Course Code: GES363
Learn about underlying security models, selecting security, cryptography, storage, virtual computing, and IPv6.
Learn about remote access security, domain name system, directory services, firewall and VPNs, security configuration management, and network infrastructure security.
Understand secure web services, buffer overflows, SQL injections, access control, single sign-on, risk assessment, and testing and assessment.
Master an understanding of common criteria, personally identifiable information, risk management, frameworks, and interconnecting systems.
Cover continuous monitoring, incident handling, forensic and incident response, requirements processing, and standards bodies.
Complete the course by learning about email, mobile and BYOD, voiceover IP, physical facilities assessment processes, and security requirements traceability matrixes.
I. Module 1: Underlying Security Models
A. Course Guide
B. Underlying Security Models Parts 1-7
C. General Security Part 1 -2
II. Module 2: Selecting Security
A. Selecting Security Products Parts 1 -3
B. Control Selection Process Parts 1 -2
III. Module 3: Cryptography
A. Cryptography Symmetric and Asymmetric Parts 1 – 4
B. Cryptography Message Integrity Controls Parts 1 – 3
C. Cryptography Digital Signatures Part 1 – 2
D. Cryptography PKI and PGP Parts 1 – 4
IV. Module 4: Storage
A. Storage Parts 1 -4
V. Module 5: Virtual Computing
A. Virtual Computing
B. Cloud Computing Parts 1 – 5
VI. Module 6: IPv6
A. IPV6 Parts 1 – 2
VII. Module 7: Remote Access Security
A. Remote Access Security Parts 1 – 2
VIII. Module 8: Domain Name System
A. Domain Name System Parts 1 – 8
IX. Module 9: Directory Services
A. Directory Services
X. Module 10: Firewall and VPN
A. Firewall and VPN Parts 1 – 4
B. Firewall Policy Parts 1 – 4
XI. Module 11: Security Configuration Management
A. Security Configuration Management Parts 1 – 3
XII. Module 12: Network Infrastructure Security
A. Network Infrastructure Security Parts 1 – 4
XIII. Module 13: Secure Web Services
A. Secure Web Services Parts 1 -2
B. OWASP top Ten Parts 1 -5
XIV. Module 14: Buffer Overflows
A. Buffer Overflows Parts 1 – 2
XV. Module 15: SQL Injection
A. SQL Injection Parts 1 -2
XVI. Module 16: Access Control
A. Access Control Parts 1 -2
XVII. Module 17: Single Sign-On
A. Single Sign-On Parts 1 – 3
XVIII. Module 18: Risk Assessment
A. Risk Assessment Parts 1 -2
XIX. Module 19: Testing and Assessment
A. Testing and Assessment Parts 1 -3
XX. Module 20: Common Vulnerability
A. Common Vulnerability Scoring System Parts 1 -4
XXI. Module 21: Common Criteria
A. Common Criteria Parts 1 – 5
XXII. Module 22: Personally Identifiable Information
A. Personally Identifiable Information Parts 1 – 2
XXIII. Module 23: Risk Management
A. Risk Management Parts 1 – 3
XXIV. Module 24: Frameworks
A. Frameworks Parts 1 -4
XXV. Module 25: Interconnecting Systems
A. Interconnecting Systems Parts 1 – 2
XXVI. Module 26: Security Services
A. Security Services Parts 1 – 4
XXVII. Module 27: Continuous Monitoring
A. Continuous Monitoring Parts 1 – 4
XXVIII. Module 28: Incident Handling
A. Incident Handling Parts 1 – 4
XXIX. Module 29: Forensic & Incident Response
A. Forensic and Incident Response Part 1
XXX. Module 30: Requirements Processing
A. Requirements Processing Parts 1 – 3
XXXI. Module 31: Standards Bodies
A. Standards Bodies
XXXII. Module 32: Secure System Life Cycle
A. Secure System Life Cycle Parts 1 – 3
XXXIII. Module 33: Email
XXXIV. Module 34: Mobile and BYOD
A. Mobile and BYOD Parts 1 – 2
XXXV. Module 35: Voiceover IP
A. Voice over IP
XXXVI. Module 36: Physical Facilities Assessment Process
A. Physical Facilities Assessment Process Parts 1 – 2
XXXVII. Module 37: Security Requirements Traceability Matrix
A. Security Requirements Traceability Matrix
Dean R. Bushmiller has had fun for the past 20 years learning and teaching everything he can in technology and security. His consulting experience in accounting systems, inventory control, migrations, and patch management has breathed life into his 12 years in the classroom. Dean is a courseware developer who specializes in the CISSP and security training. He is the lead instructor for Expanding Security and teaches online as his main job. As a non-military person, he is a proud recipient of six mission coins. Dean has taught more than 1000 classes with a lifetime approval rating of +90% on topics of: CISSP, including: SOX, PCI-DSS, digital rights management, data loss prevention, incident handling, auditing for compliance, penetration testing, patch management, networking, architecture, migration, certification, and administration.
There are no prerequisites to take this course. Students can take this course without any prior IT experience or certifications.
Recommended Experience to take the exam: 10 years’ experience in IT administration, including at least 5 years of hands-on technical security experience.
For CompTIA Advanced Security Practitioner (CASP) exam certification requirements please click here.
The instructional materials required for this course are included in enrollment and will be available online.
If you want to earn a credential from the world’s leading technology association, look no further than a course certified by CompTIA. With a focus on cloud and mobile technology, information security, and networking technology, CompTIA provides vendor-neutral certifications in a wide variety of skillsets in the IT industry. CompTIA certifications ensure that the IT workforce is well-trained, knowledgeable, and able to perform the real-life tasks needed to be successful. From entry-level to expert, CompTIA offers IT certification options that cover all your bases.
Yes, ed2go courses are online, so you never have to actually travel to the school. Most schools offer telephone or online registration.
This course will prepare you for the CompTIA Advanced Security Practitioner (CASP) exam and you will receive an exam voucher after successful completion of the course and financial obligation. For CompTIA Advanced Security Practitioner (CASP) exam certification requirements please click here.
This course is open enrollment, so you can register and start the course as soon as you are ready. Access to your course can take 24-48 business hours.
This course is self-paced and open enrollment, so you can start when you want and finish at your own pace. When you register, you'll receive six (6) months to complete the course.
The time allotted for course completion has been calculated based on the number of course hours. However, if you are unable to complete the course, contact your Student Advisor to help you work out a suitable completion date. Please note that an extension fee may be charged.
You may be assigned with an instructor or team of industry experts for one-on-one course interaction. Your support will be available (via e-mail) to answer any questions you may have and to provide feedback on your performance. All of our instructors are successful working professionals in the fields in which they teach. You will be assigned to an Advisor for academic support.
Upon successful completion of the course, you will be awarded a certificate of completion. In addition, you will receive a voucher to take the CompTIA CASP: Certified Advanced Security Practitioner (CAS-002) certification exam, after successful completion of the course and financial obligation.
This course will provide you with the skills you need to obtain an entry-level position in most cases. Potential students should always do research on the job market in their area before registering.
ed2go courses are non-credit, so they do not qualify for federal aid, FAFSA and Pell Grant. In some states, vocational rehab or workforce development boards will pay for qualified students to take our courses. Additionally, some students may qualify for financial assistance when they enroll, if they meet certain requirements. Financing is available from select schools. Learn more: https://www.ed2go.com/career/financial-assistance
If you have questions that are not answered on our website, please feel free to contact us via LIVE CHAT or by calling us at (855) 520-6806. If you are visiting us during non-business hours, please feel free to send us a question using the Contact Us form.