Courses Courses Arts and Design Arts and Design Animation Graphic Arts Photography Web Design Business Business Accounting Administrative Communication Finance Marketing and Sales Operations Project Management Small Business Soft Skills Career Online High School Career Online High School Online High School Diploma Computer Applications Computer Applications Autodesk Microsoft QuickBooks Windows Computer Programming Computer Programming Programming Classes Construction and Trades Construction and Trades Construction Environmental and Energy Trades Health and Fitness Health and Fitness Alternative Medicine Dental Fitness Medical Veterinary Wellness Hospitality Hospitality Hospitality Service Information Technology Information Technology Cloud Computing Networking Other Security Language Language Languages Legal Legal Legal Studies Math and Science Math and Science Mathematics and Science Teacher Professional Development Teacher Professional Development Child Development Classroom Technology Math and Science Reading and Writing Test Prep Test Prep Exam Prep Writing Writing Writing and Editing Skill Map How It Works How It Works About ed2go Externship Programs Financial Assistance Corporate Training Find a School Student Blog Military

CONTACT US

(855) 520-6806

See all results for ""

See All Courses

ed2go Information Technology Security CompTIA Advanced Security Practitioner (CASP)
Return to Security
comptia-casp

CompTIA Advanced Security Practitioner (CASP)

Nearly every organization has a need for IT security, from small businesses to large corporations. As a result, IT security is the fastest-growing sector of the information technology industry, providing excellent career prospects well into the future. If you’re looking to increase your marketability and work towards higher-paying positions, the CompTIA Advanced Security Practitioner (CASP) is a valuable credential to add to your resume. Our CASP training from will prepare you take this important exam and achieve your career goals.

The CompTIA Advanced Security Practitioner certification is a longtime standard for vendor-neutral security and is well-known within the industry. As you prepare for and take the certification exam, you’ll develop the skillsets necessary to work in a variety of areas in the IT security field. CASP has one of the most thorough sets of topics of any security certification, so you will be well-versed in a variety of areas, including firewalls, cryptography, SQL injection, and many others.

Employers frequently look for this CompTIA security certification during their hiring and review processes, so achieving this credential is sure to boost your career opportunities. Our IT security courses are comprehensive and thorough, providing you with the experience and education you’ll need to succeed.

6 Months / 50 Course Hrs
Open enrollment

Offered in Partnership with your Preferred School

George Mason University

Why this school? It's been chosen based on your location or if you've visited this school's website. Change School

Learning Method

Instructor-led

Self-Paced. Study on your own schedule

Contact Us for additional information

CompTIA Advanced Security Practitioner (CASP)

Contact Us

Details + Objectives

Course Code: GES363

What You Will Learn
  • Understand the technical knowledge needed to work as a security practitioner
  • Conceptualize, design, and engineer secure solutions across complex enterprise environments
  • Develop critical thinking and judgment skills needed to work successfully as a security practitioner
  • Implement solutions that map to enterprise drivers while managing risk
How the course is taught
  • Self-paced, online course
  • 6 months to complete
  • Open enrollment, begin anytime
  • 50 course hours
How you will benefit
  • Prepare yourself to take, and receive a voucher for, the CompTIA CASP: Certified Advanced Security Practitioner (CAS-002) certification exam
  • Develop the skills needed to work successfully in the IT industry
  • Work toward one of the most thorough certifications in the IT security field

Outline

Expand All
Fundamentals

Learn about underlying security models, selecting security, cryptography, storage, virtual computing, and IPv6.

Remote Access Security

Learn about remote access security, domain name system, directory services, firewall and VPNs, security configuration management, and network infrastructure security.

Secure Web Services

Understand secure web services, buffer overflows, SQL injections, access control, single sign-on, risk assessment, and testing and assessment.

Common Vulnerability

Master an understanding of common criteria, personally identifiable information, risk management, frameworks, and interconnecting systems.

Security Services

Cover continuous monitoring, incident handling, forensic and incident response, requirements processing, and standards bodies.

Secure System Life Cycle

Complete the course by learning about email, mobile and BYOD, voiceover IP, physical facilities assessment processes, and security requirements traceability matrixes.

