MCSEClasses Certification Training Boot Camp MCSE MCSD MCDBA Cisco CIW Linux Oracle Java Security Military Discounts Testimonials About Us Linux/Unix Certification MCSD Certification Home MCSE Certification MCDBA Certification Cisco Certification Security Certification Java Certification Oracle® Certification CIW Certification Jobs Boot Camp Financing Boot Camp Pricing Boot Camp Technical Schedule Contact Us


CompTIA SecurityX (CAS-005)

Course Length: 5 days
Certifications: CompTIA SecurityX
Number of Exams: 1

Class Schedule
Call for Class Schedule
  • Certified Instructor
  • Includes all course materials
  • The CompTIA SecurityX (CAS-005) is an advanced-level cybersecurity certification for security architects and senior security engineers charged with leading and improving an enterprise's cybersecurity readiness.

    What Skills Will You Gain?

    Security Architecture Analyze security requirements in hybrid networks to work toward an enterprise-wide, zero trust security architecture with advanced secure cloud and virtualization solutions.

    Security Operations Address advanced threat management, vulnerability management, risk mitigation, incident response tactics and digital forensics analysis.

    Governance, Risk, and Compliance Prove an organization's overall cybersecurity resiliency metric and compliance to regulations, such as CMMC, PCI-DSS, SOX, HIPAA, GDPR, FISMA, NIST and CCPA.

    Security Engineering and Cryptography Configurations for endpoint security controls, enterprise mobility, cloud/hybrid environments, and enterprise-wide PKI and cryptographic solutions.

    Jobs that use CompTIA SecurityX

    • Security Architect
    • Senior Security Engineer
    • SOC Manager
    • Cyber Risk Analyst
    • Chief Information Security Officer

