New members: get your first 7 days of ITTutorPro Premium for free! Join for free

CompTIA CASP+ Advanced Security Practitioner CAS-003

Course Description

28 Hours

89 Videos

The CompTIA CASP+ training course, Advanced Security Practitioner (CASP-003) course provides advanced-level training in risk management, enterprise security operations and architecture, research and collaboration, and integration of enterprise security.

It covers all of the new exam objectives for the CAS-003 exam. The CompTIA CASP+ certification is the highest-level security certification offered by CompTIA and is the final step in achieving the new CompTIA Security Analytics Expert (CSAE) or Security Infrastructure Expert (CSIE) stackable certification.

This course is intended for advanced students and cyber security practitioners who will implement cyber security. Successful completion of prerequisite courses in Security+ and CySA+ and PenTest+ is highly recommended.

Course Lesson Preview Video

Take this opportunity to view a lesson included in this course.

Key Learning Topics In This Course

  • Risk Management
  • Enterprise Security Architecture
  • Enterprise Security Operations
  • Technical Integration of Enterprise Security
  • Research, Development and Collaboration

Course Highlights

Closed Caption


Dedicated Tutors

Share on:

Proudly Display Your Achievement

Upon completion of your training, you’ll receive a personalized certificate of completion to help validate to others your new skills.

Course Syllabus

Module 1 – Risk Management

  1. Module 1 Notes
  2. Intro CASP
  3. CASP Introduction
  4. Mod 1.1 Exploring Cloud Services Act
  5. Mod 1.1 Acquisition Merger Demerger
  6. Mod 1.1 Acquisition Merger Demerger Part2
  7. Mod 1.2 Compare and Contrast
  8. Mod 1.3 Given Scenario Execute Risk
  9. Mod 1.3 Given Scenario Execute Risk Part2
  10. Mod 1.3 Continuing Terminology IT Governance
  11. Mod 1.4 Analyze Security Solution Metrics and Attributes
  12. Mod 1.4 Analyze Risk
  13. Mod 1.4 Trend Analysis Act

Module 2 – Enterprise Security Architecture

  1. Module 2 Notes
  2. Mod 2 Enterprise Security Architecture
  3. Mod 2.1 Network Device Security Act
  4. Mod 2.1 Application and Protocol
  5. Mod 2.1 Advanced Network Security Act
  6. Mod 2.1 Complex Network Security Solution
  7. Mod 2.1 Implementing VLANs Switchport Sec Act
  8. Mod 2.1 Implementing VLANs Switchport Sec Act Part2
  9. Mod 2.1 Distributed Denial of Service
  10. Mod 2.1 Exploring DoS Attacks Act
  11. Mod 2.1 Security Zones
  12. Mod 2.1 Network Access Control
  13. Mod 2.1 Searching for Vulnerablie ICS-SCADA Act
  14. Mod 2.2 Analyze a Scenario Integrate Security
  15. Mod 2.2 Configuring Windows Firewall Act
  16. Mod 2.2 Log Monitoring and Auditing
  17. Mod 2.2 Group Policy Act
  18. Mod 2.2 Patch Management
  19. Mod 2.2 Management Interface
  20. Mod 2.2 Measured Launch
  21. Mod 2.3 Analyze a Scenario to Integrate Security Controls
  22. Mod 2.3 Security Implications Privacy
  23. Mod 2.3 Baseband
  24. Mod 2.4 Given Software Vulnerabilty Scenarios
  25. Mod 2.4 SQL Injection Act
  26. Mod 2.4 Improper Error and Exception Handling
  27. Mod 2.4 Buffer Overflows Act
  28. Mod 2.4 Memory Leaks
  29. Mod 2.4 Researching Vulnerabilities Exploits Act

Module 3 – Enterprise Security Operations

  1. Module 3 Notes
  2. Mod 3 Enterprise Security Operations
  3. Mod 3 Runtime Debugging
  4. Mod 3.1 Fingerprinting an OS Services Act
  5. Mod 3.1 Code Review
  6. Mod 3.1 Conducting OSINT Act
  7. Mod 3.1 Types
  8. Mod 3.1 Conducting a Vulnerability Assessment Act
  9. Mod 3.2 Analyze a Scenario Output
  10. Mod 3.2 Network Sniffing Act
  11. Mod 3.2 Security Content Automation
  12. Mod 3.2 Using a SCAP Scanner Act
  13. Mod 3.2 Network Enumerator
  14. Mod 3.2 Password Cracking Act
  15. Mod 3.2 Host Vulnerability Scanner
  16. Mod 3.2 Using Command Line Tools Act
  17. Mod 3.2 OpenSSL
  18. Mod 3.2 Scanning for Heartbleed Act
  19. Mod 3.2 Local Exploitation Tools
  20. Mod 3.2 Verifying File Integrity with SFC Act
  21. Mod 3.2 Log Analysis Tools
  22. Mod 3.3 Given Scenario Implement Incident
  23. Mod 3.3 Facilitate Incident Detection Response
  24. Mod 3.3 Using Incident Response Support Tools Act
  25. Mod 3.3 Severity of Incident Detection Breach

