IT Security Training for CASP

IT Security Training for CASP IT Security Training for CASP
By TED Integrated
System Security:

IT Security Practitioner

“Learn the advanced security administration tools and get yourself prepared for the CASP exam (CAS-001)!”

By TED Integrated


PSMB Certified Training Provider
Request for In-house TrainingRequest for In-house Training
Register for Public Training Public program not yet available
Email Customer Service [email protected] Contact Customer Service +603-2386-7788
Course Title:
IT Security Practitioner
Training Category:
Information Technology
Target Audience:
IT Administrator, System Engineers, Network Engineers, and those who want to sit for the CASP exam (CAS-001).
Duration:
2 Days
For In-house Training
Request for Quotation Request for Quotation
For Other Inquiries
Contact TED Integrated
Contact customer service +603-2386-7788
Email customer service [email protected]
Delivery Methods
  • Language: English
  • PowerPoint Presentation
  • Presentation Handouts
  • Computer Lab Work
  • Internet Access
  • Certificate of Participation
*Terms & Conditions

Course Introduction ›

This is a 2-Day IT Security Practitioner training for those who want to learn the advanced tools and techniques on IT security administration. It is also designed for those who want to sit for the CASP exam (CAS-001). This hands-on labs and lectures will let you prepare for the CASP exam with confidence. It will focus on enterprise security risk management, policies and procedures, legalities research, and analysis integration of computing.

To request for in-house training, click on the Request for In-house Training link as displayed above for quotation. For a complete course cotent and more information about this course, feel free to contact the training provider as shown above. If the public program is available, you can request for a registration online by clicking on the Register for Public Training link. If the link is disabled, it simply means it has yet to be available for public. You can contact the training provider for further inquiry.

Course Objectives ›

In this hands-on workshop, participant will learn:

  • Advanced defensive controls such as web application firewalls
  • Address threats such as cross-site scripting (XSS) and cross-site request forgery (XSRF)
  • Perform advanced port scanning techniques used to avoid detection
  • Best practices in intrusion detection system (IDS) design and signature development
  • Stop hackers before they access your network

Course Outline ›

DAY 1

1. Enterprise Security Architecture

  • Basics of Enterprise Security
  • Enterprise Structure
  • Enterprise Security Requirements

2. Enterprise Security Technology

  • Common Network Security Components and Technologies
  • Communications and Collaboration Security
  • Cryptographic Tools and Techniques
  • Advanced Authentication

3. Enterprise Resource Technology

  • Enterprise Storage Security Issues
  • Distributed, Shared, and Virtualized Computing
  • Cloud Computing and Security

4. Security Design and Solutions

  • Network Security Design
  • Conduct a Security Assessment
  • Host Security
DAY 2

5. Application Security Design

  • Application Security Basics
  • Web Application Security

6. Managing Risk, Security Policies, and Security Procedures

  • Analyze Security Risk
  • Implement Risk Mitigation Strategies and Controls
  • Implement Enterprise-Level Security Policies and Procedures
  • Prepare for Incident Response and Recovery

7. Enterprise Security Integration

  • Technology Lifecycle
  • Interorganizational Change
  • Integrate Enterprise Disciplines to Achieve Secure Solutions

8. Security Research and Analysis

  • Perform an Industry Trends and Impact Analysis
  • Perform an Enterprise Security Analysis

Contact us now ›

  • Course content customization
  • In-house training request
  • Available public program
  • Consultation services
  • Other inquiries
Contact Customer ServiceCall : +603-2386-7788
Email Customer Service E-mail : [email protected]

Related Courses ›

Published by: ,