Information Request


Register Now


Course Number: CASP

Duration: 5 days

Instruction Method: Instructor Led classroom, Instructor Led virtual live, Group Onsite, Group virtual live

The CompTIA Advanced Security Practitioner certification is an international, vendor-neutral exam that proves competency in enterprise security; risk management; research and analysis; and integration of computing, communications, and business disciplines. 

The exam covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers. 

The CompTIA Advanced Security Practitioner (CASP) Certification is aimed at an IT security professional who has:

A minimum of 10 years experience in IT administration including at least 5 years of hands-on technical security experience. 

Secure coding standards 
Exploits resulting from improper error and exception handling 
Privilege escalation 
Improper storage of sensitive data 
Fuzzing/false injection 
Secure cookie storage and transmission 
Client-side processing vs. server-side processing 
o State management 
o JavaScript 
Buffer overflow 
Memory leaks 
Integer overflows 
Race conditions 
o Time of check 
o Time of use 
Resource exhaustion 

1.7 Given a scenario, distinguish and select the method or tool that is appropriate to conduct an assessment 

Tool type 
o Port scanners 
o Vulnerability scanners 
o Protocol analyzer 
o Switchport analyzer 
o Network enumerator 
o Password cracker 
o Fuzzer 
o HTTP interceptor 
o Attacking tools/frameworks 

o Vulnerability assessment 
o Penetration testing 
o Black box 
o White box 
o Grey Box 
o Fingerprinting 
o Code review 
o Social engineering 

2.0 Risk Management, Policy / Procedure and Legal 

2.1 Analyze the security risk implications associated with business decisions 
Risk management of new products, new technologies and user behaviors 
New or changing business models/strategies 
o Partnerships 
o Outsourcing 
o Mergers 
Internal and external influences 
o Audit findings 
o Compliance 
o Client requirements 
o Top level management 
Impact of de-perimiterization (e.g. constantly changing network boundary) 
o Considerations of enterprise standard operating environment (SOE) vs. allowing personally managed devices onto corporate networks 

2.2 Execute and implement risk mitigation strategies and controls 
Classify information types into levels of CIA based on organization/industry 
Determine aggregate score of CIA 
Determine minimum required security controls based on aggregate score 
Conduct system specific risk analysis 
Make risk determination 
o Magnitude of impact 
o Likelihood of threat 

Decide which security controls should be applied based on minimum requirements 
o Avoid 
o Transfer 
o Mitigate 
o Accept 
Implement controls 
ESA frameworks 
Continuous monitoring

2.3 Explain the importance of preparing for and supporting the incident response and recovery process 
o Electronic inventory and asset control 
o Data retention policies 
o Data recovery and storage 
o Data ownership 
o Data handling 

Data breach 
o Recovery 
o Minimization 
o Mitigation and response 

System design to facilitate incident response taking into account types of violations 
o Internal and external 
o Privacy policy violations 
o Criminal actions 
o Establish and review system event and security logs Incident and emergency response 

2.4 Implement security and privacy policies and procedures based on organizational requirements. 

Policy development and updates in light of new business, technology and environment changes Process/procedure development and updated in light of policy, environment and business changes Support legal compliance and advocacy by partnering with HR, legal, management and other entities Use common business documents to support security 
o Interconnection Security Agreement (ISA) 
o Memorandum of Understanding (MOU) 
o Service Level Agreement (SLA) 
o Operating Level Agreement (OLA) 
o Non-Disclosure Agreement (NDA) 
o Business Partnership Agreement (BPA) 

Use general privacy principles for PII / Sensitive PII Support the development of policies that contain 
o Separation of duties 
o Job rotation 
o Mandatory vacation 
o Least privilege 
o Incident response 
o Forensic tasks 
o On-going security 
o Training and awareness for users 
o Auditing requirements and frequency 

3.0 Research and Analysis 
3.1 Analyze industry trends and outline potential impact to the enterprise 
Perform on-going research 
o Best practices 
o New technologies 
o New security systems and services 
o Technology evolution (e.g. RFCs, ISO) 