Details

I.    Module 1: Underlying Security Models
                A.    Course Guide
                B.    Underlying Security Models Parts 1-7
                C.    General Security Part 1 -2
II.    Module 2: Selecting Security
                A.    Selecting Security Products Parts 1 -3
                B.    Control Selection Process Parts 1 -2
III.    Module 3: Cryptography
                A.    Cryptography Symmetric and Asymmetric Parts 1 – 4
                B.    Cryptography Message Integrity Controls Parts 1 – 3
                C.    Cryptography Digital Signatures Part 1 – 2
                D.    Cryptography PKI and PGP Parts 1 – 4
IV.    Module 4: Storage
                A.    Storage Parts 1 -4
V.    Module 5: Virtual Computing
                A.    Virtual Computing
                B.    Cloud Computing Parts 1 – 5
VI.    Module 6: IPv6
                A.    IPV6 Parts 1 – 2
VII.    Module 7: Remote Access Security
                A.    Remote Access Security Parts 1 – 2
VIII.    Module 8: Domain Name System
                A.    Domain Name System Parts 1 – 8
IX.    Module 9: Directory Services
                A.    Directory Services
X.    Module 10: Firewall and VPN
                A.    Firewall and VPN Parts 1 – 4
                B.    Firewall Policy Parts 1 – 4
XI.    Module 11: Security Configuration Management
                A.    Security Configuration Management Parts 1 – 3
XII.    Module 12: Network Infrastructure Security
                A.    Network Infrastructure Security Parts 1 – 4
XIII.    Module 13: Secure Web Services
                A.    Secure Web Services Parts 1 -2
                B.    OWASP top Ten Parts 1 -5
XIV.    Module 14: Buffer Overflows
                A.    Buffer Overflows Parts 1 – 2
XV.    Module 15: SQL Injection
                A.    SQL Injection Parts 1 -2
XVI.    Module 16: Access Control
                A.    Access Control Parts 1 -2
XVII.    Module 17: Single Sign-On
                A.    Single Sign-On Parts 1 – 3
XVIII.    Module 18: Risk Assessment
                A.    Risk Assessment Parts 1 -2
XIX.    Module 19: Testing and Assessment
                A.    Testing and Assessment Parts 1 -3
XX.    Module 20: Common Vulnerability
                A.    Common Vulnerability Scoring System Parts 1 -4
XXI.    Module 21: Common Criteria
                A.    Common Criteria Parts 1 – 5
XXII.    Module 22: Personally Identifiable Information
                A.    Personally Identifiable Information Parts 1 – 2
XXIII.    Module 23: Risk Management
                A.    Risk Management Parts 1 – 3
XXIV.    Module 24: Frameworks
                A.    Frameworks Parts 1 -4
XXV.    Module 25: Interconnecting Systems
                A.    Interconnecting Systems Parts 1 – 2
XXVI.    Module 26: Security Services
                A.    Security Services Parts 1 – 4
XXVII.    Module 27: Continuous Monitoring
                A.    Continuous Monitoring Parts 1 – 4
XXVIII.    Module 28: Incident Handling
                A.    Incident Handling Parts 1 – 4
XXIX.    Module 29: Forensic & Incident Response
                A.    Forensic and Incident Response Part 1
XXX.    Module 30: Requirements Processing
                A.    Requirements Processing Parts 1 – 3
XXXI.    Module 31: Standards Bodies
                A.    Standards Bodies
XXXII.    Module 32: Secure System Life Cycle
                A.    Secure System Life Cycle Parts 1 – 3
XXXIII.    Module 33: Email
                A.    Email
XXXIV.    Module 34: Mobile and BYOD
                A.    Mobile and BYOD Parts 1 – 2
XXXV.    Module 35: Voiceover IP
                A.    Voice over IP
XXXVI.    Module 36: Physical Facilities Assessment Process
                A.    Physical Facilities Assessment Process Parts 1 – 2
XXXVII.    Module 37: Security Requirements Traceability Matrix
                A.    Security Requirements Traceability Matrix

View All Sections

Instructors & Support

Dean R. Bushmiller

Dean R. Bushmiller has had fun for the past 20 years learning and teaching everything he can in technology and security. His consulting experience in accounting systems, inventory control, migrations, and patch management has breathed life into his 12 years in the classroom. Dean is a courseware developer who specializes in the CISSP and security training. He is the lead instructor for Expanding Security and teaches online as his main job. As a non-military person, he is a proud recipient of six mission coins. Dean has taught more than 1000 classes with a lifetime approval rating of +90% on topics of: CISSP, including: SOX, PCI-DSS, digital rights management, data loss prevention, incident handling, auditing for compliance, penetration testing, patch management, networking, architecture, migration, certification, and administration.

