CASP Certification Training

Duration: 5 days

Introduction

In this course, you will focus on enterprise security risk management, policies and procedures, legalities research, and analysis integration of computing. You will also cover communications and business disciplines. You will prepare for the CASP exam with confidence through a combination of hands-on labs and lectures by seasoned security practitioners.

Our CASP Prep Course uses CompTIA Approved Quality Curriculum (CAQC). The CompTIA CAQC symbol assures you that all test objectives are covered in the training material.

CASP Certification Training

Related Courses

After completing this course, attendees will be able to:

  • Advanced defensive controls such as web application firewalls
  • Address threats such as cross-site scripting (XSS) and cross-site request forgery (XSRF)
  • Perform advanced port scanning techniques used to avoid detection
  • Best practices in intrusion detection system (IDS) design and signature development
  • Stop hackers before they access your network

Enterprise Security Architecture

  • Basics of Enterprise Security
  • Enterprise Structure
  • Enterprise Security Requirements

Enterprise Security Technology

  • Common Network Security Components and Technologies
  • Communications and Collaboration Security
  • Cryptographic Tools and Techniques
  • Advanced Authentication

Enterprise Resource Technology

  • Enterprise Storage Security Issues
  • Distributed, Shared, and Virtualized Computing
  • Cloud Computing and Security

Security Design and Solutions

  • Network Security Design
  • Conduct a Security Assessment
  • Host Security

Application Security Design

  • Application Security Basics
  • Web Application Security

Managing Risk, Security Policies, and Security Procedures

  • Analyze Security Risk
  • Implement Risk Mitigation Strategies and Controls
  • Implement Enterprise-Level Security Policies and Procedures
  • Prepare for Incident Response and Recovery

Enterprise Security Integration

  • Technology Lifecycle
  • Interorganizational Change
  • Integrate Enterprise Disciplines to Achieve Secure Solutions

Security Research and Analysis

  • Perform an Industry Trends and Impact Analysis
  • Perform an Enterprise Security Analysis

Your Name*

Company*

Position*

Your Email*

Phone*

Address*

Number of Participants *

Time Frame*

Subject*

Your Message*