$2,995

Event Information

Share this event

Date and Time

Location

Location

Las Vegas

5550 Painted Mirage road

5550 Painted Mirage road

Las Vegas, NV 89149

View Map

Event description

Description

The CompTIA Advanced Security Practitioner certification is an international, vendor-neutral exam that proves competency in enterprise security; risk management; research and analysis; and integration of computing, communications, and business disciplines.

The exam covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers.

The CompTIA Advanced Security Practitioner (CASP) Certification is aimed at an IT security professional who has:

A minimum of 10 years experience in IT administration including at least 5 years of hands-on technical security experience.

Secure coding standards
Exploits resulting from improper error and exception handling
Privilege escalation
Improper storage of sensitive data
Fuzzing/false injection
Secure cookie storage and transmission
Client-side processing vs. server-side processing
o AJAX
o State management
o JavaScript
Buffer overflow
Memory leaks
Integer overflows
Race conditions
o Time of check
o Time of use
Resource exhaustion


1.7 Given a scenario, distinguish and select the method or tool that is appropriate to conduct an assessment

Tool type
o Port scanners
o Vulnerability scanners
o Protocol analyzer
o Switchport analyzer
o Network enumerator
o Password cracker
o Fuzzer
o HTTP interceptor
o Attacking tools/frameworks


Methods
o Vulnerability assessment
o Penetration testing
o Black box
o White box
o Grey Box
o Fingerprinting
o Code review
o Social engineering


2.0 Risk Management, Policy / Procedure and Legal

2.1 Analyze the security risk implications associated with business decisions
Risk management of new products, new technologies and user behaviors
New or changing business models/strategies
o Partnerships
o Outsourcing
o Mergers
Internal and external influences
o Audit findings
o Compliance
o Client requirements
o Top level management
Impact of de-perimiterization (e.g. constantly changing network boundary)
o Considerations of enterprise standard operating environment (SOE) vs. allowing personally managed devices onto corporate networks


2.2 Execute and implement risk mitigation strategies and controls
Classify information types into levels of CIA based on organization/industry
Determine aggregate score of CIA
Determine minimum required security controls based on aggregate score
Conduct system specific risk analysis
Make risk determination
o Magnitude of impact
o Likelihood of threat


Decide which security controls should be applied based on minimum requirements
o Avoid
o Transfer
o Mitigate
o Accept
Implement controls
ESA frameworks
Continuous monitoring


2.3 Explain the importance of preparing for and supporting the incident response and recovery process
E-Discovery
o Electronic inventory and asset control
o Data retention policies
o Data recovery and storage
o Data ownership
o Data handling


Data breach
o Recovery
o Minimization
o Mitigation and response


System design to facilitate incident response taking into account types of violations
o Internal and external
o Privacy policy violations
o Criminal actions
o Establish and review system event and security logs Incident and emergency response


2.4 Implement security and privacy policies and procedures based on organizational requirements.


Policy development and updates in light of new business, technology and environment changes Process/procedure development and updated in light of policy, environment and business changes Support legal compliance and advocacy by partnering with HR, legal, management and other entities Use common business documents to support security
o Interconnection Security Agreement (ISA)
o Memorandum of Understanding (MOU)
o Service Level Agreement (SLA)
o Operating Level Agreement (OLA)
o Non-Disclosure Agreement (NDA)
o Business Partnership Agreement (BPA)


Use general privacy principles for PII / Sensitive PII Support the development of policies that contain
o Separation of duties
o Job rotation
o Mandatory vacation
o Least privilege
o Incident response
o Forensic tasks
o On-going security
o Training and awareness for users
o Auditing requirements and frequency


3.0 Research and Analysis
3.1 Analyze industry trends and outline potential impact to the enterprise
Perform on-going research
o Best practices
o New technologies
o New security systems and services
o Technology evolution (e.g. RFCs, ISO)


Situational awareness
o Latest client-side attacks
o Threats
o Counter zero day
o Emergent issues
Research security implications of new business tools
o Social media/networking
o Integration within the business (e.g. advising on the placement of company material for the general public)
Global IA industry/community
o Conventions
o Attackers
o Emerging threat sources
 Research security requirements for contracts
o Request for Proposal (RFP)
o Request for Quote (RFQ)
o Request for Information (RFI)
o Agreements


3.2 Carry out relevant analysis for the purpose of securing the enterprise
Benchmark
Prototype and test multiple solutions
Cost benefit analysis (ROI, TCO)
Analyze and interpret trend data to anticipate cyber defense aids
Review effectiveness of existing security
Reverse engineer / deconstruct existing solutions
Analyze security solutions to ensure they meet business needs
o Specify the performance
o Latency
o Scalability
o Capability
o Usability
o Maintainability
o Availability (MTTR, MTBF)
Conduct a lessons-learned / after-action review
Use judgment to solve difficult problems that do not have a best solution
Conduct network traffic analysis


4.0 Integration of Computing, Communications and Business Disciplines
4.1 Integrate enterprise disciplines to achieve secure solutions
Interpreting security requirements and goals to communicate with other disciplines
o Programmers
o Network engineers
o Sales staff


Provide guidance and recommendations to staff and senior management on security processes and controls
Establish effective collaboration within teams to implement secure solutions
Disciplines
o Programmer
o Database administrator
o Network administrator
o Management
o Stake holders
o Financial
o HR
o Emergency response team
o Facilities manager
o Physical security manager


4.2 Explain the security impact of inter-organizational change
Security concerns of interconnecting multiple industries o Rules, policies and regulations
Design considerations during mergers, acquisitions and de-mergers
Assuring third party products – only introduce acceptable risk
o Custom developed
o COTS
Network secure segmentation and delegation
Integration of products and services


4.3 Select and distinguish the appropriate security controls with regard to communications and collaboration
Unified communication security
o Web conferencing
o Video conferencing
o Instant messaging
o Desktop sharing
o Remote assistance
o Presence
o Email
o Telephony
VoIP security
VoIP implementation
Remote access
Enterprise configuration management of mobile devices
Secure external communications
Secure implementation of collaboration platforms
Prioritizing traffic (QoS)
Mobile devices
o Smart phones, IP cameras, laptops, IP based devices

4.4 Explain advanced authentication tools, techniques and concepts
Federated identity management (SAML)
XACML
SOAP
Single sign on
SPML
Certificate based authentication
Attestation


4.5 Carry out security activities across the technology life cycle
End to end solution ownership
Understanding results of solutions in advance
o Operational activities
o Maintenance
o Decommissioning
o General change management
Systems Development Life Cycle
o Security System Development Life Cycle (SSDLC) / Security Development Life Cycle (SDL
) o Security Requirements Traceability Matrix (SRTM)
Adapt solutions to address emerging threats and security trends
Validate system designs


Certification Information

The CASP exam covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers, while managing risk.

While there is no required prerequisite, the CASP certification is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus at the enterprise level.


Test Details

Exam Code CAS-002 Number of Questions 80 (Maximum) Type of questions Multiple choice and performance-based Length of Test 165 minutes Passing score Pass/Fail only. No scaled score. Recommended experience 10 years experience in IT administration, including at least 5 years of hands-on technical security experience Languages English

To Request Schedules and Additional Course Details send an email to Training@certfirst.com or call 1-630-684-0355.

Share with friends

Date and Time

Location

Las Vegas

5550 Painted Mirage road

5550 Painted Mirage road

Las Vegas, NV 89149

View Map

Save This Event

Event Saved