Module 4 – Technical Integration of Enterprise Security

  1. Module 4 Notes
  2. Mod 4 Technical Integration of Enterprise
  3. Mod 4 Technical Integration of Enterprise Part2
  4. Mod 4.1 DataSecurity Considerations
  5. Mod 4.1 Examing Network Diagrams Act
  6. Mod 4.1 Security and Privacy Considerations of Storage integration
  7. Mod 4.1 Exploring Directory Services and DNS Act
  8. Mod 4.2 Given Scenario Integrate Cloud and Virtualization
  9. Mod 4.2 Taking Another Look at Cloud Services Act
  10. Mod 4.2 Security Advantages and Disadvanatges of Virtualization
  11. Mod 4.2 Using Virtualization Act
  12. Mod 4.2 Cloud Augmented Security
  13. Mod 4.3 Given Scenario Integrate and Troubleshoot Advanced Authentication
  14. Mod 4.4 Given Scenario Cryptographic
  15. Mod 4.4 Cryptographic Part2
  16. Mod 4.4 Mobile Device Encryption
  17. Mod 4.4 Cryptography Act
  18. Mod 4.5 Select the Appropriate Control
  19. Mod 4.5 Phising Act
  20. Mod 4.5 Telephony VoIP Integration

Module 5 – Research, Development and Collaboration

  1. Module 5 Notes
  2. Mod 5 Research Methods to Determine Industry Trends
  3. Mod 5.1 Practicing Threat Intelligence Act
  4. Mod 5.2 Scenario Implememt Security Activities Across
  5. Mod 5.2 Static Testing
  6. Mod 5.3 Explain the Importance of Interaction
  7. CASP Conclusion

From: $14.99 / month


You Will Get Certification After Completetion This Course.

From: $14.99 / month


Frequently Asked Questions

Instructional methods, course requirements, and learning technologies can vary significantly from one online program to the next, but the vast bulk of them use a learning management system (LMS) to deliver lectures and materials, monitor student progress, assess comprehension, and accept student work. LMS providers design these platforms to accommodate a multitude of instructor needs and preferences.

Online education may seem relatively new, but years of research suggests it can be just as effective as traditional coursework, and often more so. According to a U.S. Department of Education analysis of more than 1,000 learning studies, online students tend to outperform classroom-based students across most disciplines and demographics. Another major review published the same year found that online students had the advantage 70 percent of the time, a gap authors projected would only widen as programs and technologies evolve.

All new learning innovations are met with some degree of scrutiny, but skepticism subsides as methods become more mainstream. Such is the case for online learning. Studies indicate employers who are familiar with online degrees tend to view them more favorably, and more employers are acquainted with them than ever before. The majority of colleges now offer online degrees, including most public, not-for-profit, and Ivy League universities. Online learning is also increasingly prevalent in the workplace as more companies invest in web-based employee training and development programs.

The concern that online students cheat more than traditional students is perhaps misplaced. When researchers at Marshall University conducted a study to measure the prevalence of cheating in online and classroom-based courses, they concluded, “Somewhat surprisingly, the results showed higher rates of academic dishonesty in live courses.” The authors suggest the social familiarity of students in a classroom setting may lessen their sense of moral obligation.

Choosing the right course takes time and careful research no matter how one intends to study. Learning styles, goals, and programs always vary, but students considering online courses must consider technical skills, ability to self-motivate, and other factors specific to the medium. Online course demos and trials can also be helpful.
Our platform is typically designed to be as user-friendly as possible: intuitive controls, clear instructions, and tutorials guide students through new tasks. However, students still need basic computer skills to access and navigate these programs. These skills include: using a keyboard and a mouse; running computer programs; using the Internet; sending and receiving email; using word processing programs; and using forums and other collaborative tools. Most online programs publish such requirements on their websites. If not, an admissions adviser can help.