• My account
  • Cart
English courses / USD

CompTIA Advanced Security Practitioner (CASP)

Regular Price: $697

Special Price: $415

  • 2 students have purchased
  • Express
My Training Academy
Potters Bar
Maple House High Street, Potters Bar Hertfordshire United Kingdom, EN6 5BS EN6 5BS See in Google maps
OUR MISSION: Our mission is to help you learn the skills you need to reach your full potential. WHO WE ARE: We are one of the fastest growing online training providers. We offer engaging, effective and flexible online training solutions to both individuals and businesses. We develop courses that help individuals to prepare for and complete their certification exams with ease. Our unique, flexible approach to learning means you don’t have to put your life on hold to get certified. You can study full time and part time, from home and work and on the move; online and on mobile devices. We provide world class education developed by highly skilled and experienced instructors. Our courses are upgraded regularly to ensure our learners are up-to-date with the latest industry requirements and best practices. WHAT WE BELIEVE We believe technology has paved the way for individuals and businesses all over the world to tap into high quality learning at their fingertips.


  • Engaging & high-quality e-learning study materials
  • Make your own study schedule and take advantage of online tutoring hours
  • Obtain a certified diploma once you finish the course.


CompTIA Advanced Security Practitioner (CASP) is CompTIA's first mastery-level certification for enterprise technical security leads. CASP certification is an international, vendor-neutral certification that designates IT professionals with advanced-level security skills and knowledge.

This course will teach students the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. You will learn how to apply critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers, while managing risk.Why CASP?
Approved by U.S. Dept. of Defence to meet IA technical and management certification requirements

Chosen by Dell and HP advanced security personnel

Globally recognized CompTIA name


After completing this course, you will learn the skills and knowledge required to work effectively in a professional IT environment and prepare for the CompTIA Advanced Security Practitioner (CASP) exam. Once certified, you'll be qualified for jobs such as Risk Manager/Analyst and Security architect, ISSO, earning an average salary of £76,000.00 per year.

The great thing about our CompTIA Advanced Security Practitioner (CASP) course is that you are in charge of your start and finish date, with no deadline pressures!

We train our students to the very best standards, offering expert instructor-led training via our state of the art eLearning platform.

By achieving the CompTIA Advanced Security Practitioner (CASP) certification, you will create more career opportunities and be better positioned when applying for work.

Enrol today and prepare for a future you deserve.WHY STUDY WITH MY TRAINING ACADEMY?
Flexible training- study anytime, anywhere and from any device.

Expert Instructor-Led TrainingÐ our courses are delivered by the finest instructors with a...

