{"id":13180,"date":"2022-08-16T17:39:41","date_gmt":"2022-08-16T14:39:41","guid":{"rendered":"https:\/\/esi.edu.sa\/?post_type=courses&#038;p=13180"},"modified":"2026-02-05T15:13:21","modified_gmt":"2026-02-05T12:13:21","slug":"advanced-security-practitioner-plus","status":"publish","type":"courses","link":"https:\/\/esi.edu.sa\/en\/courses\/advanced-security-practitioner-plus\/","title":{"rendered":"CompTIA Advanced Security Practitioner (CASP+) Course"},"content":{"rendered":"<p dir=\"ltr\" style=\"text-align: justify;\"><img decoding=\"async\" class=\"alignnone wp-image-20027\" src=\"https:\/\/esi.edu.sa\/wp-content\/uploads\/2024\/02\/\u062a\u0627\u0628\u064a2-300x64-copy.png\" alt=\"\" width=\"188\" height=\"40\" srcset=\"https:\/\/esi.edu.sa\/wp-content\/uploads\/2024\/02\/\u062a\u0627\u0628\u064a2-300x64-copy.png 300w, https:\/\/esi.edu.sa\/wp-content\/uploads\/2024\/02\/\u062a\u0627\u0628\u064a2-300x64-copy-50x11.png 50w\" sizes=\"(max-width: 188px) 100vw, 188px\" \/><\/p>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>Overview<\/strong><\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>The CompTIA Advanced Security Practitioner (CASP+) certification is an international, vendor-neutral exam that proves competency in enterprise security; risk management; research and analysis; and integration of computing, communications, and business<\/li>\n<li>The exam covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>Benefits<\/strong><\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>In this course, you will learn how to implement solutions within cybersecurity policies and frameworks &amp; assess cyber readiness within an enterprise, and design and implement the proper solutions to ensure the organization is ready for the next attack.<\/li>\n<li>The CompTIA Advanced Security Practitioner (CASP+) certification was accredited by the International Organization for Standardization (ISO) and the American National Standards Institute (ANSI).<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>Learning Objectives:<\/strong><\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>Distinguish and select among different types of virtualized, distributed and shared computing<\/li>\n<li>Explain the security implications of enterprise storage<\/li>\n<li>Integrate hosts, networks, infrastructures, applications and storage into secure comprehensive solutions<\/li>\n<li>Explain the importance of application security<\/li>\n<li>Carry out security activities across the technology life cycle<\/li>\n<li>Carry out relevant analysis for the purpose of securing the enterprise<\/li>\n<li>To integrate and implement secure solutions across complex environments to support a resilient enterprise<\/li>\n<li>Use monitoring, detection, incident response and automation to proactively support ongoing security operations in an enterprise environment<\/li>\n<li>Apply security practices to cloud, on-premises, endpoint and mobile infrastructure, while considering cryptographic technologies and techniques<\/li>\n<li>Consider the impact of governance, risk and compliance requirements throughout the enterprise<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>The Main Topic of the Course<\/strong><\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>Module 1: Security Architecture<\/li>\n<li>Module 2: Security Operations<\/li>\n<li>Module 3: Security Engineering and Cryptography<\/li>\n<li>Module 4: Governance, Risk, and Compliance<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>Course Requirements<\/strong><\/p>\n<ul style=\"text-align: justify;\">\n<li dir=\"ltr\" style=\"text-align: left;\">Recommended Exp:10 years\u2019 experience in IT administration, including at least 5 years of hands-on technical security experience.<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>Exam requirements<\/strong><\/p>\n<ul style=\"text-align: justify;\">\n<li dir=\"ltr\" style=\"text-align: left;\">There are no specific prerequisites required to attend Exam<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>LAB Requirement<\/strong><\/p>\n<ul style=\"text-align: justify;\">\n<li dir=\"ltr\" style=\"text-align: left;\">It\u2019s recommended to have LAB for this course<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>Course Outlines and Training Plan<\/strong><\/p>\n<p dir=\"ltr\" style=\"text-align: justify;\">Module 1: Security Architecture<\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>Given a scenario, analyze the security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network.<\/li>\n<li>Given a scenario, analyze the organizational requirements to determine the proper infrastructure security<\/li>\n<li>Given a scenario, integrate software applications securely into an enterprise<\/li>\n<li>Given a scenario, implement data security techniques for securing enterprise<\/li>\n<li>Given a scenario, analyze the security requirements and objectives to provide the appropriate authentication and authorization controls<\/li>\n<li>Given a set of requirements, implement secure cloud and virtualization<\/li>\n<li>Explain how cryptography and public key infrastructure (PKI) support security objectives and requirements<\/li>\n<li>Explain the impact of emerging technologies on enterprise security and<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\">Module 2: Security Operation<\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>Given a scenario, perform threat management<\/li>\n<li>Given a scenario, analyze indicators of compromise and formulate an appropriate response<\/li>\n<li>Given a scenario, perform vulnerability management<\/li>\n<li>Given a scenario, use the appropriate vulnerability assessment and penetration testing methods and<\/li>\n<li>Given a scenario, analyze vulnerabilities and recommend risk<\/li>\n<li>Given a scenario, use processes to reduce risk<\/li>\n<li>Given an incident, implement the appropriate<\/li>\n<li>Explain the importance of forensic<\/li>\n<li>Given a scenario, use forensic analysis<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\">Module 3: Security Engineering and Cryptography<\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>Given a scenario, apply secure configurations to enterprise<\/li>\n<li>Given a scenario, configure and implement endpoint security<\/li>\n<li>Explain security considerations impacting specific sectors and operational<\/li>\n<li>Explain how cloud technology adoption impacts organizational security<\/li>\n<li>Given a business requirement, implement the appropriate PKI solution.<\/li>\n<li>Given a business requirement, implement the appropriate cryptographic protocols and algorithms<\/li>\n<li>Given a scenario, troubleshoot issues with cryptographic<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\">Module 4: Governance, Risk, Compliance<\/p>\n<ul dir=\"ltr\">\n<li style=\"text-align: justify;\">Given a set of requirements, apply the appropriate risk strategies<\/li>\n<li style=\"text-align: justify;\">Explain the importance of managing and mitigating vendor risk.<\/li>\n<li style=\"text-align: justify;\">Explain compliance frameworks and legal considerations, and their organizational<\/li>\n<li style=\"text-align: justify;\">Explain the importance of business continuity and disaster recovery concepts<\/li>\n<\/ul>\n","protected":false},"author":6,"featured_media":13240,"template":"","course_category":[74,38],"class_list":["post-13180","courses","type-courses","status-publish","has-post-thumbnail","hentry","course_category-compatia-en","course_category-it-en","infinite-scroll-item","no-featured-image-padding"],"acf":[],"_links":{"self":[{"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/courses\/13180","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/courses"}],"about":[{"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/types\/courses"}],"author":[{"embeddable":true,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/users\/6"}],"version-history":[{"count":13,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/courses\/13180\/revisions"}],"predecessor-version":[{"id":33988,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/courses\/13180\/revisions\/33988"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/media\/13240"}],"wp:attachment":[{"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/media?parent=13180"}],"wp:term":[{"taxonomy":"course_category","embeddable":true,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/course_category?post=13180"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}