|Ashburn||Mon - Fri||03/04/2019||03/08/2019||8:30am - 5pm|
|Greenbelt||Mon - Fri||03/04/2019||03/08/2019||8:30am - 5pm|
|Ashburn||Mon - Fri||04/29/2019||05/01/2019||8:30am - 5pm|
|Greenbelt||Mon - Fri||05/06/2019||05/10/2019||8:30am - 5pm|
|Greenbelt||Mon - Fri||07/15/2019||07/19/2019||8:30am - 5pm|
|Ashburn||Mon - Fri||07/29/2019||08/02/2019||8:30am - 5pm|
|Greenbelt||Mon - Fri||09/16/2019||09/20/2019||8:30am - 5pm|
Why Take CASP Training?
CASP accreditation will further enhance your existing security and risk qualifications. According to CompTIA industry studies, the need for people with in-depth knowledge at this level is increasing and along with it the opportunities for promotion and higher salaries.
About 40 percent of the CASP exam emphasizes enterprise security, and the other sixty percent focuses on research and analysis, risk management, legal issues, and the integration of computers with business. This certification will help move you from functional IT roles into management and strategy.
Enterprise security involves an understanding of various encryption technologies and concepts. Our CASP training covers this in detail as well as virtualized, distributed and cloud computing. Certified CASP practitioners must also understand vulnerabilities related to modern IT trends and the security requirements needed for virtual storage, NAS, SAN, iSCSI, FCoE and other technologies as well as how to manage secure storage.
Our instructor-led CompTIA CASP certification training courses are hands-on and are great experiential classes that are designed to help you pass the certification exam. Our training facilities reside at our two locations in the Washington, D.C. metro area: Ashburn, VA, and Greenbelt, MD. We combine our labs with a superior certification exam preparation model to make for an awesome classroom experience.
CASP training is ideal for Cyber Security professionals, Information Security professionals, Information Security Analysts, Security Architects, Info Sec and/or IT Specialists.
The exam does not have any prerequisites, although CompTIA says that those who attempt to earn the certification should have completed the Security+ certification or have equivalent experience. This is not aimed at entry-level candidates, several years IT experience is recommended.
Exam and Certification Requirements:
Current exam number CAS-003
- Maximum of 90 questions
- Time Length 165 minutes
- Passing Score Pass/Fail Only
- Format Multiple Choice and Performance Based Questions
CompTIA CASP Certification prepares you for roles in the following job types:
- IT Security Analyst
- Network Security Analyst
- IT Security Consultant
- Ethical Hacker
- Penetration Tester
- IT Auditor
- IT Security Architect
- Information Security Analyst
Skills and Concepts:
1.0 Risk Management
- 1.1 Summarize business and industry influences and associated security risks
- 1.2 Compare and contrast security, privacy policies and procedures based on organizational requirements
- 1.3 Given a scenario, execute risk mitigation strategies and controls
- 1.4 Analyze risk metric scenarios to secure the enterprise
2.0 Enterprise Security Architecture
- 2.1 Analyze a scenario and integrate network and security components, concepts and architectures to meet security requirements
- 2.2 Analyze a scenario to integrate security controls for host devices to meet security requirements
- 2.3 Analyze a scenario to integrate security controls for mobile and small form factor devices to meet security requirements
- 2.4 Given software vulnerability scenarios, select appropriate security controls
3.0 Enterprise Security Operations
- 3.1 Given a scenario, conduct a security assessment using the appropriate methods
- 3.2 Analyze a scenario or output, and select the appropriate tool for a security assessment
- 3.3 Given a scenario, implement incident response and recovery procedures
4.0 Technical Integration of Enterprise Security
- 4.1 Given a scenario, integrate hosts, storage, networks and applications into a secure enterprise architecture
- 4.2 Given a scenario, integrate cloud and virtualization technologies into a secure enterprise architecture
- 4.3 Given a scenario, integrate and troubleshoot advanced authentication and authorization technologies to support enterprise security objectives
- 4.4 Given a scenario, implement cryptographic techniques
- 4.5 Given a scenario, select the appropriate control to secure communications and collaboration solutions
5.0 Research, Development and Collaboration
- 5.1 Given a scenario, apply research methods to determine industry trends and their impact to the enterprise
- 5.2 Given a scenario, implement security activities across the technology life cycle
- 5.3 Explain the importance of interaction across diverse business units to achieve security go