• Home
  • Course Catalog
  • Contact Us

    Certified Advanced Security Practitioner with Labs

    0 Students Enrolled
    0 Students Enrolled

    Additional information

    Hours: 595
    Duration: 12 months

    Language: English

    Data sheet

    Certification included

    To request more information, you can contact us via online chat, our website contact form, or toll free at 1-855-201-6910.

    Online courses are accessible 24/7/365 and self-paced, allowing you to progress at your own pace on your own schedule. They can be taken from anywhere in the world from the comfort of your own home. Classroom courses have a set schedule of the days and times the courses will be held, and you must attend during those specific times.

    Find out if online learning is right for you by contacting our team of registration advisers. Our team is available to answer any of your questions about taking an online course before you commit to enrolling. We will walk you through what to expect to ensure you are making the right decision. You can contact a registration adviser today via online chat, our website contact form, or toll free at 1-855-201-6910.

    No, you are not required to have a diploma or higher education degree to enroll in an online course. However, some occupations may require minimum educational thresholds for employment or certification. For more information on your desired career requirements, please contact us via online chat, our website contact form, or toll free at 1-855-201-6910.

    To take an online course, you will need to have access to an internet connection and an internet ready device such as a laptop, PC, or tablet. For course specific requirements, please visit the course page or contact a registration adviser today.

    Our courses are developed with multiple formats including text, audio, video, and interactivity. Our courses also include multiple resources and tools which can include flashcards, games, activities, and more.

    No, you can take the online courses from anywhere in the world.

    We participate in several financial assistance options including third party funding, both military and non-military. To request more information on the financial assistance options available and check your eligibility, contact us via online chat, our website contact form, or toll free at 1-855-201-6910.

    Duration is the amount of time you will receive access to your course. Durations vary by course and range between 1 month and 12 months. If you complete your course before your duration ends you will continue to have access to your course until the duration period ends.

    Many of our career training programs include certification vouchers. This means that at the successful completion of your course, at no additional charge, you will receive an exam voucher for the corresponding industry certification. This voucher will allow you to register and sit for the appropriate certification exam to obtain your industry credential.

    Our online courses are open enrollment, so you can start immediately. If you are using any third-party funding to cover your course tuition, your start date may be a future date determined by your funding program.

    Once enrolled, you will be assigned a client adviser who will provide you with customer and technical support. Your client adviser will supply you with your course access information, any needed materials, and be available to answer any questions you have during your training experience. They will regularly check-in with you to monitor your progress and assist you with staying on track. You will also be assigned to a course mentor who will provide curriculum support throughout your training. Your mentor is available to answer any questions you have on your course curriculum, will monitor your progress and understanding of the curriculum, and may give assignments or quizzes.

    If you experience any trouble accessing your course including technical issues or lost login credentials, please contact your client adviser at helpdesk@worldeducation.net.

    We strive to provide a fully online experience for students however some of our training courses include physical materials or equipment. Courses that have materials shipped directly to students will be shipped within 7 business days of registration. Some training courses have material for different sections and these courses may require multiple shipments as you completed stages of your course.

    Our goal for students is to successfully complete their training course and achieve their career goals. We understand that extenuating circumstances can interfere with your ability to complete your course in the duration given. Because of this we have free or low-cost extensions available for our courses upon request. To discuss or request an extension please contact your client adviser at helpdesk@worldeducation.net.

    Upon successful completion of your course and fulfillment of any outstanding financial obligations, you will receive your certificate of completion. Certificates are provided to you within 30 days of completion. Your certificate will validate the training course you completed with a stamp of completion.

    Students that successfully complete our career training programs are assigned a career development adviser who will coordinate placement at a local externship or hands on opportunity. These opportunities are optional and may vary based on availability and occupation. Your career development adviser will also provide job search services such as: resume building, mock interviews, job opportunity resources, and more. Our professional enrichment courses do not come with a career adviser or career services.

    Program Description

    This multimedia-rich program is designed forIT professionals who are looking for cybersecurity certificate programs online.Therefore, they must have ten or more years of professional experience in IT administration. They must also have five or more years of professional hands-on technical security experience. This program is, thus, designed for IT professionals who want to become a CompTIA Advanced Security Practitioner (CASP). CASP certifies critical judgment and thinking across a particularly broad spectrum of disciplines pertaining to security.It also requires its candidates to be able to implement practical solutions in various complex environments. This interactive program will teach you how to conceptualize, design, and implementpractical solutions across various complex enterprise environments. Thus, in this program, you will learn: • Risk management and mitigation • Network security and protocols • Policies,planning, and procedures • Data flow and ACLs • Advanced cryptography • Advanced network configuration • Incident response and recovery • Cloud security and remote access controls The course also provides you an exam voucher for the CompTIA CASP Exam. In addition to that, you’ll have access to 3 Practice Labs. These Practice Labs will cover topics that are included in the CompTIA CASP exam by using real CompTIA equipment. Therefore, it will provide you with a hands-on learning experience that will ready you for the professional landscape.

