top of page
Business Presentation

Official CompTIA learning resources for Instructor-Led Training are designed with the instructor in mind, providing insights and tools for successfully training learners pursuing their CompTIA CASP+ certification.

Duration : 5 Days


Course Overview


CASP+ is an advanced-level cybersecurity certification covering technical skills in security architecture andsenior security engineering in traditional, cloud, and hybrid environments, governance, risk, and compliance skills, assessing an enterprises cybersecurity readiness, and leading technical teams to implement enterprise-wide cybersecurity solutions..

Successful candidates will have the knowledge required to:
• Architect, engineer, integrate, and implement secure solutions across complex environments to support a resilient enterprise.
• Use monitoring, detection, incident response, and automation to proactively support ongoing security operations in an enterprise environment.
• Apply security practices to cloud, on-premises, endpoint, and mobile infrastructure, while considering cryptographic technologies and techniques.
• Consider the impact of governance, risk, and compliance requirements throughout the enterprise.

The CASP+ exam covers four major domains:
• Security Architecture (29%)
• Security Operations (30%)
• Security Engineering and Cryptography (26%)
• Governance, Risk and Compliance (15%)


Lesson 1: Perform Risk Management Activities
Topic 1A: Explain Risk Assessment Methods
Topic 1B: Summarize the Risk Lifecycle
Topic 1C: Assess & Mitigate Vendor Risk

Lesson 2: Summarizing Governance & Compliance Strategies
Topic 2A: Identifying Critical Data Assets
Topic 2B: Compare and Contrast Regulations, Accreditations, and Standards
Topic 2C: Explain Legal Considerations & Contract Types

Lesson 3: Implementing Business Continuity & Disaster Recovery
Topic 3A: Explain the Role of Business Impact Analysis
Topic 3B: Assess Disaster Recovery Plans
Topic 3C: Explain Testing and Readiness Activities

Lesson 4: Identifying Infrastructure Services
Topic 4A: Explain Critical Services
Topic 4B: Explain Defensible Network Design
Topic 4C: Implement Durable Infrastructures

Lesson 5: Performing Software Integration
Topic 5A: Explain Secure Integration Activities
Topic 5B: Assess Software Development Activities
Topic 5C: Analyze Access Control Models & Best Practices
Topic 5D: Analyze Development Models & Best Practices


Lesson 6: Explain Virtualization, Cloud and Emerging Technology
Topic 6A: Explain Virtualization and Cloud Technology
Topic 6B: Explain Emerging Technologies


Lesson 7: Exploring Secure Configurations and System Hardening
Topic 7A: Analyze Enterprise Mobility Protections
Topic 7B: Implement Endpoint Protection

Lesson 8: Understanding Security Considerations of Cloud and Specialized Platforms
Topic 8A: Understand Impacts of Cloud Technology Adoption
Topic 8B: Explain Security Concerns for Sector-Specific Technologies

Lesson 9: Implementing Cryptography
Topic 9A: Implementing Hashing and Symmetric Algorithms
Topic 9B: Implementing Appropriate Asymmetric Algorithms and Protocols

Lesson 10: Implementing Public Key Infrastructure (PKI)
Topic 10A: Analyze Objectives of Cryptography and Public Key Infrastructure (PKI)
Topic 10B: Implementing Appropriate PKI Solutions

Lesson 11: Architecting Secure Endpoints
Topic 11A: Explore Threat and Vulnerability Management Concepts
Topic 11B: Explain Vulnerability and Penetration Test Methods
Topic 11C: Explain Technologies Designed to Reduce Risk

Lesson 12: Summarizing IIoT & IoT Concepts
Topic 12A: Analyzing and Mitigating Vulnerabilities
Topic 12B: Identifying and Responding to Indicators of Compromise
Topic 12C: Exploring Digital Forensic Concepts

Job Roles

• Security Architect
• Senior Security Engineer
• SOC Manager
• Security Analyst
• IT cybersecurity Specialist/ INFOSECSpecialist
• Cyber Risk Analyst

bottom of page