courseCompTIA: Advanced Security Practitioner (CASP)

Train to become CompTIA: Advanced Security Practitioner (CASP) Qualified!

The CASP exam covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers, while managing risk.

What's Included

Wiki_tick  Unlimited access for 12 months

Wiki_tick  Access anywhere, any time

Wiki_tick  Fast effective training, written and designed by industry experts

Wiki_tick  Unlimited support

Wiki_tick  Save money, time and travel costs

Wiki_tick  Learn at your own pace and leisure

Wiki_tick  Easier to retain knowledge and revise topics than traditional methods

What the course will teach you:

  • technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments
  • applying critical thinking and judgment across a broad spectrum of security disciplines
  • Proposing and implementing solutions that map to enterprise drivers
  • Managing risk
  • And much more...

Buy Now

Units Of Study

CompTIA: Advanced Security Practitioner


Module one - Underlying Security Models

1.0 Course Guide
1.1 Underlying Security Models Part 1
1.2 Underlying Security Models Part 2
1.3 Underlying Security Models Part 3
1.4 Underlying Security Models Part 4
1.5 Underlying Security Models Part 5
1.6 Underlying Security Models Part 6
1.7 Underlying Security Models Part 7
1.8 General Security Part 1
1.9 General Security Part 2

Module Two - Selecting Security

2.0 Selecting Security Products Part 1
2.1 Selecting Security Products Part 2
2.2 Selecting Security Products Part 3
2.3 Control Selection Process Part 1
2.4 Control Selection Process Part 2

Module Three - Cryptography

3.0 Cryptography Symmetric and Asymmetric Part 1
3.1 Cryptography Symmetric and Asymmetric Part 2
3.2 Cryptography Symmetric and Asymmetric Part 3
3.3 Cryptography Symmetric and Asymmetric Part 4
3.4 Cryptography Message Integrity Controls Part 1
3.5 Cryptography Message Integrity Controls Part 2
3.6 Cryptography Message Integrity Controls Part 3
3.7 Cryptography Digital Signatures Part 1
3.8 Cryptography Digital Signatures Part 2
3.9 Cryptography PKI and PGP Part 1
3.10 Cryptography PKI and PGP Part 2
3.11 Cryptography PKI and PGP Part 3
3.12 Cryptography PKI and PGP Part 4

Module Four - Storage

4.0 Storage Part 1
4.1 Storage Part 2
4.2 Storage Part 3
4.3 Storage Part 4

Module Five - Virtual Computing

5.0 Virtual Computing
5.1 Cloud Computing Part 1
5.2 Cloud Computing Part 2
5.3 Cloud Computing Part 3
5.4 Cloud Computing Part 4
5.5 Cloud Computing Part 5

Module Six - IPv6

6.0 IPV6 Part 1
6.1 IPV6 Part 2

Module Seven - Remote Access Security

7.0 Remote Access Security Part 1
7.1 Remote Access Security Part 2

Module Eight - Domain Name System

8.0 Domain Name System Part 1
8.1 Domain Name System Part 2
8.2 Domain Name System Part 3
8.3 Domain Name System Part 4
8.4 Domain Name System Part 5
8.5 Domain Name System Part 6
8.6 Domain Name System Part 7
8.7 Domain Name System Part 8

Module Nine - Directory Services

9.0 Directory Services

Module Ten - Firewall and VPN

10.0 Firewall and VPN Part 1
10.1 Firewall and VPN Part 2
10.2 Firewall and VPN Part 3
10.3 Firewall and VPN Part 4
10.4 Firewall Policy Part 1
10.5 Firewall Policy Part 2
10.6 Firewall Policy Part 3
10.7 Firewall Policy Part 4

Module Eleven - Security Configuration Management

11.0 Security Configuration Management Part 1
11.1 Security Configuration Management Part 2
11.2 Security Configuration Management Part 3

Module Twelve - Network Infrastructure Security

12.0 Network Infrastructure Security Part 1
12.1 Network Infrastructure Security Part 2
12.2 Network Infrastructure Security Part 3
12.3 Network Infrastructure Security Part 4

Module Thirteen - Secure Web Services

13.0 Secure Web Services Part 1
13.1 Secure Web Services Part 2
13.2 OWASP top Ten Part 1
13.3 OWASP top Ten Part 2
13.4 OWASP top Ten Part 3
13.5 OWASP top Ten Part 4
13.6 OWASP top Ten Part 5

Module Fourteen - Buffer Overflows

14.0 Buffer Overflows Part 1
14.1 Buffer Overflows Part 2

Module Fifteen - SQL Injection

15.0 SQL Injection Part 1
15.1 SQL Injection Part 2

Module Sixteen - Access Control

16.0 Access Control Part 1
16.1 Access Control Part 2

Module Seventeen: Single Sign-On

17.0 Single Sign-On Part 1
17.1 Single Sign-On Part 2
17.2 Single Sign-On Part 3

Module Eighteen: Risk Assessment

18.0 Risk Assessment Part 1
18.1 Risk Assessment Part 2

Module Nineteen: Testing and Assessment

19.0 Testing and Assessment Part 1
19.1 Testing and Assessment Part 2
19.2 Testing and Assessment Part 3

Module Twenty: Common Vulnerability

20.0 Common Vulnerability Scoring System Part 1
20.1 Common Vulnerability Scoring System Part 2
20.2 Common Vulnerability Scoring System Part 3
20.3 Common Vulnerability Scoring System Part 4