    Learning Objectives

    Upon completion of this course, the student will have learned proficiency in: • Risk management and mitigation • Policies, procedures, and planning • Network security and protocols • Data flow and ACLs • Advanced network configuration • Advanced cryptography • Cloud security and remote access controls • Incident response and recovery


    Chapter 01 - Understanding Risk Management Lesson A: Understanding Business and Industry Influences • Ongoing Risk Management • New Products and User Behaviors • Business Models and Strategies • Cloud Technologies • Acquisitions and Mergers • Due Diligence Team • Data Ownership • Data Reclassification • Integrating Diverse Industries • Common Regulations • Geographic Differences • Data Sovereignty • Internal and External Influences • De-perimeterization • Understand Changes in Network Boundaries Lesson B: Policies and Procedures • Understanding Policies and Procedures • Policy Life Cycle • Process Life Cycle • Reviewing Policies and Processes • Common Business Documents • Security for Contracts • Contract Requirements • General Privacy Principles • Standard Security Practices • Demo - Examining Security Policies Lesson C: Risk Mitigation and Control • Introduction to Risk Mitigation • Categorizing Data • Incorporating Stakeholder Input • Aggregate CIA Scores • Selecting and Implementing Controls • Security Control Frameworks • Options for Frameworks • Extreme Scenario Planning • System-Specific Risk Analysis • Qualitative Risk Analysis • Quantitative Risk Analysis • Risk Impact • Likelihood of Threat • Return on Investment • Understanding Payback • Total Cost of Ownership • TCO Guidelines • Translate to Business Terms • Risk Management Strategies • Risk Management Processes • Information and Asset Value and Costs • Vulnerabilities and Threat Identification • Additional Factors Lesson D: Business Continuity Planning • Continuity Planning • BCP Components • BCP Steps • Additional Plans • Conducting Business Impact Analysis • Chapter 01 Review Chapter 02 - Network and Security Components and Architecture Lesson A: Physical and Virtual Network • Security Devices • Unified Threat Management • Analyzing UTM • Intrusion Detection and Prevention • In-Line Network Encryptor • Network Access Control • SIEM • Firewalls • Firewall Architecture • Wireless Controller • Routers and Switches • Proxy Servers Lesson B: Application and Protocol Level Security • Web Application Firewalls • Hardware Security Modules • Vulnerability Scanners Lesson C: Advanced Network Design • Virtual Private Networks • VPN Protocols • IP Security (IPSec) • IPSec Modes • Demo - Examining IPSec Policies • Secure Sockets Layer (SSL) • Transport Layer Security (TLS) • Additional Security Protocols • Authentication Protocols Lesson D: Network Solutions for Data Flow • Data Loss Prevention • Data Flow Enforcement • Network Flow Lesson E: Secure Baselines of Networking and Security Components • Securing Device Configurations • Access Control Lists (ACLs) • ACL Rule Sets • Change Monitoring • Configuration Lockdown • Availability Controls • Disk Availability • Key Availability Terms Lesson F: Advanced Configuration of Network Devices • Additional Configurations • Transport Security • Trunking Security • Port Security • Ports and Sockets • Security Zones • Network Segmentation • Network Access Control • NAC Concepts • Network Enabled Devices • Automation Systems • Physical Security • Chapter 02 Review Chapter 03 - Implementing Advanced Authentication and Cryptographic Techniques Lesson A: Understanding Authentication and Authorization Concepts • Authentication • The Importance of Identity • Additional Password Options • Demo - Enforcing Strong Passwords • Biometric Authentication • Biometric Considerations • Beyond Single Factor • Certificate Authentication • Authorization • Open Authorization • XACML • SPML • Authorization Concepts • Trust Models Lesson B: Cryptographic Techniques • Introduction to Cryptography • Cryptographic Techniques • Key Stretching • Hashing • Message Digest (MD) Algorithms • Secure Hash Algorithm (SHA) • Digital Signatures • Message Authentication • Code Signing • Additional Concepts • Protecting Data in Transit • Protecting Data in Memory • Protecting Data at Rest • Symmetric Algorithms • Asymmetric Algorithms • Encryption Methods Lesson C: Cryptographic Implementations • Crypto Options • Additional Crypto Options • Cryptographic Applications • Crypto Considerations • Stream vs. Block Ciphers • Block Cipher Modes • Public Key Infrastructure • Primary PKI Functions • Additional PKI Concepts • Chapter 03 Review Chapter 04 - Implementing Security for Systems, Applications, and Storage Lesson A: Security for Host Devices • Trusted OS • Trusted OS Options • Security Software • Additional Host-Based Software Options • Demo - Configuring a Host-Based Firewall • Auditing • Demo - Configuring Audit Policies • Endpoint Detection Response • Host Hardening • Group Policy • Demo - Configuring Group Policy Security • Command Shell Restrictions • Out-of-Band Management • Dedicated Interfaces • External I/O Restrictions • Wireless Technologies • Wi-Fi Components • 802.11 Standards • Wireless Security • Securing Other Host Devices • Boot Security • Additional Boot Security Options Lesson B: Mobile Device Security • Enterprise Mobility Management • MDM Concepts • Management Options • Context Aware Management • Security and Privacy • Physical Security Options • Additional Mobile Device Concepts • Authentication Options • Mobile Devices • Wearable Security Implications Lesson C: Software Security Controls • Application Security Design Considerations • Application Issues • Data Remnants • Securing Applications • Using JSON and REST • Browser Extensions • Application Vulnerabilities • Chapter 04 Review Chapter 05 - Implementing Security for Cloud and Virtualization Technologies Lesson A: Cloud and Virtualization Technology • Cloud Computing and Virtualization • Cloud Options • Security Considerations • Cloud Service Models • Demo - Examining Cloud Service Models • Security and Virtualization • Cloud-Augmented Security Services • Security as a Service • Virtualization Vulnerabilities Lesson B: Securing Remote Access and Collaboration • Remote Access • Dial-Up Access • Virtual Private Networks • Remote Access Purposes • Security Considerations • Unified Collaboration Tools • Web Conferencing • Video Conferencing • Storage and Document Collaboration • Unified Communication • Instant Messaging • Presence • E-Mail • Chapter 05 Review Chapter 06 - Utilizing Security Assessments and Incident Response Lesson A: Security Assessments • Importance of Security Assessments • Malware Sandboxing • Memory Dumping • Runtime Debugging • Reconnaissance • Fingerprinting • Code Review • Social Engineering • Public Information • Demo - Accessing Public Information • Penetration Test • Vulnerability Assessment • Assessment Styles Lesson B: Security Assessment Tools • Network Tool Types • Security Content Automation Protocol (SCAP) • Common Vulnerability Scoring System (CVSS) • Fuzzing • Exploit Kits • Host Tools • Additional Host Tools • Physical Security Tools Lesson C: Incident Response and Recovery • E-discovery • Data Breach • Incident Response Process • Chapter 06 Review • Course Closure



