Course Description
In this course, students will examine advanced security concepts, principles, and implementations that pertain to enterprise-level security.
This course is targeted toward an IT Professional that has the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. Students should have a minimum of 10 years of experience including at least 5 years of hands-on technical security experience.
Program Objectives
In this course, you will analyze and apply advanced security concepts, principles, and implementations that contribute to enterprise-level security.
You will:
- Support IT governance in the enterprise with an emphasis on managing risk.
- Leverage collaboration tools and technology to support enterprise security.
- Use research and analysis to secure the enterprise.
- Integrate advanced authentication and authorization techniques.
- Implement cryptographic techniques, security controls for hosts and mobile devices, network security, and security in the systems and software development lifecycle.
- Integrate hosts, storage, networks, applications, virtual environments, and cloud technologies in secure enterprise architecture.
- Conduct security assessments; responding to and recovering from security incidents.
Prerequisites
- CompTIA A+
- HS Diploma/GED
Exam Details
Number of Questions: 90 questions
Type of Questions: Multiple-choice and performance-based
Length of Test: 165 Minutes
Passing Score: 655 (on a scale of 100-900)
Recommended Experience
A minimum of ten years of general hands-on IT experience, with at least five years of broad hands-on security experience.
Course Features
- Lectures 57
- Quizzes 0
- Duration 19 hours
- Skill level All levels
- Language English
- Students 382
- Certificate Yes
- Assessments Yes
Curriculum
- 4 Sections
- 57 Lessons
- 365 Days
- Domain 1 - Security Architecture17
- 1.1Analyze the security requirements and objectives to provide the appropriate authentication and authorization controls – Part 127 Minutes
- 1.2Analyze the security requirements and objectives to provide the appropriate authentication and authorization controls – Part 262 Minutes
- 1.3Explain the impact of emerging technologies on enterprise security and privacy.51 Minutes
- 1.4Analyze the security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network – Part 343 Minutes
- 1.5Analyze the security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network – Part 426 Minutes
- 1.6Analyze the security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network – Part 537 Minutes
- 1.7CASP+ 004 Introductions35 Minutes
- 1.8Analyze the security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network – Part 628 Minutes
- 1.9Analyze the organizational requirements to determine the proper infrastructure security design.41 Minutes
- 1.10Analyze the security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network – Part 174 Minutes
- 1.11Analyze the security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network – Part 223 Minutes
- 1.12Integrate software applications securely into an enterprise architecture – Part 155 Minutes
- 1.13Integrate software applications securely into an enterprise architecture – Part 271 Minutes
- 1.14Implement data security techniques for securing enterprise architecture.60 Minutes
- 1.15Given a set of requirements, implement secure cloud and virtualization solutions – Part 151 Minutes
- 1.16Given a set of requirements, implement secure cloud and virtualization solutions -Part 224 Minutes
- 1.17Explain how cryptography and public key infrastructure (PKI) support security objectives and requirements40 Minutes
- Domain 2 - Security Operations15
- 2.1Given a scenario, perform threat management activities.71 Minutes
- 2.2Given a scenario, use processes to reduce risk.48 Minutes
- 2.3Explain the importance of forensic concepts.41 Minutes
- 2.4Given a scenario, use forensic analysis tools – Part 136 Minutes
- 2.5Given a scenario, analyze indicators of compromise and formulate an appropriate response.60 Minutes
- 2.6Given a scenario, perform vulnerability management activities.42 Minutes
- 2.7Given a scenario, use the appropriate vulnerability assessment and penetration testing methods and tools.60 Minutes
- 2.8Given a scenario, analyze vulnerabilities and recommend risk mitigations – Part 155 Minutes
- 2.9Given a scenario, analyze vulnerabilities and recommend risk mitigations – Part 232 Minutes
- 2.10Given a scenario, analyze vulnerabilities and recommend risk mitigations – Part 344 Minutes
- 2.11Given a scenario, use forensic analysis tools – Part 221 Minutes
- 2.12Given an incident, implement the appropriate response – Part 131 Minutes
- 2.13Given an incident, implement the appropriate response – Part 211 Minutes
- 2.14Given a scenario, use forensic analysis tools – Part 3
- 2.15Given a scenario, use forensic analysis tools – Part 4
- Domain 3 - Security Engineering and Cryptography16
- 3.1Given a scenario, apply secure configurations to enterprise mobility – Part 145 Minutes
- 3.2Given a scenario, configure and implement endpoint security controls – Part 131 Minutes
- 3.3Given a scenario, apply secure configurations to enterprise mobility – Part 216 Minutes
- 3.4Given a scenario, apply secure configurations to enterprise mobility – Part 334 Minutes
- 3.5Given a scenario, configure and implement endpoint security controls – Part 233 Minutes
- 3.6Given a scenario, configure and implement endpoint security controls – Part 331 Minutes
- 3.7Given a scenario, configure and implement endpoint security controls – Part 415 Minutes
- 3.8Explain security considerations impacting specific sectors and operational technologies – Part 116 Minutes
- 3.9Explain security considerations impacting specific sectors and operational technologies – Part 228 Minutes
- 3.10Explain security considerations impacting specific sectors and operational technologies – Part 346 Minutes
- 3.11Explain how cloud technology adoption impacts organizational security – Part 141 Minutes
- 3.12Explain how cloud technology adoption impacts organizational security – Part 214 Minutes
- 3.13Given a business requirement, implement the appropriate PKI solution – Part 148 Minutes
- 3.14Given a business requirement, implement the appropriate PKI solution – Part 217 Minutes
- 3.15Given a scenario, troubleshoot issues with cryptographic implementations36 Minutes
- 3.16Given a business requirement, implement the appropriate cryptographic protocols and algorithms64 Minutes
- Domain 4 - Governance, Risk, and Compliance9
- 4.1Given a set of requirements, apply the appropriate risk strategies – Part 153 Minutes
- 4.2Given a set of requirements, apply the appropriate risk strategies – Part 220 Minutes
- 4.3Given a set of requirements, apply the appropriate risk strategies – Part 349 Minutes
- 4.4Given a set of requirements, apply the appropriate risk strategies – Part 422 Minutes
- 4.5Explain the importance of managing and mitigating vendor risk41 Minutes
- 4.6Explain compliance frameworks and legal considerations, and their organizational impact – Part 138 Minutes
- 4.7Explain compliance frameworks and legal considerations, and their organizational impact – Part 261 Minutes
- 4.8Explain the importance of business continuity and disaster recovery concepts – Part 156 Minutes
- 4.9Explain the importance of business continuity and disaster recovery concepts – Part 248 Minutes