Boost logo
Language
course | CompTIA Advanced Security Practitioner (CASP+)

We turn your development needs and aspirations into powerful digital solutions that drive growth

IT-802 | CompTIA Advanced Security Practitioner (CASP+)

Course Sector : Information Technology

Duration
Date from
Date to Course Venue Course fees Book a course
5 Days2025-04-142025-04-18Dubai$4,250 Book now
5 Days2025-07-212025-07-25Vienna$4,950 Book now
5 Days2025-11-032025-11-07Dubai$4,250 Book now

Course Introduction

This training course is designed to provide participants with the fundamental concept and knowledge on information security to apply more advanced principles and keep your organization safe from threats. Today's advanced digital world demands IT professionals and individuals with a higher demonstrable skill. This course will help participants develop the skill set needed to confidently perform the tasks as an advanced security professional. 

 

Course objective

  • Determine and choose among different types of virtualized, distributed and shared computing
  • Integrate hosts, networks, infrastructures, applications and storage into secure comprehensive solutions
  • Discuss the security implications of enterprise storage
  • Know the importance of application security
  • Conduct security activities across the technology life cycle
  • Perform relevant analysis for the purpose of securing the enterprise
  • Integrate and implement secure solutions across complex environments to support a resilient enterprise
  • Use monitoring, detection, incident response and automation to proactively support ongoing security operations in an enterprise environment
  • Apply security practices to cloud, on-premises, endpoint and mobile infrastructure, while considering cryptographic technologies and techniques
  • Consider the impact of governance, risk and compliance requirements throughout the enterprise

Course Outline | Day 01

Module 1: Security Architecture

 

  • Given a scenario, analyze the security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network.
  • Given a scenario, analyze the organizational requirements to determine the proper infrastructure security design.
  • Given a scenario, integrate software applications securely into an enterprise architecture.
  • Given a scenario, implement data security techniques for securing enterprise architecture.
  • Given a scenario, analyze the security requirements and objectives to provide the appropriate authentication and authorization controls

Course Outline | Day 02

Module 1: Security Architecture

 

  • Explain how cryptography and public key infrastructure (PKI) support security objectives and requirements
  • Explain the impact of emerging technologies on enterprise security and privacy.

 

 

Module 2: Security Operations

 

  • Given a scenario, perform threat management activities.
  • Given a scenario, analyze indicators of compromise and formulate an appropriate response
  • Given a scenario, perform vulnerability management activities.
  • Given a scenario, use the appropriate vulnerability assessment and penetration testing methods and tools.

Course Outline | Day 03

Module 2: Security Operations

 

 

  • Given a scenario, analyze vulnerabilities and recommend risk mitigations.
  • Given a scenario, use processes to reduce risk
  • Given an incident, implement the appropriate response.
  • Explain the importance of forensic concepts.
  • Given a scenario, use forensic analysis tools.

Course Outline | Day 04

Module 3: Security Engineering and Cryptography

 

  • Given a scenario, apply secure configurations to enterprise mobility.
  • Given a scenario, configure and implement endpoint security controls.
  • Explain security considerations impacting specific sectors and operational technologies.
  • Explain how cloud technology adoption impacts organizational security
  • Given a business requirement, implement the appropriate PKI solution.
  • Given a business requirement, implement the appropriate cryptographic protocols and algorithms
  • Given a scenario, troubleshoot issues with cryptographic implementations.

 

 

 

 

 

Course Outline | Day 05

  • Module 4: Governance, Risk, and Compliance
  • Given a set of requirements, apply the appropriate risk strategies
  • Explain the importance of managing and mitigating vendor risk.
  • Explain compliance frameworks and legal considerations, and their organizational impact.
  • Explain the importance of business continuity and disaster recovery concepts

 

 

 

 

 

Course Certificates
BOOST Logo

BOOST’s Professional Attendance Certificate “BPAC”

BPAC is always given to the delegates after completing the training course,and depends on their attendance of the program at a rate of no less than 80%,besides their active participation and engagement during the program sessions.

Request a Quote
Sectors

Upcoming Courses In This Sector

Follow us
facebook iconinstagram iconlinkedIn icontwitter icon
BOOST Logo

Since 2001, we have been pioneering the training field in the Middle East, helping individuals, teams, and organizations reach their full potential with integrated solutions.

left

🔗 Quick Links

Boost Abroad logoSparks logo

Sister Companies to Boost Consulting and Training

Training Image 1Training Image 2Training Image 3Training Image 4Training Image 5Training Image 6

We believe in progress for everyone.

We helped more than 10,000 clients over 20 countries on 4 continents in boosting their knowledge, skills, and careers.

Copy rights

Boost Training And Consulting All Copyrights Reserved 2025