Edit Content

 Master Advanced Cybersecurity with CASP+

Get real-world skills in enterprise security, incident response, and risk management.

Course Overview

CompTIA® Advanced Security Practitioner (CASP+ CAS-004) CertPrep Course

 This course is designed to give you a solid foundation in cloud development using Microsoft Azure. You’ll start by learning how to create and manage virtual machines, deploy web applications using Azure App Services, and build serverless functions with Azure Functions. Next, you’ll explore how to develop solutions using Cosmos DB and Blob Storage, implement advanced security practices, and optimize performance through caching and monitoring tools. Perfect for both beginners and experienced developers, this course covers all the essentials needed to confidently build, deploy, and secure cloud-based applications using Azure.

What you'll learn

By the end of this course, participants will:
  • Analyze and apply advanced security solutions in enterprise environments
  • Integrate cloud and virtualization technologies in secure deployments
  • Respond to and manage advanced cybersecurity incidents
  • Implement risk management strategies aligned with business goals
  • Prepare thoroughly for the CASP+ CAS-004 certification exam

Course Details

Course Outline

Part I: Security Architecture
  • Introduction
  • Services
  • Segmentation
  • De-perimeterization/Zero Trust
  • Merging of Networks from Various Organizations
  • Software-Defined Networking (SDN)
  • Exam Preparation Tasks (10 Questions)
  • Introduction
  • Scalability
  • Resiliency
  • Automation
  • Performance
  • Containerization
  • Virtualization
  • Content Delivery Network
  • Caching
  • Exam Preparation Tasks (10 Questions)
  • Introduction
  • Baseline and Templates
  • Software Assurance
  • Considerations of Integrating Enterprise Applications
  • Integrating Security into Development Life Cycle
  • Exam Preparation Tasks (10 Questions)
  • Introduction
  • Data Loss Prevention
  • Data Loss Detection
  • Data Classification, Labeling, and Tagging
  • Obfuscation
  • Anonymization
  • Encrypted vs. Unencrypted
  • Data Life Cycle
  • Data Inventory and Mapping
  • Data Integrity Management
  • Data Storage, Backup, and Recovery
  • Exam Preparation Tasks (10 Questions)
  • Labs
  • Introduction
  • Credential Management
  • Password Policies
  • Federation
  • Access Control
  • Protocols
  • Multifactor Authentication (MFA)
  • One-Time Password (OTP)
  • Hardware Root of Trust
  • Single Sign-On (SSO)
  • JavaScript Object Notation (JSON) Web Token (JWT)
  • Attestation and Identity Proofing
  • Exam Preparation Tasks (10 Questions)
  • Introduction
  • Virtualization Strategies
  • Provisioning and Deprovisioning
  • Middleware
  • Metadata and Tags
  • Deployment Models and Considerations
  • Hosting Models
  • Service Models
  • Cloud Provider Limitations
  • Extending Appropriate On-premises Controls
  • Storage Models
  • Exam Preparation Tasks (10 Questions)
  • Labs
  • Introduction
  • Privacy and Confidentiality Requirements
  • Integrity Requirements
  • Non-repudiation
  • Compliance and Policy Requirements
  • Common Cryptography Use Cases
  • Common PKI Use Cases
  • Exam Preparation Tasks: 10 Questions
  • Labs
Part II: Security Operations
  • Introduction
  • Intelligence Types
  • Actor Types
  • Threat Actor Properties
  • Intelligence Collection Methods
  • Frameworks
  • Exam Preparation Tasks: 10 Questions
  • Labs
  • Introduction
  • Indicators of Compromise
  • Response
  • Exam Preparation Tasks: 10 Questions
  • Labs
  • Vulnerability Scans
  • Security Content Automation Protocol (SCAP)
  • Self-assessment vs. Third-Party Vendor Assessment
  • Patch Management
  • Information Sources
  • Exam Preparation Tasks: 10 Questions
  • Labs
  • Introduction
  • Methods
  • Tools
  • Dependency Management
  • Requirements
  • Exam Preparation Tasks: 10 Questions
  • Labs
  •  Introduction
  • Vulnerabilities
  • Inherently Vulnerable System/Application
  • Attacks
  • Exam Preparation Tasks: 10 Questions
  •  Introduction
  • Proactive and Detection
  • Security Data Analytics
  • Preventive
  • Application Control
  • Security Automation
  • Physical Security
  • Exam Preparation Tasks: 10 Questions
  • Introduction
  • Event Classifications
  • Triage Event
  • Pre-escalation Tasks
  • Incident Response Process
  • Specific Response Playbooks/Processes
  • Communication Plan
  • Stakeholder Management
  • Exam Preparation Tasks: 10 Questions
  • Labs
  • Section: Introduction
  • Legal vs. Internal Corporate Purposes
  • Forensic Process
  • Integrity Preservation
  • Cryptanalysis
  • Steganalysis
  • Exam Preparation Tasks: 10 Questions
  • Labs
  • Introduction
  • File Carving Tools
  • Binary Analysis Tools