Module 1
1.0 Course GuideModule 2
2.0 Underlying Security Models Part 1
2.1 Underlying Security Models Part 2
2.2 Underlying Security Models Part 3
2.3 Underlying Security Models Part 4
2.4 Underlying Security Models Part 5
2.5 Underlying Security Models Part 6
2.6 Underlying Security Models Part 7Module 3
3.0 General Security Part 1
3.1 General Security Part 2Module 4
4.0 Selecting Security Products Part 1
4.1 Selecting Security Products Part 2
4.2 Selecting Security Products Part 3Module 5
5.0 Control Selection Process Part 1
5.1 Control Selection Process Part 2Module 6
6.0 Cryptography Symmetric and Asymmetric Part 1
6.1 Cryptography Symmetric and Asymmetric Part 2
6.2 Cryptography Symmetric and Asymmetric Part 3
6.3 Cryptography Symmetric and Asymmetric Part 4Module 7
7.0 Cryptography Message Integrity Controls Part 1
7.1 Cryptography Message Integrity Controls Part 2
7.2 Cryptography Message Integrity Controls Part 3Module 8
8.0 Cryptography Digital Signatures Part 1
8.1 Cryptography Digital Signatures Part 2Module 9
9.0 Cryptography PKI and PGP Part 1
9.1 Cryptography PKI and PGP Part 2
9.2 Cryptography PKI and PGP Part 3
9.3 Cryptography PKI and PGP Part 4Module 10
10.0 Storage Part 1
10.1 Storage Part 2
10.2 Storage Part 3
10.3 Storage Part 4Module 11
11.0 Virtual ComputingModule 12
12.0 Cloud Computing Part 1
12.1 Cloud Computing Part 2
12.2 Cloud Computing Part 3
12.3 Cloud Computing Part 4
12.4 Cloud Computing Part 5Module 13
13.0 IPV6 Part 1
13.1 IPV6 Part 2Module 14
14.0 Remote Access Security Part 1
14.1 Remote Access Security Part 2Module 15
15.0 Domain Name System Part 1
15.1 Domain Name System Part 2
15.2 Domain Name System Part 3
15.3 Domain Name System Part 4
15.4 Domain Name System Part 5
15.5 Domain Name System Part 6
15.6 Domain Name System Part 7
15.7 Domain Name System Part 8Module 16
16.0 Directory ServicesModule 17
17.0 Firewall and VPN Part 1
17.1 Firewall and VPN Part 2
17.2 Firewall and VPN Part 3
17.3 Firewall and VPN Part 4Module 18
18.0 Firewall Policy Part 1
18.1 Firewall Policy Part 2
18.2 Firewall Policy Part 3
18.3 Firewall Policy Part 4Module 19
19.0 Security Configuration Management Part 1
19.1 Security Configuration Management Part 2
19.2 Security Configuration Management Part 3Module 20
20.0 Network Infrastructure Security Part 1
20.1 Network Infrastructure Security Part 2
20.2 Network Infrastructure Security Part 3
20.3 Network Infrastructure Security Part 4Module 21
21.0 Secure Web Services Part 1
21.1 Secure Web Services Part 2Module 22
22.0 OWASP top Ten Part 1
22.1 OWASP top Ten Part 2
22.2 OWASP top Ten Part 3
22.3 OWASP top Ten Part 4
22.4 OWASP top Ten Part 5Module 23
23.0 Buffer Overflows Part 1
23.1 Buffer Overflows Part 2Module 24
24.0 SQL Injection Part 1
24.1 SQL Injection Part 2Module 25
25.0 Access Control Part 1
25.1 Access Control Part 2Module 26
26.0 Single Sign-On Part 1
26.1 Single Sign-On Part 2
26.2 Single Sign-On Part 3Module 27
27.0 Risk Assessment Part 1
27.1 Risk Assessment Part 2Module 28
28.0 Testing and Assessment Part 1
28.1 Testing and Assessment Part 2
28.2 Testing and Assessment Part 3Module 29
29.0 Common Vulnerability Scoring System Part 1
29.1 Common Vulnerability Scoring System Part 2
29.2 Common Vulnerability Scoring System Part 3
29.3 Common Vulnerability Scoring System Part 4Module 30
30.0 Common Criteria Part 1
30.1 Common Criteria Part 2
30.2 Common Criteria Part 3
30.3 Common Criteria Part 4
30.4 Common Criteria Part 5Module 31
31.0 Personally Identifiable Information Part 1
31.1 Personally Identifiable Information Part 2Module 32
32.0 Risk Management Part 1
32.1 Risk Management Part 2
32.2 Risk Management Part 3Module 33
33.0 Frameworks Part 1
33.1 Frameworks Part 2
33.2 Frameworks Part 3
33.3 Frameworks Part 4Module 34
34.0 Interconnecting Systems Part 1
34.1 Interconnecting Systems Part 2Module 35
35.0 Security Services Part 1
35.1 Security Services Part 2
35.2 Security Services Part 3
35.3 Security Services Part 4Module 36
36.0 Continuous Monitoring Part 1
36.1 Continuous Monitoring Part 2
36.2 Continuous Monitoring Part 3
36.3 Continuous Monitoring Part 4Module 37
37.0 Incident Handling Part 1
37.1 Incident Handling Part 2
37.2 Incident Handling Part 3
37.3 Incident Handling Part 4Module 38
38.0 Forensic and Incident Response Part 1
38.1 Forensic and Incident Response Part 2
38.2 Forensic and Incident Response Part 3Module 39
39.0 Requirements Processing Part 1
39.1 Requirements Processing Part 2
39.2 Requirements Processing Part 3Module 40
40.0 Standards BodiesModule 41
41.0 Secure System Life Cycle Part 1
41.1 Secure System Life Cycle Part 2
41.2 Secure System Life Cycle Part 3Module 42
42.0 EmailModule 43
43.0 Mobile and BYOD Part 1
43.1 Mobile and BYOD Part 2Module 44
44.0 Voice over IPModule 45
45.0 Physical Facilities Assessment Process Part 1
45.1 Physical Facilities Assessment Process Part 2Module 46
46.0 Security Requirements Traceability MatrixENTRY REQUIREMENTS10 years' experience in IT administration, including at least 5 years of hands-on technical security experienceMULTI-USER TRAINING PACKAGESThis online course can be integrated in your professional training plan. M.T.A. can provide you with a tailored learning solution, that can be customised to meet each team member's requirements. Choosing a multi-user training package, you can get significant discounts for 5+ users and even further discounts for 10+ users Ð and an excellent return on your investment.


Thanks to this offer, valid exclusively for one person, you will obtain a CompTIA Advanced Security Practitioner (CASP) Online Course.

How to register

By buying the course in Emagister Express, you will obtain an access coupon. We will send you the codes and keys to the coupon. Send the coupon code and the key to info@mytrainingacademy.org.uk. The training provider will then give you access to the course.

This course has not been reviewed yet
Hi! According to your location, we have changed your payment currency to USD.
You can change to other currency by using the option on the header.