Requirements

Prerequisites / Requirements

Prerequisites:

There are no prerequisites to take this course. Students can take this course without any prior IT experience or certifications.

Recommended Experience to take the exam: 10 years’ experience in IT administration, including at least 5 years of hands-on technical security experience.

For CompTIA Advanced Security Practitioner (CASP) exam certification requirements please click here.

Requirements:

Hardware Requirements: 

  • This course can be taken on either a PC or Mac device.

Software Requirements: 

  • PC: Windows XP or later.
  • Mac: OS X Snow Leopard 10.6 or later.
  • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
  • Adobe Flash Player. Click here to download the Flash Player.
  • Adobe Acrobat Reader. Click here to download the Acrobat Reader.
  • Email capabilities and access to a personal email account.
  • Software must be installed and fully operational before the course begins.
Instructional Materials

The instructional materials required for this course are included in enrollment and will be available online.

About Certification

comptia

If you want to earn a credential from the world’s leading technology association, look no further than a course certified by CompTIA. With a focus on cloud and mobile technology, information security, and networking technology, CompTIA provides vendor-neutral certifications in a wide variety of skillsets in the IT industry. CompTIA certifications ensure that the IT workforce is well-trained, knowledgeable, and able to perform the real-life tasks needed to be successful. From entry-level to expert, CompTIA offers IT certification options that cover all your bases.

FAQs

Expand All
Can I register for a course if I am an international student?

Yes, ed2go courses are online, so you never have to actually travel to the school. Most schools offer telephone or online registration.

Does this course prepare for a certification?

This course will prepare you for the CompTIA Advanced Security Practitioner (CASP) exam and you will receive an exam voucher after successful completion of the course and financial obligation. For CompTIA Advanced Security Practitioner (CASP) exam certification requirements please click here.

When can I start the course?

This course is open enrollment, so you can register and start the course as soon as you are ready. Access to your course can take 24-48 business hours.

How long does it take to complete this course?

This course is self-paced and open enrollment, so you can start when you want and finish at your own pace. When you register, you'll receive six (6) months to complete the course.

What if I don't have enough time to complete my course within the time frame provided?

The time allotted for course completion has been calculated based on the number of course hours. However, if you are unable to complete the course, contact your Student Advisor to help you work out a suitable completion date. Please note that an extension fee may be charged.

What kind of support will I receive?

You may be assigned with an instructor or team of industry experts for one-on-one course interaction. Your support will be available (via e-mail) to answer any questions you may have and to provide feedback on your performance. All of our instructors are successful working professionals in the fields in which they teach. You will be assigned to an Advisor for academic support.

What happens when I complete the course?

Upon successful completion of the course, you will be awarded a certificate of completion. In addition, you will receive a voucher to take the CompTIA CASP: Certified Advanced Security Practitioner (CAS-002) certification exam, after successful completion of the course and financial obligation.

Am I guaranteed a job?

This course will provide you with the skills you need to obtain an entry-level position in most cases. Potential students should always do research on the job market in their area before registering.

Can I get financial assistance?

ed2go courses are non-credit, so they do not qualify for federal aid, FAFSA and Pell Grant. In some states, vocational rehab or workforce development boards will pay for qualified students to take our courses. Additionally, some students may qualify for financial assistance when they enroll, if they meet certain requirements. Financing is available from select schools. Learn more: https://www.ed2go.com/career/financial-assistance

How can I get more information about this course?

If you have questions that are not answered on our website, please feel free to contact us via LIVE CHAT or by calling us at (855) 520-6806. If you are visiting us during non-business hours, please feel free to send us a question using the Contact Us form.

Browse All