CompTIA Advanced Security Practitioner (CASP+) w/Cert Prep

CompTIA Advanced Security Practitioner (CASP+) w/Cert Prep
30 Bird Media
Infosec Learning INC

Welcome to CompTIA Advanced Security Practitioner CAS-004. This course provides the knowledge needed to implement security solutions within an enterprise policy framework, using a vendor-neutral format. This includes GRC and vulnerability management programs, applied cryptography, system and network security, identity management, secure development, and incident response. This course maps to the CompTIA CASP+ certification exam. Objective coverage is marked throughout the course. You can download an objective map for the course from

You will benefit most from this course if you intend to take a CompTIA CASP+ CAS-004 exam.

This course assumes that you have some applied knowledge of computers, TCP/IP networks, and cybersecurity principles. Knowledge equivalent to the CompTIA Security+ or CySA+ certification is helpful but not necessary.

Product Code: 4E388P6VD8
Days of Training: 5
Price: 105.00


  • Course setup

Chapter 1: Governance and compliance

  • Module A: Security governance
  • Module B: Regulatory compliance
  • Module C: Standards and frameworks

Chapter 2: Security policies

  • Module A: Policy design
  • Module B: Controls and procedures
  • Module C: Training and coordination

Chapter 3: Risk management

  • Module A: Risk assessment
  • Module B: Risk management strategies

Chapter 4: Enterprise resilience

  • Module A: BCDR planning
  • Module B: Resilient architecture

Chapter 5: Threat management

  • Module A: Threats and vulnerabilities
  • Module B: Threat intelligence sources
  • Module C: Applied intelligence

Chapter 6: Cryptographic techniques

  • Module A: Cryptographic principles
  • Module B: Ciphers and hashes

Chapter 7: Applied cryptography

  • Module A: Public key infrastructure
  • Module B: Cryptographic protocols

Chapter 8: Authentication and authorization

  • Module A: Access control components
  • Module B: Authentication technologies

Chapter 9: Network security architecture

  • Module A: Network vulnerabilities
  • Module B: Network security infrastructure
  • Module C: Secure network configuration

Chapter 10: Protecting hosts and data

  • Module A: Host security
  • Module B: Data security

Chapter 11: Threat detection and response

  • Module A: Threat detection systems
  • Module B: Network sensors
  • Module C: Data analysis

Chapter 12: Specialized system security

  • Module A: Mobile device security
  • Module B: Operational technologies

Chapter 13: Virtual and cloud infrastructure

  • Module A: Virtual and cloud systems
  • Module B: Secure cloud infrastructure

Chapter 14: Secure applications

  • Module A: Software assurance
  • Module B: Application vulnerabilities

Chapter 15: Security assessment and testing

  • Module A: Security testing programs
  • Module B: Vulnerability assessments
  • Module C: Vulnerability and patch management

Chapter 16: Incident response

  • Module A: Incident response planning
  • Module B: Incident response procedures
  • Module C: Digital forensics

Appendix A: Glossary


30 Bird - Creating a Fault-Tolerant Network (CASP)30 Bird - Creating a Shell Script30 Bird - Creating a Cron Job30 Bird - Researching Security Threats30 Bird - Examining MITRE ATT&CK (CASP)30 Bird - Creating Asymmetric Key Pairs (CASP)30 Bird - Creating File Hashes (CASP)30 Bird - Examining PKI Certificates (CASP)30 Bird - Requesting a PKI Certificate (CASP)30 Bird - Creating an IPsec Tunnel (CASP)30 Bird - Cracking Passwords (CASP)30 Bird - Using Anti-Phishing Tools (CASP)30 Bird - Enforcing Password Policies (CASP)30 Bird - Configuring Lockout Policies (CASP)30 Bird - Configuring Key-Based SSH Login30 Bird - Installing a RADIUS Server (CASP)30 Bird - Launching a DoS Attack (CASP)30 Bird - Capturing Credentials via Packet Sniffing30 Bird - Enforcing a Security Template (CASP)30 Bird - Reviewing an Application Control Policy30 Bird - Enforcing Audit Policies30 Bird - Creating Redundant Storage30 Bird - Checking File Integrity30 Bird - Configuring NTFS Access Auditing (CASP)30 Bird - Using an IDS (CASP)30 Bird - Deploying a Honeypot (CASP)30 Bird - Viewing Linux Security Logs30 Bird - Configuring Windows Event Forwarding30 Bird - Configuring a SPAN Port30 Bird - Monitoring Network Performance (CASP)30 Bird - Configuring Syslog (CASP)30 Bird - Using a SIEM (CASP)30 Bird - Querying Event Logs in PowerShell30 Bird - Reviewing Network Appliance Logs30 Bird - Using a Backdoor (CASP)30 Bird - Performing a Web Vulnerability Scan30 Bird - Examining Website Vulnerabilities30 Bird - Performing Command Injection30 Bird - Performing a Client-Side Attack30 Bird - Brute Forcing a Service (CASP)30 Bird - Service Enumeration (CASP)30 Bird - Scanning a Host for Vulnerabilities (CASP)30 Bird - Exploiting a Linux System (CASP)30 Bird - Evaluating Scan Results (CASP)30 Bird - Updating Kali30 Bird - Collecting Forensic Data30 Bird - Analyzing a Forensic Image