Duration: 4 days Instructor-led Course
Course Description
This 4-day instructor-led course prepares advanced-level IT professionals for the CompTIA CASP+ certification. The course focuses on enterprise-level security operations, architecture, governance, risk, and incident response in complex environments. Attendees will gain hands-on experience through scenario-based labs that reflect real-world tasks performed by experienced security practitioners.
CASP+ is geared toward security professionals who design and implement solutions across large enterprise networks, not just manage or audit security policies. This course emphasizes applied knowledge of risk analysis, secure architecture, cloud and virtualization security, cryptography, and threat management at the operational level.
Prerequisites
- 5 to 10 years of hands-on experience in IT administration, including at least 3 years of practical security experience
- Understanding of general networking concepts (TCP/IP, firewalls, DNS, etc.)
- Familiarity with enterprise security tools and basic scripting knowledge is helpful but not required
- It is recommended (but not required) that students have Security+, CySA+, or equivalent knowledge
Key Learning Objectives
By the end of this course, participants will be able to:
- Design secure enterprise-level architecture across on-premises, cloud, and hybrid networks
- Perform advanced threat analysis and vulnerability assessments
- Apply governance and risk management principles to meet compliance frameworks
- Implement cryptographic techniques and manage key lifecycles
- Conduct incident response planning and apply security controls across different platforms
- Prepare confidently for the CompTIA CASP+ exam
Course Takeaways
- Detailed understanding of the five CASP+ exam domains
- Real-world security scenarios for hands-on application
- Lab guide with step-by-step walkthroughs and command references
- Exam readiness checklist and practice questions
- Certificate of completion and post-class study plan
Module 1: Enterprise Security Architecture and Design
Topics Covered
- Enterprise security domain design
- Secure network and storage solutions
- Integration of diverse computing environments (cloud, on-premises, hybrid)
- Security implications of virtualization and containerization
- Network segmentation, microsegmentation, and SDN
- Scalability, redundancy, and performance trade-offs in secure design
Hands-On Labs
- Lab 1: Design a secure segmented enterprise network using VLANs and ACLs
- Lab 2: Configure and analyze a secure virtual environment using virtual firewalls
- Lab 3: Implement role-based access control in a multi-domain architecture
Module 2: Security Operations and Incident Response
Topics Covered
- Threat intelligence and behavior analytics
- Log analysis, SIEM configuration, and alert tuning
- Detection and response to APTs and insider threats
- Digital forensics and chain of custody principles
- Developing and executing incident response plans
Hands-On Labs
- Lab 4: Analyze malicious activity using SIEM tools (Elastic Stack or Splunk)
- Lab 5: Extract indicators of compromise from forensic images
- Lab 6: Develop and test an incident response plan using a tabletop simulation
Module 3: Governance, Risk, and Compliance
Topics Covered
- Risk analysis and risk appetite in the enterprise
- Compliance frameworks (GDPR, HIPAA, FISMA, ISO 27001, NIST, etc.)
- Business continuity and disaster recovery planning
- Third-party risk management and contract enforcement
- Metrics and KPIs in security reporting
Hands-On Labs
- Lab 7: Conduct a risk assessment and produce a risk register
- Lab 8: Map controls to compliance requirements using NIST CSF
- Lab 9: Simulate a disaster recovery test scenario and document lessons learned
Module 4: Cryptography, Identity, and Emerging Technologies
Topics Covered
- Advanced cryptographic concepts (ECC, quantum-resistance, blockchain)
- Key management, PKI, and certificate lifecycle
- Secure application development and code signing
- Identity and access management (IAM), SSO, and federation
- Secure integration of IoT, SCADA, and emerging platforms
Hands-On Labs
- Lab 10: Create a private PKI and issue certificates for internal use
- Lab 11: Configure MFA and federation using open-source IAM tools
- Lab 12: Evaluate IoT device risks and secure communications using TLS