Module Twenty One: Common Criteria

21.0 Common Criteria Part 1
21.1 Common Criteria Part 2
21.2 Common Criteria Part 3
21.3 Common Criteria Part 4
21.4 Common Criteria Part 5

Module Twenty Two: Personally Identifiable Information

22.0 Personally Identifiable Information Part 1
22.1 Personally Identifiable Information Part 2

Module Twenty Three: Risk Management

23.0 Risk Management Part 1
23.1 Risk Management Part 2
23.2 Risk Management Part 3

Module Twenty Four: Frameworks

24.0 Frameworks Part 1
24.1 Frameworks Part 2
24.2 Frameworks Part 3
24.3 Frameworks Part 4

Module Twenty Five: Interconnecting Systems

25.0 Interconnecting Systems Part 1
25.1 Interconnecting Systems Part 2

Module Twenty Six: Security Services

26.0 Security Services Part 1
26.1 Security Services Part 2
26.2 Security Services Part 3
26.3 Security Services Part 4

Module Twenty Seven: Continuous Monitoring

27.0 Continuous Monitoring Part 1
27.1 Continuous Monitoring Part 2
27.2 Continuous Monitoring Part 3
27.3 Continuous Monitoring Part 4

Module Twenty Eight: Incident Handling

28.0 Incident Handling Part 1
28.1 Incident Handling Part 2
28.2 Incident Handling Part 3
28.3 Incident Handling Part 4

Module Twenty nine: Forensic & Incident Response

29.0 Forensic and Incident Response Part 1
29.1 Forensic and Incident Response Part 2
29.2 Forensic and Incident Response Part 3

Module Thirty: Requirements Processing

30.0 Requirements Processing Part 1
30.1 Requirements Processing Part 2
30.2 Requirements Processing Part 3

Module Thirty One: Standards Bodies

31.0 Standards Bodies

Module Thirty Two: Secure System Life Cycle

32.0 Secure System Life Cycle Part 1
32.1 Secure System Life Cycle Part 2
32.2 Secure System Life Cycle Part 3

Module 33: Email

33.0 Email

Module 34: Mobile and BYOD

34.0 Mobile and BYOD Part 1
34.1 Mobile and BYOD Part 2

Module 35: Voiceover IP

35.0 Voice over IP

Module 36: Physical Facilities Assessment Process

36.0 Physical Facilities Assessment Process Part 1
36.1 Physical Facilities Assessment Process Part 2

Module 37: Security Requirements Traceability Matrix

37.0 Security Requirements Traceability Matrix

Training Features

With eCourses4You's e-learning system, certification has never been simpler! You can be starting your IT career or taking your current IT skills to the next level in just a few short weeks. Our award winning learning system gives you all of the benefits of a live class at just a fraction of the cost.

eCourses4You’s courses include:


Expert Instructor-Led Training

eCourses4You uses only the industry’s finest instructors in the IT industry. They have a minimum of 15 years real-world experience and are subject matter experts in their fields. Unlike a live class, you can fast-forward, repeat or rewind all your lectures. This creates a personal learning experience and gives you all the benefit of hands-on training with the flexibility of doing it around your schedule 24/7.


Visual Demonstrations & Multimedia Presentations

Our courseware includes instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor. eCourses4You always focuses on real world scenarios and skill-set development.


Quizzes & Exam Simulators

eCourses4You’s custom practice exams prepare you for your exams differently and more effectively than the traditional exam preps on the market. You will have practice quizzes after each module to ensure you are confident on the topic you have completed before proceeding.

This will allow you to gauge your effectiveness before moving to the next module in your course. eCourses4You Courses also include practice exams designed to replicate and mirror the environment in the testing center. These exams are on average 100 questions to ensure you are 100% prepared before taking your certification exam.


Social Learning & Networking

eCourses4You has designed a world class Learning Management System (LMS) This system allows you to interact and collaborate with other students and eCourses4You employees, form study groups, engage in discussions in our NOW@ Forums, rate and “like” different courses and stay up to date with all the latest industry knowledge through our forums, student contributions and announcement features. This LMS is unmatched in the industry and makes learning fun and enjoyable.

Flash Cards & Educational Games

eCourses4You knows that education is not a one size fits all approach. Students learn in different ways through different tools. That is why we provide Flash Cards and Education Games throughout our courses. This will allow you to train in ways that keep you engaged and focused. Each course will have dozens of Flash Cards so you can sharpen your skill-sets throughout your training as well as educational games designed to make sure your retention level of the materials is extremely high.

Navigation & Controls

eCourses4You’s self-paced training programs are designed in a modular fashion to allow you the flexibility to work with expert level instruction anytime 24/7. All courses are arranged in defined sections with navigation controls allowing you to control the pace of your training. This allows students to learn at their own pace around their schedule.

System Requirements

Minimum specifications for the computer are:


Microsoft Windows XP, or later
Modern and up to date Browser (Internet Explorer 8 or later, Firefox, Chrome, Safari)


OSX/iOS 6 or later
Modern and up to date Browser (Firefox, Chrome, