pace around their schedule.

  • 12 MONTHS UNLIMITED ACCESS

    Each student will have 12 months unlimited access to allow you to have access to the training anytime 24/7.

Exams Process

Exam Information

You'll sit an exam at a local test centre. We provide interactive quizzes after each module and a mock exam at the end of your course to ensure you're fully prepared for the real thing. Once you've passed with at least 80%, you'll be able to book your exam as a private candidate.

Please NOTE: Exams are not included.

How To Schedule Your CompTIA Exam

  • Go to the Pearson Vue website to set up a CompTIA profile, or login if you have an existing account
  • Once you have successfully created a profile or logged in, click 'View exam'
  • Select the exam you are looking to book
  • Choose your preferred exam language out of the options available
  • Click 'Schedule this exam'
  • Then check out using your personal payment details

Got a question about exams? Contact our course advisors by email or by phone on 0203 633 4671. We're happy to help!

Good Luck in your exams!

£99.00
In stock
SKU
CASP

Overview

Overview 

  • Completion Certificate
  • NEW State of the art platform
  • Employment Advice available on completion
  • 12 Months Access

The CompTIA Advanced Security Practitioner course is a preparatory course for the exam CAS-003 conducted by The Computing Technology Industry Association (CompTIA). It covers the exam topics in detail and prepares the students in the areas of risk management; enterprise security operations and architecture; research and collaboration; and integration of enterprise security.

This certification course covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers, while managing risk.

There is no required prerequisite for this course however, the CASP certification is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus at the enterprise level.

Course Outline

Course Curriculum

Course Introduction
  •  Course Introduction 
  •  Instructor Introduction 
Chapter 01 - Understanding Risk Management
  •  Chapter Introduction 
  •  Topic A: Understanding Business and Industry Influences 
  •  Ongoing Risk Management 
  •  New Products and User Behaviors 
  •  Business Models and Strategies
  •  Cloud Technologies 
  •  Acquisitions and Mergers 
  •  Due Diligence Team 
  •  Data Ownership 
  •  Data Reclassification 
  •  Integrating Diverse Industries 
  •  Common Regulations 
  •  Geographic Differences 
  •  Data Sovereignty 
  •  Internal and External Influences 
  •  De-perimeterization 
  •  Understand Changes in Network Boundaries 
  •  Topic B: Policies and Procedures 
  •  Understanding Policies and Procedures
  •  Policy Life Cycle
  •  Process Life Cycle
  •  Reviewing Policies and Processes
  •  Common Business Documents 
  •  Security for Contracts 
  •  Contract Requirements 
  •  General Privacy Principles
  •  Standard Security Practices 
  •  Demo - Examining Security Policies
  •  Topic C: Risk Mitigation and Control 
  •  Introduction to Risk Mitigation 
  •  Categorizing Data 
  •  Incorporating Stakeholder Input 
  •  Aggregate CIA Scores 
  •  Selecting and Implementing Controls 
  •  Security Control Frameworks 
  •  Options for Frameworks 
  •  Extreme Scenario Planning 
  •  System-Specific Risk Analysis 
  •  Qualitative Risk Analysis 
  •  Quantitative Risk Analysis 
  •  Risk Impact 
  •  Likelihood of Threat 
  •  Return on Investment
  •  Understanding Payback
  •  Total Cost of Ownership 
  •  TCO Guidelines 
  •  Translate to Business Terms 
  •  Risk Management Strategies 
  •  Risk Management Processes 
  •  Information and Asset Value and Costs
  •  Vulnerabilities and Threat Identification 
  •  Additional Factors 
  •  Topic D: Business Continuity Planning 
  •  Continuity Planning 
  •  BCP Components 
  •  BCP Steps 
  •  Additional Plans 
  •  Conducting Business Impact Analysis
  •  Chapter 01 Review 
  •  Quiz 1
Chapter 02 - Network and Security Components and Architecture
  •  Chapter Introduction 
  •  Topic A: Physical and Virtual Network Security Devices 
  •  Unified Threat Management
  •  Analyzing UTM 
  •  Intrusion Detection and Prevention
  •  In-Line Network Encryptor 
  •  Network Access Control 
  •  SIEM
  •  Firewalls 
  •  Firewall Architecture
  •  Wireless Controller 
  •  Routers and Switches 
  •  Proxy Servers 
  •  Topic B: Application and Protocol Level Security 
  •  Web Application Firewalls
  •  Hardware Security Modules 
  •  Vulnerability Scanners 
  •  Topic C: Advanced Network Design
  •  Virtual Private Networks 
  •  VPN Protocols 
  •  IP Security (IPSec) 
  •  IPSec Modes 
  •  Demo - Examining IPSec Policies 
  •  Secure Sockets Layer (SSL) 
  •  Transport Layer Security (TLS) 
  •  Additional Security Protocols 
  •  Authentication Protocols 
  •  Topic D: Network Solutions for Data Flow 
  •  Data Loss Prevention 
  •  Data Flow Enforcement 
  •  Network Flow 
  •  Topic E: Secure Baselines of Networking and Security Components 
  •  Securing Device Configurations 
  •  Access Control Lists (ACLs) 
  •  ACL Rule Sets 
  •  Change Monitoring 
  •  Configuration Lockdown 
  •  Availability Controls 
  •  Disk Availability 
  •  Key Availability Terms 
  •  Topic F: Advanced Configuration of Network Devices 
  •  Additional Configurations 
  •  Transport Security 
  •  Trunking Security 
  •  Port Security 
  •  Ports and Sockets 
  •  Security Zones 
  •  Network Segmentation 
  •  Network Access Control
  •  NAC Concepts 
  •  Network Enabled Devices 
  •  Automation Systems 
  •  Physical Security 
  •  Chapter 02 Review 
 

