Request new password

We Are All About You

XpertSkills - the parent company under which iCollege operates - was established in South Africa in 2003 and since then, we have grown globally in leaps and bounds with customers and partners in more than 120 countries. With employees on 3 continents and as a next-generation, virtual organization we are unconstrained by the limits that are usually associated with traditional “brick & mortar” companies.

This allows us to focus, without distraction, on reaching our ultimate goal – ensuring your ongoing success – by providing affordable, reliable, high quality and relevant learning products whilst remaining innovative and agile.

Contact Details:

Skype: xpertskills

Physical Address:

Head Office - South Africa
16 Monte Carlo Crescent
Kyalami business Park
South Africa 1684

You are here

CompTIA Advanced Security Practitioner CASP CAS-003


CompTIA Advanced Security Practitioner CASP CAS-003

Interactive and entertaining talk-show style format presented by industry leading experts.

CompTIA Advanced Security Practitioner (CASP+) is the ideal certification for technical professionals who wish to remain immersed in technology as opposed to strictly managing resources. CASP+ is the only hands-on, performance-based certification for practitioners - not managers - at the advanced skill level of cybersecurity. While cybersecurity managers help identify what cybersecurity policies and frameworks could be implemented, CASP-certified professionals figure out how to implement solutions within those policies and frameworks. The CASP+ certification validates advanced-level competency in risk management; enterprise security operations and architecture; research and collaboration; and integration of enterprise security.

Instructor: Chrys Thorsen

  • Implement cryptographic techniques.
  • Implement security controls for mobile devices.
  • Use research and analysis to secure the enterprise.
  • Integrate advanced authentication and authorization techniques.
  • Support IT governance in the enterprise with an emphasis on managing risk.
  • Implement security controls for hosts.
  • Leverage collaboration tools and technology to support enterprise security.
  • Implement network security.
  • Implement security in the systems and software development lifecycle.
  • Integrate hosts, storage, networks, applications, virtual environments, and cloud technologies in secure enterprise architecture.
  • Respond to and recover from security incidents.
  • Conduct security assessments.

To be fit for this advanced course, you should have at least a foundational knowledge of information security. This includes, but is not limited to:

  • Knowledge of computer networking concepts and implementations, such as the TCP/IP model and configuration of routers and switches.
  • Knowledge of cryptographic concepts and common implementations, such as Secure Sockets Layer/Transport Layer Security (SSL/TLS) and public key infrastructure (PKI).
  • Knowledge of identity and access management (IAM) concepts and common implementations, such as authentication factors and directory services.
  • Knowledge of common security technologies used to safeguard the enterprise, such as anti-malware solutions, firewalls, and VPNs.
Target Audience

This course is designed for IT professionals who want to acquire the technical knowledge and skills needed to conceptualize, engineer, integrate, and implement secure solutions across complex enterprise environments. The target student should aspire to apply critical thinking and judgment across a broad spectrum of security disciplines to propose and implement sustainable security solutions that map to organizational strategies; translate business needs into security requirements; analyze risk impact, and respond to security incidents.

 This course is also designed for students who are seeking the CompTIA Advanced Security Practitioner (CASP+) certification and who want to prepare for Exam CAS-003. Students seeking CASP+ certification should have at least 10 years of experience in IT management, with at least 5 years of hands-on technical security experience.

Module 1 - Risk Management

1.1 Exploring Cloud Services Act

1.1 Acquisition Merger Demerger

1.1 Acquisition Merger Demerger Part2

1.2 Compare and Contrast

1.3 Given Scenario Execute Risk1.3 Given Scenario Execute Risk Part2

1.3 Continuing Terminology IT Governance

1.4 Analyze Security Solution Metrics and Attributes

1.4 Analyze Risk

1.4 Trend Analysis Act

Module 2 - Enterprise Security Architecture

2 Enterprise Security Architecture

2.1 Network Device Security Act

2.1 Application and Protocol

2.1 Advanced Network Security Act

2.1 Complex Network Security Solution

2.1 Implementing VLANs Switchport Sec Act

2.1 Implementing VLANs Switchport Sec Act Part2

2.1 Distributed Denial of Service

2.1 Exploring DoS Attacks Act

2.1 Security Zones

2.1 Network Access Control

2.1 Searching for Vulnerablie ICS-SCADA Act

2.2 Analyze a Scenario Integrate Security

2.2 Configuring Windows Firewall Act

2.2 Log Monitoring and Auditing

2.2 Group Policy Act

2.2 Patch Management

2.2 Management Interface

2.2 Measured Launch

2.3 Analyze a Scenario to Integrate Security Controls

2.3 Security Implications Privacy

2.3 Baseband

2.4 Given Software Vulnerabilty Scenarios

2.4 SQL Injection Act

2.4 Improper Error and Exception Handling

2.4 Buffer Overflows Act

2.4 Memory Leaks

2.4 Researching Vulnerabilities Exploits Act

Module 3 - Enterprise Security Operations

3 Enterprise Security Operations

3 Runtime Debugging

3.1 Fingerprinting an OS Services Act

3.1 Code Review

3.1 Conducting OSINT Act

3.1 Types

3.1 Conducting a Vulnerability Assessment Act

3.2 Analyze a Scenario Output

3.2 Network Sniffing Act

3.2 Security Content Automation

3.2 Using a SCAP Scanner Act

3.2 Network Enumerator

3.2 Password Cracking Act

3.2 Host Vulnerability Scanner

3.2 Using Command Line Tools Act

3.2 OpenSSL

3.2 Scanning for Heartbleed Act

3.2 Local Exploitation Tools

3.2 Verifying File Integrity with SFC Act

3.2 Log Analysis Tools

3.3 Given Scenario Implement Incident

3.3 Facilitate Incident Detection Response

3.3 Using Incident Response Support Tools Act

3.3 Severity of Incident Detection Breach

Module 4 - Technical Integration of Enterprise Security

4 Technical Integration of Enterprise

4 Technical Integration of Enterprise Part2

4.1 DataSecurity Considerations

4.1 Examing Network Diagrams Act

4.1 Security and Privacy Considerations of Storage integration

4.1 Exploring Directory Services and DNS Act

4.2 Given Scenario Integrate Cloud and Virtualization

4.2 Taking Another Look at Cloud Services Act

4.2 Security Advantages and Disadvanatges of Virtualization

4.2 Using Virtualization Act

4.2 Cloud Augmented Security

4.3 Given Scenario Integrate and Troubleshoot Advanced Authentication

4.4 Given Scenario Cryptographic

4.4 Cryptographic Part2

4.4 Mobile Device Encryption

4.4 Cryptography Act

4.5 Select the Appropriate Control

4.5 Phising Act

4.5 Telephony VoIP Integration

Module 5 - Research, Development and Collaboration

5 Research Methods to Determine Industry Trends

5.1 Practicing Threat Intelligence Act

5.2 Scenario Implememt Security Activities Across

5.2 Static Testing

5.3 Explain the Importance of Interaction

?Interactive and entertaining talk-show style format presented by industry leading experts.
  • 28:00:00
    Hours of learning
  • Presented by highly qualified, industry leading experts
  • 12 Months access
Back to Top