    Course Content

    1.0 Governance, Risk, and Compliance
    Given a set of organizational security requirements, implement the appropriate governance components.
    • Security program documentation
    • Security program management
    • Governance frameworks
    • Change/configuration management
    • Governance risk and compliance (GRC) tools
    • Data governance in staging environments
    Given a set of organizational security requirements, perform risk management activities.
    • Impact analysis
    • Risk assessment and management
    • Third-party risk management
    • Availability risk considerations
    • Confidentiality risk considerations
    • Integrity risk considerations
    • Privacy risk considerations
    • Crisis management
    • Breach response
    Explain how compliance affects information security strategies.
    • Awareness of industry-specific compliance
    • Industry standards
    • Security and reporting frameworks
    • Audits vs. assessments vs. certifications
    • Privacy regulations
    • Awareness of cross-jurisdictional compliance requirements
    Given a scenario, perform threat-modeling activities.
    • Actor characteristics
    • Attack patterns
    • Frameworks
    • Attack surface determination
    • Methods
    • Modeling applicability of threats to the organization/environment
    Summarize the information security challenges associated with artificial intelligence (AI) adoption.
    • Legal and privacy implications
    • Threats to the model
    • AI-enabled attacks
    • Risks of AI usage
    • AI-enabled assistants/digital workers
    2.0 Security Architecture
    Given a scenario, analyze requirements to design resilient systems.
    • Component placement and configuration
    • Availability and integrity design considerations
    Given a scenario, implement security in the early stages of the systems life cycle and throughout subsequent stages.
    • Security requirements definition
    • Software assurance
    • Continuous integration/continuous deployment (CI/CD)
    • Supply chain risk management
    • Hardware assurance
    • End-of-life (EOL) considerations
    Given a scenario, integrate appropriate controls in the design of a secure architecture.
    • Attack surface management and reduction
    • Detection and threat-hunting enablers
    • Information and data security design
    • DLP
    • Hybrid infrastructures
    • Third-party integrations
    • Control effectiveness
    Given a scenario, apply security concepts to the design of access, authentication, and authorization systems.
    • Provisioning/deprovisioning
    • Federation
    • Single sign-on (SSO)
    • Conditional access
    • Identity provider
    • Service provider
    • Attestations
    • Policy decision and enforcement points
    • Access control models
    • Logging and auditing
    • Public key infrastructure (PKI) architecture
    • Access control systems
    Given a scenario, securely implement cloud capabilities in an enterprise environment.
    • Cloud access security broker (CASB)
    • Shadow IT detection
    • Shared responsibility model
    • CI/CD pipeline
    • Terraform
    • Ansible
    • Package monitoring
    • Container security
    • Container orchestration
    • Serverless
    • API security
    • Cloud vs. customer-managed
    • Cloud data security considerations
    • Cloud control strategies
    • Customer-to-cloud connectivity
    • Cloud service integration
    • Cloud service adoption
    Given a scenario, integrate Zero Trust concepts into system architecture design.
    • Continuous authorization
    • Context-based reauthentication
    • Network architecture
    • API integration and validation
    • Asset identification, management, and attestation
    • Security boundaries
    • Deperimeterization
    • Defining subject-object relationships
    3.0 Security Engineering
    Given a scenario, troubleshoot common issues with identity and access management (IAM) components in an enterprise environment.
    • Subject access control
    • Biometrics
    • Secrets management
    • Conditional access
    • Attestation
    • Cloud IAM access and trust policies
    • Logging and monitoring
    • Privilege identity management
    • Authentication and authorization
    Given a scenario, analyze requirements to enhance the security of endpoints and servers.
    • Application control
    • Endpoint detection response (EDR)
    • Event logging and monitoring
    • Endpoint privilege management
    • Attack surface monitoring and reduction
    • Host-based intrusion protection system/ host-based detection system (HIPS/ HIDS)
    • Anti-malware
    • SELinux
    • Host-based firewall
    • Browser isolation
    • Configuration management
    • Mobile device management (MDM) technologies
    • Threat-actor tactics, techniques, and procedures (TTPs)
    Given a scenario, troubleshoot complex network infrastructure security issues.
    • Network misconfigurations
    • IPS/IDS issues
    • Observability
    • Domain Name System (DNS) security
    • Email security
    • Transport Layer Security (TLS) errors
    • Cipher mismatch
    • PKI issues
    • Issues with cryptographic implementations
    • DoS/distributed denial of service (DDoS)
    • Resource exhaustion
    • Network access control list (ACL) issues
    Given a scenario, implement hardware security technologies and techniques.
    • Roots of trust
    • Security coprocessors
    • Virtual hardware
    • Host-based encryption
    • Self-encrypting drive (SED)
    • Secure Boot
    • Measured boot
    • Self-healing hardware
    • Tamper detection and countermeasures
    • Threat-actor TTPs
    Given a set of requirements, secure specialized and legacy systems against threats.
    • Operational technology (OT)
    • Internet of Things (IoT)
    • System-on-chip (SoC)
    • Embedded systems
    • Wireless technologies/radio frequency (RF)
    • Security and privacy considerations
    • Industry-specific challenges
    • Characteristics of specialized/legacy systems
    Given a scenario, use automation to secure the enterprise.
    • Scripting
    • Cron/scheduled tasks
    • Event-based triggers
    • Infrastructure as code (IaC)
    • Configuration files
    • Cloud APIs/software development kits (SDKs)
    • Generative AI
    • Containerization
    • Automated patching
    • Auto-containment
    • Security orchestration, automation, and response (SOAR)
    • Vulnerability scanning and reporting
    • Security Content Automation Protocol (SCAP)
    • Workflow automation
    Explain the importance of advanced cryptographic concepts.
    • Post-quantum cryptography (PQC)
    • Key stretching
    • Key splitting
    • Homomorphic encryption
    • Forward secrecy
    • Hardware acceleration
    • Envelope encryption
    • Performance vs. security
    • Secure multiparty computation
    • Authenticated encryption with associated data (AEAD)
    • Mutual authentication
    Given a scenario, apply the appropriate cryptographic use case and/or technique.
    • Use cases
    • Techniques
    4.0 Security Operations
    Given a scenario, analyze data to enable monitoring and response activities.
    • Security information event management (SIEM)
    • Aggregate data analysis
    • Behavior baselines and analytics
    • Incorporating diverse data sources
    • Alerting
    • Reporting and metrics
    Given a scenario, analyze vulnerabilities and attacks, and recommend solutions to reduce the attack surface.
    • Vulnerabilities and attacks
    • Mitigations
    Given a scenario, apply threat-hunting and threat intelligence concepts.
    • Internal intelligence sources
    • External intelligence sources
    • Counterintelligence and operational security
    • Threat intelligence platforms (TIPs)
    • Indicator of compromise (IoC) sharing
    • Rule-based languages
    • Indicators of attack
    Given a scenario, analyze data and artifacts in support of incident response activities.
    • Malware analysis
    • Reverse engineering
    • Volatile/non-volatile storage analysis
    • Network analysis
    • Host analysis
    • Metadata analysis
    • Hardware analysis
    • Data recovery and extraction
    • Threat response
    • Preparedness exercises
    • Timeline reconstruction
    • Root cause analysis
    • Cloud workload protection platform (CWPP)
    • Insider threat

