Lesson 1:
Managing Risk
Topic A:
Identify the Importance of Risk Management
Topic B:
Assess Risk
Topic C:
Mitigate Risk
Topic D:
Integrate Documentation into Risk Management
Lesson 2:
Integrating Computing, Communications, and Business Disciplines
Topic A:
Facilitate Collaboration Across Business Units
Topic B:
Secure Communications and Collaboration Solutions
Topic C:
Implement Security Activities Throughout the Technology Life Cycle
Lesson 3:
Using Research and Analysis to Secure the Enterprise
Topic A:
Determine Industry Trends and Effects on the Enterprise
Topic B:
Analyze Scenarios to Secure the Enterprise
Lesson 4:
Integrating Advanced Authentication and Authorization Techniques
Topic A:
Implement Authentication and Authorization Technologies
Topic B:
Implement Advanced Identity Management
Lesson 5:
Implementing Cryptographic Techniques
Topic A:
Describe Cryptographic Concepts
Topic B:
Choose Cryptographic Techniques
Topic C:
Choose Cryptographic Implementations
Lesson 6:
Implementing Security Controls for Hosts
Topic A:
Select Host Hardware and Software
Topic B:
Harden Hosts
Topic C:
Virtualize Servers and Desktops
Topic D:
Implement Cloud Augmented Security Services
Topic E:
Protect Boot Loaders
Lesson 7:
Implementing Security Controls for Enterprise Storage
Topic A:
Identify Storage Types and Protocols
Topic B:
Implement Secure Storage Controls
Lesson 8:
Analyzing and Implementing Network Security
Topic A:
Analyze Network Security Components and Devices
Topic B:
Analyze Network-Enabled Devices
Topic C:
Analyze Advanced Network Design
Topic D:
Configure Controls for Network Security
Lesson 9:
Implementing Security Controls for Applications
Topic A:
Identify General Application Vulnerabilities
Topic B:
Identify Web Application Vulnerabilities
Topic C:
Implement Application Security Controls
Lesson 10:
Integrating Hosts, Storage, Networks, and Applications in a Secure Enterprise Architecture
Topic A:
Implement Security Standards in the Enterprise
Topic B:
Select Technical Deployment Models
Topic C:
Secure the Design of the Enterprise Infrastructure
Topic D:
Secure Enterprise Application Integration Enablers
Lesson 11:
Conducting Vulnerability Assessments
Topic A:
Select Vulnerability Assessment Methods
Topic B:
Select Vulnerability Assessment Tools
Lesson 12:
Responding to and Recovering from Incidents
Topic A:
Design Systems to Facilitate Incident Response
Topic B:
Conduct Incident and Emergency Responses
Appendix A:
Mapping Course Content to CompTIA Advanced Security Practitioner (CASP) Exam CAS-002