    There are no prerequisites, but at least a familiarity with the internet and with basic security concepts is recommended.


    Technical Requirements

    All required reference materials are provided with this program. Technical requirements: Internet Connection • Broadband or High-Speed (DSL, Cable, Wireless) Hardware Requirements • Processor - 2GHz Processor or Higher • Memory - 1 GB RAM Minimum Recommended Software Requirements • Operating Systems - Windows 7, 8 or 10; Mac OS x 10 or higher • Internet Browsers - Google Chrome is highly recommended • Cookies MUST be enabled • Pop-ups MUST be allowed (Pop-up Blocker disabled)


    CASP covers enterprise security, risk management and incident response, research and analysis, integration of computing, communications and business disciplines as well as technical integration of enterprise components. Each state may have additional licensing requirements, be sure to research your states requirements for employment by visiting your states occupation board.


    • 100% Online, Self-Paced • Open Enrollment • Admissions and Student Support • Multimedia Rich and Interactive Content • Industry Certification Exam, when applicable • Hands-on Opportunity Upon Completion

    Career Services

    Students that successfully complete our career training are given a full years access to our modern day career services. With our career services, students are provided a multitude of career development tools to help launch their career quickly and successfully. These tools include:

    • Certification Exam Voucher and Registration Assistance (If Applicable)
    • Resume Building Assistance
    • Externship or Shadowing Placement
    • Career Coaching
    • Employer Skills Matching
    • And More!

    We are dedicated to serving our students on their unique career development journey. Whether you are transitioning to a new career, entering the workforce for the first time, or an experienced professional looking to climb the corporate ladder, our career services team can provide you with professional development tools applicable for any stage of your career.

    Write your review

    The following email wasn't used for buying this product