1. Managing Risk
- Identify the Importance of Risk Management
- Assess Risk
- Mitigate Risk
- Integrate Documentation into Risk Management
2. Integrating Computing, Communications, and Business Disciplines
- Facilitate Collaboration Across Business Units
- Secure Communications and Collaboration Solutions
- Implement Security Activities Throughout the Technology Life Cycle
3. Using Research and Analysis to Secure the Enterprise
- Determine Industry Trends and Effects on the Enterprise
- Analyze Scenarios to Secure the Enterprise
4. Integrating Advanced Authentication and Authorization Techniques
- Implement Authentication and Authorization Technologies
- Implement Advanced Identity Management
5. Implementing Cryptographic Techniques
- Describe Cryptographic Concepts
- Choose Cryptographic Techniques
- Choose Cryptographic Implementations
6. Implementing Security Controls for Hosts
- Select Host Hardware and Software
- Harden Hosts
- Virtualize Servers and Desktops
- Protect Boot Loaders
7. Implementing Security Controls for Enterprise Storage
- Identify Storage Types and Protocols
- Implement Secure Storage Controls
8. Analyzing and Implementing Network Security
- Analyze Network Security Components and Devices
- Analyze Network-Enabled Devices
- Analyze Advanced Network Design
- Configure Controls for Network Security
9. Implementing Security Controls for Applications
- Identify General Application Vulnerabilities
- Identify Web Application Vulnerabilities
- Implement Application Security Controls
10. Integrating Hosts, Storage, Networks, and Applications in a Secure Enterprise Architecture
- Implement Security Standards in the Enterprise
- Select Technical Deployment Models
- Secure the Design of the Enterprise Infrastructure
- Secure Enterprise Application Integration Enablers
11. Conducting Vulnerability Assessments
- Select Vulnerability Assessment Methods
- Select Vulnerability Assessment Tools
12. Responding to and Recovering from Incidents
- Design Systems to Facilitate Incident Response
- Conduct Incident and Emergency Responses
- Appendix A: Mapping Course Content to CompTIA Advanced Security Practitioner (CASP) Exam CAS-002
Classroom Live Labs
- Lab 1: Integrate Documentation into Risk Management
- Lab 2: Secure Communications and Collaboration Solutions
- Lab 3: Analyze Scenarios to Secure the Enterprise
- Lab 4: Implement Authentication and Authorization Technologies
- Lab 5; Choose Cryptographic Techniques
- Lab 6: Harden Hosts
- Lab 7: Virtualize Servers and Desktops
- Lab 8: Protect Boot Loaders
- Lab 9: Implement Secure Storage Controls
- Lab 10: Configure Controls for Network Security
- Lab 11: Implement Application Security Controls
- Lab 12: Select Vulnerability Assessment Tools
- Lab 13: Design Systems to Facilitate Incident Response
- Lab 14: Conduct Incident and Emergency Responses