Online And On-Site Computer Training Across The USA. CISSP CASP Security+ A+ MCDBA MCST MCSE CCNA CCNP CCVP CCSP PMP ITIL Web Design Certification Courses


CompTIA CASP Certification Training Online (On-demand learning)

YOUR TRUSTED, ON-SITE AND HOME-STUDY TRAINING PARTNER
Have you told someone about RTEK 2000 today?

Online, Home and Office Study at Affordable Price for CompTIA CASP Training.
Product ID: RTK-CASP

CompTIA CASP Certification Training

The Best Alternative to In-Class Training:

CompTIA CASP Training Video
  • Repeat as many times as you want;
  • Full Audio, Video, and Demonstration components;
  • Interactive Hands-on-lab Simulations;
  • Learn at your place. Use your mobile device;
  • Schedule at your own pace and time!
best video training"...Exactly what I was looking for to pass the exam. The convenience of online on-demand training need not to be explained. I have used the training while I was on the business trip, at home, and in my office."
Sindy Blear

Shortcuts to:

  Save hundred of dollars with RTEK 2000!
Order Now! for only USD$435.00! (Orig: $495.00)
for 12-month online access

CompTIA CASP Certification TrainingSchedule our instructor led classroom training at your convenience and never miss another lecture or fall behind. We invited the Best CompTIA CASP Certified Trainers in the industry to help us develop the ultimate training and certification program which includes everything you will need to fully prepare for and pass the most recent certification exam.

CompTIA CASP Certification Training for certification examThe CompTIA CASP (CAS-001) certification establishes knowledgeable professionals in the field of advanced security practices. Students will first learn about the the enterprise security architecture, security technology and resource technology. They will then learn security design and solutions, application security design, managing risk, security policies, security procedures and enterprise security integration. Finally, they will learn about security research and analysis, disaster recovery and business continuity, managing risk in projects, legal issues and judgment and decision-making.

Package Includes:
  • 12 Months Online On Demand Access Featuring live instructor-led classroom sessions with full audio, video and demonstration components
  • Printable Courseware
  • Software Video Demonstrations
  • Certificate of Completion
  • Self-Assessment Lesson Review Quizzes
  • Free 1 Year Upgrade Policy
  • Mobile Access via any mobile device

The Expert Trainers:
CompTIA CASP TrainerKenneth Mayer - CCSI, MCT, CCNT, CCNP, CCDA

Ken Mayer is a Microsoft Certified Trainer as well as a Certified Ethical Hacker Trainer and Security consultant. He started his career in computer technology in 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies across the United States and Western Europe. He has achieved the Certified Cisco Systems Instructor certification. The CCSI certification involved a two-day lab and observation event held on Cisco's Paris, France Facility. This gave Ken the accreditation to be able to deliver Cisco Authorized Courses as a CCSI. He has taught the full line of Cisco CCNA, CCDA, CCNP, CCDP and CCIP course curriculums, including Cisco's security appliances such as PIX and IDS.