 

Who Is This For

This package is designed for any individual wishing to pursue or enhance their career in IT.

Our Online Courses is a cost-effective and successful approach for many individuals. It provides a flexible learning method, allowing candidates to schedule learning at a time that suits them and fits in with other commitments; ideal for those who find it difficult to take time away from their workplace. It also allows candidates to work at their own pace, and revisit sections of the course as often as needed, leading to a fuller understanding of all the topics covered.

In addition, there are none of the high costs of travel and accommodation associated with courses at an external venue.

Requirements

Our training works on all devices including Mobile phones, IPad’s, Android tablets, Macs and PC’s.

Media

CareerMatch provides industry leading online training courses for individuals and businesses alike.

We build our curriculum using proven educational concepts and sound instructional design principles to create the highest quality courses in the IT training field.

CareerMatch employs only the industry’s best instructors and course developers to create courses and certification preparation materials unrivaled in the marketplace.

With a passion for technology and a focus on being the first company to bring new technology courses to market, CareerMatch strives and succeeds in ALWAYS providing its student with the tools needed to succeed at the highest possible level and raise the benchmark in today’s IT industry.

Career Path

A list of Career Paths you can pursue:

  • 1st Line Support
  • 2nd Line Support
  • Computer Support Specialist
  • IT Technician
  • IT Engineer
  • IT Support Engineer
  • Desktop Support Technician
  • IT Support Analyst
  • Service Desk Administrator
  • Computer Support Administrator

Image result for job search
Please click the Job Boards below for current vacancies:


Reed – Logos Download
Image result for totaljob logo
Image result for monster jobs uk
Image result for monster recruitment

Training Features

  • EXPERT INSTRUCTOR-LED TRAINING

    Our Courseware uses only the industry’s finest instructors. They have a minimum of 15 years real-world experience and are subject matter experts in their fields. Unlike a live class, you can fast-forward, repeat or rewind all your lectures. This creates a personal learning experience and gives you all the benefit of hands-on training with the flexibility of doing it around your schedule 24/7.

  • QUIZZES & EXAM SIMULATORS

    Our custom practice exams prepare you for your exams differently and more effectively than the traditional exam preps on the market. You will have practice quizzes after each module to ensure you are confident on the topic you have completed before proceeding. This will allow you to gauge your effectiveness before moving to the next module in your course. Our Courses also include practice exams designed to replicate and mirror the environment in the testing centre. These exams are on average 100 questions to ensure you are 100% prepared before taking your certification exam.

  • VISUAL DEMONSTRATIONS & MULTIMEDIA PRESENTATIONS

    Our courseware includes instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor. Our Courseware always focuses on real world scenarios and skill-set development.

  • NAVIGATION & CONTROLS

    Our self-paced training programs are designed in a modular fashion to allow you the flexibility to work with expert level instruction anytime 24/7. All courses are arranged in defined sections with navigation controls allowing you to control the pace of your training. This allows students to learn at their own pace around their schedule.

  • 12 MONTHS UNLIMITED ACCESS

    Each student will have 12 months unlimited access to allow you to have access to the training anytime 24/7.

Exams Process

Exam Information

You'll sit an exam at a local test centre. We provide interactive quizzes after each module and a mock exam at the end of your course to ensure you're fully prepared for the real thing. Once you've passed with at least 80%, you'll be able to book your exam as a private candidate.

Please NOTE: Exams are not included.

How To Schedule Your CompTIA Exam

  • Go to the Pearson Vue website to set up a CompTIA profile, or login if you have an existing account
  • Once you have successfully created a profile or logged in, click 'View exam'
  • Select the exam you are looking to book
  • Choose your preferred exam language out of the options available
  • Click 'Schedule this exam'
  • Then check out using your personal payment details

Got a question about exams? Contact our course advisors by email or by phone on 0203 633 4671. We're happy to help!

Good Luck in your exams!

Speak to our training experts today for FREE tailored advice.
(0)203 633 4671