CompTIA SecurityX Certification Training Course Outline
Special Note to New Hampshire ResidentsThis course has not yet been approved by the New Hampshire Department of Education. Please contact us for an update on when the class will be available in New Hampshire.
Overview
Designed for experienced cybersecurity professionals, the CompTIA SecurityX Certification Prep (Exam CAS-005) course focuses on advanced security concepts essential for managing and securing complex enterprise environments also covering governance, risk management, security architecture and security operations. implementation of secure solutions across diverse infrastructures. Participants will gain expertise in automation, threat modeling, and cryptographic technologies, ensuring proactive detection and response to cybersecurity threats.
Note: From CASP+ to SecurityX
CompTIA re-branded CASP+ (short for CompTIA Advanced Security Practitioner) to SecurityX with the release of exam CAS-005 in December 2024. The name change will not affect certification status of current CASP+ certification holders or continuing education (CE) program. Unexpired CASP+ exam vouchers can be used for the SecurityX exam.
CompTIA CASP+ certification exam CAS-004 retires June 17, 2025.
Course Objectives
• Architect and implement secure solutions across complex environments
• Manage governance, risk, compliance, and threat modeling strategies
• Secure cloud, on-premises, and hybrid infrastructures
• Use automation and incident response techniques for proactive security
• Apply advanced cryptographic technologies and assess emerging AI-related risks
Target Audience
• Cybersecurity Specialist
• Network Security Analyst
• Security Architect
Prerequisites
Required:
• Minimum of 10 years of general, hands-on IT experience that includes at least 5 years of broad, hands-on IT security experience.
COMPTIA SECURITYX COURSE OUTLINE
1) Governance Risk and Compliance
Given a set of organizational security requirements implement the appropriate governance components
Given a set of organizational security requirements perform risk management activities
Explain how compliance affects information security strategies
Given a scenario perform threat modeling activities
Summarize the information security challenges associated with artificial intelligence AI adoption
2) Security Architecture
Given a scenario analyze requirements to design resilient systems
Given a scenario implement security in the early stages of the systems life cycle and throughout subsequent stages
Given a scenario integrate appropriate controls in the design of a secure architecture
Given a scenario apply security concepts to the design of access authentication and authorization systems
Given a scenario securely implement cloud capabilities in an enterprise environment
Given a scenario integrate Zero Trust concepts into system architecture design
3) Security Engineering
Given a scenario troubleshoot common issues with identity and access management IAM components in an enterprise environment
Given a scenario analyze requirements to enhance the security of endpoints and servers
Given a scenario troubleshoot complex network infrastructure security issues
Given a scenario implement hardware security technologies and techniques
Given a set of requirements secure specialized and legacy systems against threats
Given a scenario use automation to secure the enterprise
Explain the importance of advanced cryptographic concepts
Given a scenario apply the appropriate cryptographic use case and/or technique
4) Security Operations
Given a scenario analyze data to enable monitoring and response activities
Given a scenario analyze vulnerabilities and attacks and recommend solutions to reduce the attack surface
Given a scenario apply threat hunting and threat intelligence concepts
Given a scenario analyze data and artifacts in support of incident response activities
View outline in Word
XSX005