CASP Course Outline
click on module name!
Lesson 01 - The Enterprise Security Architecture
Topic A: The Basics of Enterprise Security
The Enterprise
Enterprise Security
Business Goals and Security
Common Enterprise Security Principles
Enterprise Threat Intelligence
What to Protect?
Defense in Depth
Common Components of an Enterprise Security Solutions
Policies, Standards, and Procedures
Enterprise Policy Types
Topic B: The Enterprise Structure
Organizational Structures
The Management Team
Network Administrator
The DBA
Programmers
Stakeholders
Finance
Human Resources
Physical Security and Facilities Roles
Discipline Collaboration
Topic C: Enterprise Security Requirements
Legal Compliance
PII
Privacy Requirements
Organizational Security Requirements
Lesson 02 - The Enterprise Security Technology (cont)
Topic A: Common Network Security Components and Technologies
Common Enterprise Security Components
VoIP Integration
IPv6 Migration and Integration
VLAN Integration
DNS Security Techniques
Secure Directory Services
NIDS
NIPS
The NIPS Process
ESB
The ESB Process
DAM
Topic B: Communications and Collaboration Security
UC Security
UC Attacks
UC Components
Traffic Prioritization (QoS)
Security Solutions for Data Flow
VoIP Security
The VoIP Implementation Process
VoIP Implementation Considerations
Remote Access Security
VPN Solutions
External Communications Security
Collaboration Platform Security Issues
Demo - Least Privilege
Common Mobile Devices
Enterprise Security Methods for Mobile Devices
Topic C: Cryptographic Tools and Techniques
Cryptography in the Enterprise
Considerations for Cryptography in the Enterprise
Demo - File Encryption
Cryptographic Methods and Design
Basic Approaches to Encryption
Transport Encryption Methods
Security Implications for Encryption
Digital Signature Techniques
Advanced PKI Components
Code Signing
Attestation
Entropy
PRNG
PFS
Confusion and Diffusion
Topic D: Advanced Authentication
Advanced Authentication Within the Enterprise
Certificate-Based Authentication
SAML
SPML
XACML
SOAP
WSS
Lesson 03 - Enterprise Resource Technology
Topic A: Enterprise Storage Security Issues
Common Enterprise Storage Technologies
NAS Security Implications
SAN Security Implications
vSAN Security Implications
iSCSI Security Implications
FCoE Security Implications
LUN
LUN Masking in the Security Architecture
Redundancy
Additional Storage Security Implications
Topic B: Distributed, Shared, and Virtualized Computing
Why Virtualization?
Advantages of Virtualization
VLANs
VMs
VDI
Terminal Services
Virtualization Vulnerabilities
Vulnerabilities of Hosting VMs for Multiple Companies
Virtual Environment Security Methods
Topic C: Cloud Computing and Security
Cloud Computing
Cloud Computing Service Models
Cloud Storage Considerations
Security Vulnerabilities of Cloud Computing
Secure Use of Cloud Computing Within the Enterprise
Lesson 04 - Security Design and Solutions
Topic A: Network Security Design
Network Design Types and Techniques
Network Design Considerations
Data Network Types
A Data Network Topology
Data Network Topology Types
A Network Diagram
Data Network Media Types
Network Transmission Methodologies
Physical Security
Building Layout
Facilities Management
Hardware Attacks
Environmental Threats and Vulnerabilities
Network Attacks
SCADA
Secure Infrastructure Design
Storage Integration Considerations
Topic B: Conduct a Security Assessment
Vulnerability Assessment
Penetration Testing
Hacking Steps
Penetration Testing Techniques
Fingerprinting
Code Review Methods
A Social Engineering Test
Security Assessment Tools
How to Conduct a Security Assessment
Topic C: Host Security
Host-Based Security Controls
Host-Based Firewalls
Firewall Rules
Demo - Firewalls
Trusted OS
Endpoint Security
Anti-Malware Software
Host Hardening
Operating System Security
Host Hardening Action Steps
Asset Management
HIDS
HIPS
Host Monitoring

Lesson 05 - Application Security Design
Topic A: Application Security Basics
Application Security Design
Application Design Considerations
Application Security Design Best Practices
Application Security Vulnerabilities
Vulnerability Testing Methods
Application Sandboxing
Application Security Frameworks
Third-Party Applications
The Application Life Cycle
Secure Coding Standards
Secure Coding Guidelines
SOA
Topic B: Web Application Security
Cookie Security
Hijacked Cookies
Cookie Poisoning
Cookies and XSRF
XSRF Security
Client Side vs. Server Side Processing Methods
State Management
State Management Vulnerabilities
Client-Side Scripting Languages
Common Application Based Security Threats and Controls