    MCSEClasses.com is your best choice for CompTIA SecurityX, CompTIA SecurityX training, CompTIA SecurityX certification, CompTIA SecurityX certification boot camp, CompTIA SecurityX boot camp, CompTIA SecurityX certification training, CompTIA SecurityX boot camp training, CompTIA SecurityX boot camp certification, CompTIA SecurityX certification course, CompTIA SecurityX course, training CompTIA SecurityX, certification CompTIA SecurityX, boot camp CompTIA SecurityX, certification CompTIA SecurityX boot camp, certification CompTIA SecurityX training, boot camp CompTIA SecurityX training, certification CompTIA SecurityX course.



    mcseclasses home | technical schedule | application schedule | class outlines | mcse, mcdba, mcsd training | microsoft .net | cisco certification | security training | ced solutions oracle® certification training | linux, unix, aix | comptia certification | webmaster training | pricing | locations | financing | instructors needed | e-mail us





    Search classes by keyword:


    Search classes by category:

    Copyright © 2025 CED Solutions. CED Solutions Refund Policy. All Rights Reserved.

    MCSE certification boot camps and courses are offered in these select cities: Albany MCSE, Albuquerque MCSE, Alexandria MCSE, Anchorage MCSE, Atlanta MCSE, Austin MCSE, Billings MCSE, Birmingham MCSE, Bismarck MCSE, Boise MCSE, Boston MCSE, Charleston MCSE, Charlotte MCSE, Cheyenne MCSE, Chicago MCSE, Cincinnati MCSE, Cleveland MCSE, Columbia MCSE, Columbus MCSE, Dallas MCSE, Denver MCSE, Des Moines MCSE, Detroit MCSE, Hartford MCSE, Honolulu MCSE, Houston MCSE, Indianapolis MCSE, Jackson MCSE, Kansas City MCSE, Las Cruces MCSE, Lincoln MCSE, Little Rock MCSE, Los Angeles MCSE, Louisville MCSE, Madison MCSE, Milwaukee MCSE, Minneapolis MCSE, Montpelier MCSE, New Orleans MCSE, New York City MCSE, Norfolk MCSE, Oklahoma City MCSE, Omaha MCSE, Philadelphia MCSE, Phoenix MCSE, Pierre MCSE, Pittsburgh MCSE, Portland MCSE, Princeton MCSE, Providence MCSE, Raleigh MCSE, Richmond MCSE, Sacramento MCSE, Salt Lake City MCSE, San Antonio MCSE, San Diego MCSE, San Francisco MCSE, San Jose MCSE, Seattle MCSE, Stamford MCSE, Tulsa MCSE, Washington MCSE, Wilmington MCSE.

    MCSE Canada Boot Camps : mcse Calgary, mcse Edmonton, mcse Halifax, mcse Hamilton, mcse Kitchener, mcse London, mcse Montreal, mcse Ottawa, mcse Quebec City, mcse Toronto, mcse Vancouver, mcse Winnipeg.

    CED Solutions offers MCSE certification boot camps and courses in the United States: MCSE Alabama, MCSE Alaska, MCSE Arizona, MCSE Arkansas, MCSE California, MCSE Colorado, MCSE Connecticut, MCSE District of Columbia, MCSE Delaware, MCSE Georgia, MCSE Hawaii, MCSE Idaho, MCSE Illinois, MCSE Indiana, MCSE Iowa, MCSE Kansas, MCSE Kentucky, MCSE Louisiana, MCSE Maine, MCSE Massachusetts, MCSE Michigan, MCSE Minnesota, MCSE Mississippi, MCSE Missouri, MCSE Montana, MCSE Nebraska, MCSE New Jersey, MCSE New Mexico, MCSE New York, MCSE North Carolina, MCSE North Dakota, MCSE Ohio, MCSE Oklahoma, MCSE Oregon, MCSE Pennsylvania, MCSE Rhode Island, MCSE South Carolina, MCSE South Dakota, MCSE Texas, MCSE Utah, MCSE Vermont, MCSE Virginia, MCSE Washington, MCSE West Virginia, MCSE Wisconsin, MCSE Wyoming.

    MCSE Canada Boot Camps : Alberta mcse, British Columbia mcse, Manitoba mcse, New Brunswick mcse, Newfoundland mcse, Nova Scotia mcse, Ontario mcse, Saskatchewan mcse. Quebec mcse.