Course Code: GES363
Learn about underlying security models, selecting security, cryptography, storage, virtual computing, and IPv6.
Learn about remote access security, domain name system, directory services, firewall and VPNs, security configuration management, and network infrastructure security.
Understand secure web services, buffer overflows, SQL injections, access control, single sign-on, risk assessment, and testing and assessment.
Master an understanding of common criteria, personally identifiable information, risk management, frameworks, and interconnecting systems.
Cover continuous monitoring, incident handling, forensic and incident response, requirements processing, and standards bodies.
Complete the course by learning about email, mobile and BYOD, voiceover IP, physical facilities assessment processes, and security requirements traceability matrixes.
I. Module 1: Underlying Security Models
A. Course Guide
B. Underlying Security Models Parts 1-7
C. General Security Part 1 -2
II. Module 2: Selecting Security
A. Selecting Security Products Parts 1 -3
B. Control Selection Process Parts 1 -2
III. Module 3: Cryptography
A. Cryptography Symmetric and Asymmetric Parts 1 – 4
B. Cryptography Message Integrity Controls Parts 1 – 3
C. Cryptography Digital Signatures Part 1 – 2
D. Cryptography PKI and PGP Parts 1 – 4
IV. Module 4: Storage
A. Storage Parts 1 -4
V. Module 5: Virtual Computing
A. Virtual Computing
B. Cloud Computing Parts 1 – 5
VI. Module 6: IPv6
A. IPV6 Parts 1 – 2
VII. Module 7: Remote Access Security
A. Remote Access Security Parts 1 – 2
VIII. Module 8: Domain Name System
A. Domain Name System Parts 1 – 8
IX. Module 9: Directory Services
A. Directory Services
X. Module 10: Firewall and VPN
A. Firewall and VPN Parts 1 – 4
B. Firewall Policy Parts 1 – 4
XI. Module 11: Security Configuration Management
A. Security Configuration Management Parts 1 – 3
XII. Module 12: Network Infrastructure Security
A. Network Infrastructure Security Parts 1 – 4
XIII. Module 13: Secure Web Services
A. Secure Web Services Parts 1 -2
B. OWASP top Ten Parts 1 -5
XIV. Module 14: Buffer Overflows
A. Buffer Overflows Parts 1 – 2
XV. Module 15: SQL Injection
A. SQL Injection Parts 1 -2
XVI. Module 16: Access Control
A. Access Control Parts 1 -2
XVII. Module 17: Single Sign-On
A. Single Sign-On Parts 1 – 3
XVIII. Module 18: Risk Assessment
A. Risk Assessment Parts 1 -2
XIX. Module 19: Testing and Assessment
A. Testing and Assessment Parts 1 -3
XX. Module 20: Common Vulnerability
A. Common Vulnerability Scoring System Parts 1 -4
XXI. Module 21: Common Criteria
A. Common Criteria Parts 1 – 5
XXII. Module 22: Personally Identifiable Information
A. Personally Identifiable Information Parts 1 – 2
XXIII. Module 23: Risk Management
A. Risk Management Parts 1 – 3
XXIV. Module 24: Frameworks
A. Frameworks Parts 1 -4
XXV. Module 25: Interconnecting Systems
A. Interconnecting Systems Parts 1 – 2
XXVI. Module 26: Security Services
A. Security Services Parts 1 – 4
XXVII. Module 27: Continuous Monitoring
A. Continuous Monitoring Parts 1 – 4
XXVIII. Module 28: Incident Handling
A. Incident Handling Parts 1 – 4
XXIX. Module 29: Forensic & Incident Response
A. Forensic and Incident Response Part 1
XXX. Module 30: Requirements Processing
A. Requirements Processing Parts 1 – 3
XXXI. Module 31: Standards Bodies
A. Standards Bodies
XXXII. Module 32: Secure System Life Cycle
A. Secure System Life Cycle Parts 1 – 3
XXXIII. Module 33: Email
XXXIV. Module 34: Mobile and BYOD
A. Mobile and BYOD Parts 1 – 2
XXXV. Module 35: Voiceover IP
A. Voice over IP
XXXVI. Module 36: Physical Facilities Assessment Process
A. Physical Facilities Assessment Process Parts 1 – 2
XXXVII. Module 37: Security Requirements Traceability Matrix
A. Security Requirements Traceability Matrix
Dean R. Bushmiller has had fun for the past 20 years learning and teaching everything he can in technology and security. His consulting experience in accounting systems, inventory control, migrations, and patch management has breathed life into his 12 years in the classroom. Dean is a courseware developer who specializes in the CISSP and security training. He is the lead instructor for Expanding Security and teaches online as his main job. As a non-military person, he is a proud recipient of six mission coins. Dean has taught more than 1000 classes with a lifetime approval rating of +90% on topics of: CISSP, including: SOX, PCI-DSS, digital rights management, data loss prevention, incident handling, auditing for compliance, penetration testing, patch management, networking, architecture, migration, certification, and administration.
There are no prerequisites to take this course. Students can take this course without any prior IT experience or certifications.
Recommended Experience to take the exam: 10 years’ experience in IT administration, including at least 5 years of hands-on technical security experience.
For CompTIA Advanced Security Practitioner (CASP) exam certification requirements please click here.
Instructional material requirements:
Yes, since ed2go programs are online, you never have to actually travel to the school. Most schools offer telephone or online registration.
|This program is self-paced and open enrollment, so you can start and finish at your own pace. Upon registering, you're given six (6) months to complete this program.|
The time allotted to complete your program has been calculated based on the number of course hours. If after a concerted effort, you are still unable to complete your program on time, your Student Advisor will help you work out a suitable completion date. Please note that a fee may be charged for an extension.
ed2go courses are non-credit courses, so they do not qualify for federal aid. In some states, vocational rehab or workforce development boards will pay for qualified students to take our courses. Additionally, some students may qualify for financial assistance when they enroll, if they meet certain requirements.
Upon successful completion of the program, you will be awarded a certificate of completion. In addition, you will receive a voucher to take the CompTIA CASP: Certified Advanced Security Practitioner (CAS-002) certification exam, after successful completion of the program and financial obligation.
ed2go programs will provide you with the skills you need to obtain an entry-level position in most cases. We don’t provide direct job placement services, but our facilitators and career counselors will help you build your resume and are available to give advice on finding your first job. Facilitators will also be available to use as a professional reference upon completion of the program. Potential students should always do research on the job market in their area before registering.
If you have additional questions, please feel free to contact us via LIVE CHAT or by calling us at (855) 598-3856. If you are visiting us during non-business hours, please feel free to send us a question using the Contact Us form.
Our programs are all open enrollment. You can register and start the program as soon as you are ready.
Please note: Once the program curriculum is accessed online or through submission of a material shipment confirmation, refunds cannot be issued.
This program will prepare you for the CompTIA Advanced Security Practitioner (CASP) exam and you will receive an exam voucher after successful completion of the program and financial obligation. For CompTIA Advanced Security Practitioner (CASP) exam certification requirements please click here.