CASP+ Certification Boot Camp Outline
Our courses are boosted with Training Camp’s exam prep methodology so your course content will always be up-to-date with the most current version of the exam. The following topics are general guidelines for the content. In order to better reflect the contents of the exam and for clarity purposes, the outline below may change at any time without notice.
Managing Risk
Identify the Importance of Risk Management
Assess Risk
Mitigate Risk
Integrate Documentation into Risk Management
Integrating Computing, Communications, and Business Disciplines
Facilitate Collaboration Across Business Units
Secure Communications and Collaboration Solutions
Implement Security Activities Throughout the Technology Life Cycle
Using Research and Analysis to Secure the Enterprise
Determine Industry Trends and Effects on the Enterprise
Analyze Scenarios to Secure the Enterprise
Integrating Advanced Authentication and Authorization Techniques
Implement Authentication and Authorization Technologies
Implement Advanced Identity Management
Implementing Cryptographic Techniques
Describe Cryptographic Concepts
Choose Cryptographic Techniques
Choose Cryptographic Implementations
Implementing Security Controls for Hosts
Select Host Hardware and Software
Harden Hosts
Virtualize Servers and Desktops
Implement Cloud Augmented Security Services
Protect Boot Loaders
Implementing Security Controls for Enterprise Storage
Identify Storage Types and Protocols
Implement Secure Storage Controls
Analyzing and Implementing Network Security
Analyze Network Security Components and Devices
Analyze Network-Enabled Devices
Analyze Advanced Network Design
Configure Controls for Network Security
Implementing Security Controls for Applications
Identify General Application Vulnerabilities
Identify Web Application Vulnerabilities
Implement Application Security Controls
Integrating Hosts, Storage, Networks, Applications in Secure Enterprise Architecture
Implement Security Standards in the Enterprise
Select Technical Deployment Models
Secure the Design of the Enterprise Infrastructure
Secure Enterprise Application Integration Enablers
Conducting Vulnerability Assessments
Select Vulnerability Assessment Methods
Select Vulnerability Assessment Tools
Responding to and Recovering from Incidents
Design Systems to Facilitate Incident Response
Conduct Incident and Emergency Responses