Course duration: 5 days; Instructor-led
This course is designed for IT professionals in the cybersecurity industry whose primary job responsibility is to secure complex enterprise environments. The target student should have real-world experience with the technical administration of these enterprise environments.
This course is also designed for students who are seeking the CompTIA® Advanced Security Practitioner (CASP+®) certification and who want to prepare for Exam CAS-003. Students seeking CASP+ certification should have at least 10 years of experience in IT management, with at least 5 years of hands-on technical security experience.
To be fit for this advanced course, you should have at least a foundational knowledge of information security. This includes, but is not limited to:
- Knowledge of identity and access management (IAM) concepts and common implementations, such as authentication factors and directory services.
- Knowledge of cryptographic concepts and common implementations, such as Secure Sockets Layer/Transport Layer Security (SSL/TLS) and public key infrastructure (PKI).
- Knowledge of computer networking concepts and implementations, such as the TCP/IP model and configuration of routers and switches.
- Knowledge of common security technologies used to safeguard the enterprise, such as anti-malware solutions, firewalls, and VPNs.
You can obtain this level of knowledge by taking the CompTIA® Security+® (Exam SY0-501) course or by demonstrating this level of knowledge by passing the exam
This course is highly interactive and uses diverse teaching methods (lectures, self-assessments, group discussions, activities, and videos) to accommodate different learning styles This training will also leverage on participant’s personal life and work experiences.
- Support IT governance in the enterprise with an emphasis on managing risk.
- Leverage collaboration tools and technology to support enterprise security.
- Use research and analysis to secure the enterprise.
- Integrate advanced authentication and authorization techniques.
- Implement cryptographic techniques.
- Implement security controls for hosts.
- Implement security controls for mobile devices.
- Implement network security.
- Implement security in the systems and software development lifecycle.
- Integrate hosts, storage, networks, applications, virtual environments, and cloud technologies in a secure enterprise architecture.
- Conduct security assessments.
- Respond to and recover from security incidents.
· Identify the Importance of IT Governance and Risk Management
· Assess Risk
· Mitigate Risk
· Integrate Documentation into Risk Management
- Facilitate Collaboration across Business Units
- Secure Communications and Collaboration Solutions
- Determine Industry Trends and Their Effects on the Enterprise
- Analyze Scenarios to Secure the Enterprise
- Implement Authentication and Authorization Technologies
- Implement Advanced Identity and Access Management
- Select Cryptographic Techniques
- Implement Cryptography
- Select Host Hardware and Software
- Harden Hosts
- Virtualize Servers and Desktops
- Protect Boot Loaders
- Implement Mobile Device Management
- Address Security and Privacy Concerns for Mobile Devices
- Plan Deployment of Network Security Components and Devices
- Plan Deployment of Network-Enabled Devices
- Implement Advanced Network Design
- Implement Network Security Controls
- Implement Security throughout the Technology Lifecycle
- Identify General Application Vulnerabilities
- Identify Web Application Vulnerabilities
- Implement Application Security Controls
- Integrate Standards and Best Practices in Enterprise Security
- Select Technical Deployment Models
- Integrate Cloud-Augmented Security Services
- Secure the Design of the Enterprise Infrastructure
- Integrate Data Security in the Enterprise Architecture
- Integrate Enterprise Applications in a Secure Architecture
- Select Security Assessment Methods
- Perform Security Assessments with Appropriate Tools
- Prepare for Incident Response and Forensic Investigations
- Conduct Incident Response and Forensic Analysis