Situational awareness 
o Latest client-side attacks
o Threats 
o Counter zero day 
o Emergent issues 
Research security implications of new business tools 
o Social media/networking 
o Integration within the business (e.g. advising on the placement of company material for the general public) 
Global IA industry/community 
o Conventions 
o Attackers 
o Emerging threat sources 
 Research security requirements for contracts 
o Request for Proposal (RFP) 
o Request for Quote (RFQ) 
o Request for Information (RFI) 
o Agreements 

3.2 Carry out relevant analysis for the purpose of securing the enterprise 
Prototype and test multiple solutions 
Cost benefit analysis (ROI, TCO) 
Analyze and interpret trend data to anticipate cyber defense aids 
Review effectiveness of existing security 
Reverse engineer / deconstruct existing solutions 
Analyze security solutions to ensure they meet business needs 
o Specify the performance 
o Latency 
o Scalability 
o Capability 
o Usability 
o Maintainability
o Availability (MTTR, MTBF) 
Conduct a lessons-learned / after-action review 
Use judgment to solve difficult problems that do not have a best solution 
Conduct network traffic analysis 

4.0 Integration of Computing, Communications and Business Disciplines 
4.1 Integrate enterprise disciplines to achieve secure solutions 
Interpreting security requirements and goals to communicate with other disciplines 
o Programmers 
o Network engineers
o Sales staff 

Provide guidance and recommendations to staff and senior management on security processes and controls 
Establish effective collaboration within teams to implement secure solutions 
o Programmer 
o Database administrator 
o Network administrator 
o Management 
o Stake holders 
o Financial 
o HR 
o Emergency response team 
o Facilities manager 
o Physical security manager 

4.2 Explain the security impact of inter-organizational change 
Security concerns of interconnecting multiple industries o Rules, policies and regulations 
Design considerations during mergers, acquisitions and de-mergers 
Assuring third party products – only introduce acceptable risk 
o Custom developed
Network secure segmentation and delegation 
Integration of products and services 

4.3 Select and distinguish the appropriate security controls with regard to communications and collaboration 
Unified communication security 
o Web conferencing 
o Video conferencing 
o Instant messaging 
o Desktop sharing 
o Remote assistance 
o Presence 
o Email 
o Telephony 
VoIP security 
VoIP implementation 
Remote access 
Enterprise configuration management of mobile devices 
Secure external communications 
Secure implementation of collaboration platforms 
Prioritizing traffic (QoS) 
Mobile devices 
o Smart phones, IP cameras, laptops, IP based devices 

4.4 Explain advanced authentication tools, techniques and concepts 
Federated identity management (SAML) 
Single sign on 
Certificate based authentication 

4.5 Carry out security activities across the technology life cycle 
End to end solution ownership 
Understanding results of solutions in advance 
o Operational activities 
o Maintenance 
o Decommissioning
o General change management 
Systems Development Life Cycle 
o Security System Development Life Cycle (SSDLC) / Security Development Life Cycle (SDL
) o Security Requirements Traceability Matrix (SRTM) 
Adapt solutions to address emerging threats and security trends 
Validate system designs

Certification Information

The CASP exam covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers, while managing risk.

While there is no required prerequisite, the CASP certification is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus at the enterprise level.

Test Details
Exam Code CAS-002
Number of Questions 80 (Maximum)
Type of questions Multiple choice and performance-based
Length of Test 165 minutes
Passing score Pass/Fail only. No scaled score.
Recommended experience 10 years experience in IT administration, including at least 5 years of hands-on technical security experience
Languages English


To Request Schedules and Additional Course Details send an email to or call 1-630-684-0355.


CompTIA Test Vouchers: Receive 10% on the CompTIA Test vouchers with our partner discount code “Certfirst2014″


Five Different Delivery Options:



For more information on how CertFirst can assist you please Contact Us

Payment Policy | Terms & Conditions

Close [X]