Lesson 06 - Managing Risk, Security Policies/Procedures
Topic A: Analyze Security Risk
Risk Exposure
ERM
Risk Management Strategies
Common Business Models and Strategies
Business Model Types
Internal and External Considerations
De-perimeterization
Risk Analysis Methods
How to Analyze Security Risk
Topic B: Implement Risk Mitigation Strategies and Controls
Risk Scoring
Risk Likelihood and Impact
Risk Determination
Elements of Risk Determination
Risk Response Techniques
Mitigation Strategies
A Sample ESA Framework
Continuous Monitoring
How to Implement Risk Mitigation Strategies and Controls
Topic C: Implement Enterprise-Level Security Policies and Procedures
Security Policy Development Principles
Security Policy Development Methods
Security Procedures
Security Procedure Development Methods
Common Business Documents
Common Security Policy Components
Security Policy Collaboration
Security Policy Collaboration Partners
How to Implement Enterprise-Level Security Policies and Procedures
Topic D: Prepare for Incident Response and Recovery
Incident and Emergency Response
The Emergency Response Team
A Security Incident
Data Breach
Data Breach Types
The Data Breach Response Process
The E-Discovery Process
E-Discovery Policies
E-Discovery Components and Techniques
SIEM
Computer Forensics
Incident Response System Design Considerations
Incident Response Components
How to Prepare for Incident Response and Recovery

Lesson 07 - Enterprise Security Integration
Topic A: The Technology Life Cycle
Technology Life Cycle Considerations
Technology Life Cycle Phases
End-to-End Solutions
SDLC
SDLC Phases
SDLC Models
SSDLC
SRTM
Topic B: Inter-Organizational Change
Security and Organizational Change
Change Management in the Enterprise
Security Design Considerations
Network Secure Segmentation
Network Secure Delegation
Product and Service Integration
Third-Party Products
Topic C: Integrate Enterprise Disciplines to Achieve Secure Solutions
Enterprise Security Integration Strategies
Security Process and Controls Support
Security Process and Control Mechanisms
Effective Collaboration Techniques
Collaboration Across Disciplines
How to Integrate Enterprise Disciplines to Achieve Secure Solutions

Lesson 08 - Security Research and Analysis
Topic A: Perform an Industry Trends and Impact Analysis
Industry Best Practices
Demo - Security Research
Research Methods
Technology Evolution
New Technologies, Security Systems, and Services
New Security Technology Types
Situational Awareness
Situational Awareness Considerations
Emerging Business Tools
Social Media as an Emerging Business Tool
Mobile Devices as Emerging Business Tools
Emerging Security Issues
The Global Impact Analysis Industry
Security Requirements for Business Contracts
How to Perform an Industry Trends Impact Analysis
Topic B: Perform an Enterprise Security Analysis
Benchmarking
Network Traffic Analysis
Types of Network Traffic Analysis
Prototyping and Testing
Cost-Benefit Analysis
Security Analysis Strategies
Security Solution Analysis
Lessons Learned Review
How to Perform an Enterprise Security Analysis

Lesson 09 - Disaster Recovery and Business Continuity
Topic A: BCP Fundamentals
BCPs
BCP Development Phases
NIST Contingency Planning Steps
NFPA Business Planning Framework
Disruptive Events
BIA
BIA Organizational Goals
BIA Process
Critical Business Process
Vulnerability Assessments
MTD
RPO
RTO
RPO/RTO Optimization
Topic B: BCP Implementation
Program Coordinators
Advisory Committee-BCP Team
BCP Team Responsibilities
BCP Contents
Business Plan Evaluations
Business Plan Testing
Business Plan Maintenance
Business Continuity Process
Topic C: DRP Fundamentals
DRP
Disaster Recovery Strategy
Disaster Recovery Priority Levels
Disaster Recovery Response Approaches
Backup Strategies
Data Restoration Strategies
Alternate Sites
Topic D: DRP Implementation
Recovery Team
Salvage Team
Disaster Recovery Evaluation and Maintenance
Disaster Recovery Testing
Disaster Recovery Process