  • Analysis Tools
  • Imaging Tools
  • Hashing Utilities
  • Live Collection vs. Post-mortem Tools
  • Exam Preparation Tasks: 10 Questions
  • Introduction
  • File Carving Tools
  • Binary Analysis Tools
  • Analysis Tools
  • Imaging Tools
  • Hashing Utilities
  • Live Collection vs. Post-mortem Tools
  • Exam Preparation Tasks: 10 Questions
Part III: Security Engineering and Cryptography
  • Introduction
  • Managed Configurations
  • Deployment Scenarios
  • Exam Preparation Tasks: 10 Questions
  • Labs
  • Introduction
  • Hardening Techniques
  • Processes
  • Mandatory Access Control
  • Trustworthy Computing
  • Compensating Controls
  • Exam Preparation Tasks: 10 Questions
  • Introduction
  • Embedded
  • ICS/Supervisory Control and Data Acquisition (SCADA)
  • Protocols
  • Sectors
  • Exam Preparation Tasks: 10 Questions
  • Introduction
  • Automation and Orchestration
  • Encryption Configuration
  • Logs
  • Monitoring Configurations
  • Key Ownership and Location
  • Key Life-Cycle Management
  • Backup and Recovery Methods
  • Infrastructure vs. Serverless Computing
  • Application Virtualization
  • Software-Defined Networking
  • Misconfigurations
  • Collaboration Tools
  • Storage Configurations
  • Cloud Access Security Broker (CASB)
  • Exam Preparation Tasks: 10 Questions
  • Labs
  • Introduction
  • PKI Hierarchy
  • Certificate Types
  • Certificate Usages/Profiles/Templates
  • Extensions
  • Trusted Providers
  • Trust Model
  • Cross-certification
  • Configure Profiles
  • Life-Cycle Management
  • Public and Private Keys
  • Digital Signature
  • Certificate Pinning
  • Certificate Stapling
  • Certificate Signing Requests (CSRs)
  • Online Certificate Status Protocol (OCSP) vs. Certificate Revocation List (CRL)
  • HTTP Strict Transport Security (HSTS)
  • Exam Preparation Tasks: 10 Questions
  • Labs
  • Introduction
  • Hashing
  • Symmetric Algorithms
  • Asymmetric Algorithms
  • Protocols
  • Elliptic-Curve Cryptography
  • Forward Secrecy
  • Authenticated Encryption with Associated Data
  • Key Stretching
  • Exam Preparation Tasks: 10 Questions
  • Labs
  • Introduction
  • Implementation and Configuration Issues
  • Keys
  • Exam Preparation Tasks: 10 Questions
Part IV: Governance, Risk, and Compliance
  • Introduction
  • Risk Assessment
  • Risk Handling Techniques
  • Risk Types
  • Risk Management Life Cycle
  • Risk Tracking
  • Risk Appetite vs. Risk Tolerance
  • Policies and Security Practices
  • Exam Preparation Tasks: 10 Question
  • Introduction
  • Shared Responsibility Model (Roles/Responsibilities)
  • Vendor Lock-in and Vendor Lock-out
  • Vendor Viability
  • Meeting Client Requirements
  • Support Availability
  • Geographical Considerations
  • Supply Chain Visibility
  • Incident Reporting Requirements
  • Source Code Escrows
  • Ongoing Vendor Assessment Tools
  • Third-Party Dependencies
  • Technical Considerations
  • Exam Preparation Tasks: 10 Questions
  • Introduction
  • Security Concerns of Integrating Diverse Industries
  • Data Considerations
  • Geographic Considerations
  • Third-Party Attestation of Compliance
  • Regulations, Accreditations, and Standards
  • Legal Considerations
  • Contract and Agreement Types
  • Exam Preparation Tasks: 10 Questions
  • Introduction
  • Business Impact Analysis
  • Privacy Impact Assessment
  • Disaster Recovery Plan (DRP)/Business Continuity Plan (BCP)
  • Incident Response Plan
  • Testing Plans
  • Exam Preparation Tasks (10 Questions)
  • Labs

CompTIA®AdvancedSecurity Practitioner(CASP+) CAS-004 Practice Test

Scheduling and Information

  • Assessment Type: Practice tests, quizzes, and interactive knowledge checks
  • Certification: Completion badge for prep class (not the official CompTIA certification)
By enrolling in this course, participants will;
  • Advanced content tailored for experienced IT security professionals
  • Self-paced videos and guided practice tasks
  • Hands-on labs that simulate real-world security challenges
  • In-depth coverage of CASP+ domains
  • Ideal for professionals aiming to move into enterprise-level security roles
  • Completion badge to showcase your readiness
Course Features
Why Enroll at Speedlink?

Your Path to Tech Success Begins at Speedlink

Join thousands of students in United States and beyond who trust us to gain real-world tech skills, industry-recognized certifications, and career-boosting expertise. Whether you’re starting out or leveling up, our hands-on training, expert instructors, and job-ready curriculum will get you there faster.

Course Enquiry

Want to know more about this course? Fill out the form below, and we’ll get back to you with all the info you need — pricing, certification, how to join, or anything else you’re curious about.

Shopping Cart
Scroll to Top