COURSE OVERVIEW
CASP+ is an advanced-level cybersecurity certification covering technical skills in security architecture and senior security engineering in traditional, cloud, and hybrid environments, governance, risk, and compliance skills, assessing an enterprise’s cybersecurity readiness, and leading technical teams to implement enterprise-wide cybersecurity solutions. Successful candidates will have the knowledge required to: • Architect, engineer, integrate, and implement secure solutions across complex environments to support a resilient enterprise • Use monitoring, detection, incident response, and automation to proactively support ongoing security operations in an enterprise environment • Apply security practices to cloud, on-premises, endpoint, and mobile infrastructure, while considering cryptographic technologies and techniques • Consider the impact of governance, risk, and compliance requirements throughout the enterprise
INTEGRATED LEARNING PRODUCTS CERTMASTER LEARN & CERTMASTER LABS
Purchase CASP+ Here Learners experience both knowledge acquisition and hands-on skills attainment through a single login and seamless workflow.
BUY NOW (US) Additionally, organizations who purchase the integrated course will be able to review student and group lab scores in the CertMaster Learn Boost Dashboard and hold students accountable for lab work.
BUY NOW (OTHER COUNTRIES)
Student Guide Lesson Overview
1
Performing Risk Management Activities
2
Summarizing Governance & Compliance Strategies
3
Implementing Business Continuity & Disaster Recovery
Identifying Infrastructure Services
4
Performing Software Integration
5
Explain Virtualization, Cloud and Emerging Technology
6
Exploring Secure Configurations and System Hardening
7
Weylin Piegorsh COMPUTER SCIENCES CORPORATION “
Understanding Security Considerations of Cloud and Specialized Platforms Implementing Cryptography
8
9
CASP+ occupies a strongly-needed niche. I feel that it’s one of the most important certifications that I hold.
10
Implementing Public Key Infrastructure (PKI)
Understanding Threat and Vulnerability Management Activities
11
Developing Incident Response Capabilities
12
VIEW TABLE OF CONTENTS
Powered by FlippingBook