Lesson 10 - Managing Risk in Projects
Topic A: Create a Risk Management Plan
Risk
Project Buffer
Classification of Risks
Business Risk vs. Insurable Risk
Risk Tolerance
Probability Scale
Impact Scale
RBS
Risk Management
The Risk Management Plan
Components of a Risk Management Plan
How to Create a Risk Management Plan
Topic B: Identify Risks and Their Causes
Triggers
Information Gathering Techniques
Documentation Reviews
SWOT Analysis
Risk Analysis
Risk Register
Components of a Risk Register
Risk Categories
How to Identify Risks and Their Causes
Topic C: Analyze Risks
Qualitative Risk Analysis
Quantitative Risk Analysis
Risk Probability and Impact Assessment
The Probability and Impact Risk Rating Matrix
The Ongoing Risk Assessment Process
Project Risk Ranking
Data Collection and Representation Techniques
Basics of Probability
Probability Distribution
Quantitative Analysis Methods
Qualitative Analysis Methods
Risk Data Quality Assessment
Risk Urgency Assessment
Simulation
Monte Carlo Analysis
How to Analyze Risks
Topic D: Develop a Risk Response Plan
Negative Risks
Negative Risk Strategies
Positive Risks
Positive Risk Strategies
Contingency Plan
The BCP
DRP
Contingency Reserve
Risk-Related Contract Decisions
How to Develop a Risk Response Plan

Lesson 11 - Legal Issues
Topic A: Computer Crime Laws and Regulations
Common Law
Statutory Law
Types of Statutory Offenses
Administrative Law
Intellectual Property Law
Information Privacy Law
Computer Crime Law
Compliance
Liability
Internal and External Audits
Governmental Oversight Resources
Topic B: Computer Crime Incident Response
Computer Crime
The Computer Criminal Incident Response Process
The Evidence Life Cycle
Evidence Collection Techniques
Evidence Types
Chain of Evidence
Rules of Evidence
Surveillance Techniques
Search and Seizure
Computer Forensics

Lesson 12 - Judgment and Decision-Making
Topic A: Develop Critical Thinking Skills
Intellectual Autonomy
Humility
Objectivity
Focus on the Argument
Clarity
Defining Your Argument
Intellectual Honesty
Logical Fallacies
Assessing Arguments Logically
How to Employ Critical Thinking Skills
Topic B: Determine the Root of a Problem
Obstacles to Analysis
Occam's Razor
Techniques for Applying Occam's Razor
Theme Analysis
The Four Guidelines Technique
How to Determine the Root of a Problem
Topic C: Use Judgment to Make Sound Decisions
Analyzing Problems
Analytical vs. Creative Thinking
Barriers to Creative Thinking
Brainstorming
Rules of Brainstorming
Evaluating Brainstorming Ideas
A Fishbone Diagram
A Pareto Chart
A Histogram
A Cost-Benefit Analysis
Phases in Cost-Benefit Analysis
A Prioritization Matrix
A Trade-Off Method
A Decision Tree
An Ease and Effect Matrix
A PMI Analysis Table
How to Use Judgment to Make Sound Decisions
Lesson 12 Review
Course Closure


Course Features:

  • Video Lectures and Expert Instruction
    Practical knowledge is essential for success in a real world environment and we have chosen our instructors with this in mind - many of our instructors are business owners and have been employed in their respective fields for decades!
  • PowerPoint
    Utilizing PowerPoint presentations enhances the delivery by displaying a variety of visual information to the user. This type of representation allows the user to better interpret the material through charts, definitions, graphs, and more...
  • Easy Navigation
    Move forward, back, and repeat entire topics or just a section. A progress bar illuminates as you advance through exercises.
  • Printable Study Guides
    Printable study guides for the entire course are available. This allows all material to be viewed, reviewed, and printed for viewing at a later date.
  • Review Exercises
    Each section has a review quiz to aid in the learning process by validating the comprehension of the material covered before moving on to a new section.
  • Resume Option
    All courses are resumed to where you left off last session allowing you to learn when it is convenient for you without the hassle of remembering where you where.
  • Full Motion Video
    All courses feature full-motion videos of instructors teaching the information as if they are speaking directly to you. Our unique delivery simulates a one-on-one classroom environment creating a more personal lesson and learning experience.
  • Certificate of Completion
    Upon completion of your training course, you will receive a Certificate of completion displaying your full name, course completed as well as the date of completion. You can print this out or save it digitally to showcase your accomplishment.
  • Live, Hands-On Demonstrations
    Demonstrations are a way for the instructor to show and tell the user how to perform a task by actually doing it on screen in front of them.
  • Mobile Access: All our training courses are now available across all mobile devices.