CompTIA Advanced Security Practitioner (CASP)

Vocational qualification

Online

Save 40%

Special Emagister price

£ 295 £ 495 VAT inc.

Call the centre

Description

  • Type

    Vocational qualification

  • Methodology

    Online

  • Start date

    Different dates available

CompTIA Advanced Security Practitioner (CASP) is CompTIA's first mastery-level certification for enterprise technical security leads. CASP certification is an international, vendor-neutral certification that designates IT professionals with advanced-level security skills and knowledge.

This course will teach students the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. You will learn how to apply critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers, while managing risk.Why CASP? Approved by U.S. Dept. of Defence to meet IA technical and management certification requirements
Chosen by Dell and HP advanced security personnel
Globally recognized CompTIA name
Vendor-neutral

After completing this course, you will learn the skills and knowledge required to work effectively in a professional IT environment and prepare for the CompTIA Advanced Security Practitioner (CASP) exam. Once certified, you'll be qualified for jobs such as Risk Manager/Analyst and Security architect, ISSO, earning an average salary of £76,000.00 per year.

The great thing about our CompTIA Advanced Security Practitioner (CASP) course is that you are in charge of your start and finish date, with no deadline pressures!

We train our students to the very best standards, offering expert instructor-led training via our state of the art eLearning platform.

By achieving the CompTIA Advanced Security Practitioner (CASP) certification, you will create more career opportunities and be better positioned when applying for work.

Enrol today and prepare for a future you deserve.WHY STUDY WITH MY TRAINING ACADEMY?Flexible training- study anytime, anywhere and from any device.
Expert Instructor-Led TrainingÐ our courses are delivered by the finest instructors with a...

Important information

Price for Emagister users:

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Subjects

  • Risk
  • Monitoring
  • Access
  • Risk Management
  • Computing
  • Testing
  • Network
  • Firewall
  • Hacking
  • Data Protection
  • Computer Engineering
  • IT risk
  • IT Security
  • Network Training
  • Data security
  • Computer Systems
  • IT Systems
  • Computer Science
  • Network Engineering
  • Computering

Course programme

Module 1
1.0 Course GuideModule 2
2.0 Underlying Security Models Part 1
2.1 Underlying Security Models Part 2
2.2 Underlying Security Models Part 3
2.3 Underlying Security Models Part 4
2.4 Underlying Security Models Part 5
2.5 Underlying Security Models Part 6
2.6 Underlying Security Models Part 7Module 3
3.0 General Security Part 1
3.1 General Security Part 2Module 4
4.0 Selecting Security Products Part 1
4.1 Selecting Security Products Part 2
4.2 Selecting Security Products Part 3Module 5
5.0 Control Selection Process Part 1
5.1 Control Selection Process Part 2Module 6
6.0 Cryptography Symmetric and Asymmetric Part 1
6.1 Cryptography Symmetric and Asymmetric Part 2
6.2 Cryptography Symmetric and Asymmetric Part 3
6.3 Cryptography Symmetric and Asymmetric Part 4Module 7
7.0 Cryptography Message Integrity Controls Part 1
7.1 Cryptography Message Integrity Controls Part 2
7.2 Cryptography Message Integrity Controls Part 3Module 8
8.0 Cryptography Digital Signatures Part 1
8.1 Cryptography Digital Signatures Part 2Module 9
9.0 Cryptography PKI and PGP Part 1
9.1 Cryptography PKI and PGP Part 2
9.2 Cryptography PKI and PGP Part 3
9.3 Cryptography PKI and PGP Part 4Module 10
10.0 Storage Part 1
10.1 Storage Part 2
10.2 Storage Part 3
10.3 Storage Part 4Module 11
11.0 Virtual ComputingModule 12
12.0 Cloud Computing Part 1
12.1 Cloud Computing Part 2
12.2 Cloud Computing Part 3
12.3 Cloud Computing Part 4
12.4 Cloud Computing Part 5Module 13
13.0 IPV6 Part 1
13.1 IPV6 Part 2Module 14
14.0 Remote Access Security Part 1
14.1 Remote Access Security Part 2Module 15
15.0 Domain Name System Part 1
15.1 Domain Name System Part 2
15.2 Domain Name System Part 3
15.3 Domain Name System Part 4
15.4 Domain Name System Part 5
15.5 Domain Name System Part 6
15.6 Domain Name System Part 7
15.7 Domain Name System Part 8Module 16
16.0 Directory ServicesModule 17
17.0 Firewall and VPN Part 1
17.1 Firewall and VPN Part 2
17.2 Firewall and VPN Part 3
17.3 Firewall and VPN Part 4Module 18
18.0 Firewall Policy Part 1
18.1 Firewall Policy Part 2
18.2 Firewall Policy Part 3
18.3 Firewall Policy Part 4Module 19
19.0 Security Configuration Management Part 1
19.1 Security Configuration Management Part 2
19.2 Security Configuration Management Part 3Module 20
20.0 Network Infrastructure Security Part 1
20.1 Network Infrastructure Security Part 2
20.2 Network Infrastructure Security Part 3
20.3 Network Infrastructure Security Part 4Module 21
21.0 Secure Web Services Part 1
21.1 Secure Web Services Part 2Module 22
22.0 OWASP top Ten Part 1
22.1 OWASP top Ten Part 2
22.2 OWASP top Ten Part 3
22.3 OWASP top Ten Part 4
22.4 OWASP top Ten Part 5Module 23
23.0 Buffer Overflows Part 1
23.1 Buffer Overflows Part 2Module 24
24.0 SQL Injection Part 1
24.1 SQL Injection Part 2Module 25
25.0 Access Control Part 1
25.1 Access Control Part 2Module 26
26.0 Single Sign-On Part 1
26.1 Single Sign-On Part 2
26.2 Single Sign-On Part 3Module 27
27.0 Risk Assessment Part 1
27.1 Risk Assessment Part 2Module 28
28.0 Testing and Assessment Part 1
28.1 Testing and Assessment Part 2
28.2 Testing and Assessment Part 3Module 29
29.0 Common Vulnerability Scoring System Part 1
29.1 Common Vulnerability Scoring System Part 2
29.2 Common Vulnerability Scoring System Part 3
29.3 Common Vulnerability Scoring System Part 4Module 30
30.0 Common Criteria Part 1
30.1 Common Criteria Part 2
30.2 Common Criteria Part 3
30.3 Common Criteria Part 4
30.4 Common Criteria Part 5Module 31
31.0 Personally Identifiable Information Part 1
31.1 Personally Identifiable Information Part 2Module 32
32.0 Risk Management Part 1
32.1 Risk Management Part 2
32.2 Risk Management Part 3Module 33
33.0 Frameworks Part 1
33.1 Frameworks Part 2
33.2 Frameworks Part 3
33.3 Frameworks Part 4Module 34
34.0 Interconnecting Systems Part 1
34.1 Interconnecting Systems Part 2Module 35
35.0 Security Services Part 1
35.1 Security Services Part 2
35.2 Security Services Part 3
35.3 Security Services Part 4Module 36
36.0 Continuous Monitoring Part 1
36.1 Continuous Monitoring Part 2
36.2 Continuous Monitoring Part 3
36.3 Continuous Monitoring Part 4Module 37
37.0 Incident Handling Part 1
37.1 Incident Handling Part 2
37.2 Incident Handling Part 3
37.3 Incident Handling Part 4Module 38
38.0 Forensic and Incident Response Part 1
38.1 Forensic and Incident Response Part 2
38.2 Forensic and Incident Response Part 3Module 39
39.0 Requirements Processing Part 1
39.1 Requirements Processing Part 2
39.2 Requirements Processing Part 3Module 40
40.0 Standards BodiesModule 41
41.0 Secure System Life Cycle Part 1
41.1 Secure System Life Cycle Part 2
41.2 Secure System Life Cycle Part 3Module 42
42.0 EmailModule 43
43.0 Mobile and BYOD Part 1
43.1 Mobile and BYOD Part 2Module 44
44.0 Voice over IPModule 45
45.0 Physical Facilities Assessment Process Part 1
45.1 Physical Facilities Assessment Process Part 2Module 46
46.0 Security Requirements Traceability MatrixENTRY REQUIREMENTS10 years' experience in IT administration, including at least 5 years of hands-on technical security experienceMULTI-USER TRAINING PACKAGESThis online course can be integrated in your professional training plan. M.T.A. can provide you with a tailored learning solution, that can be customised to meet each team member's requirements. Choosing a multi-user training package, you can get significant discounts for 5+ users and even further discounts for 10+ users Ð and an excellent return on your investment.

Call the centre

CompTIA Advanced Security Practitioner (CASP)

Special Emagister price

£ 295 £ 495 VAT inc.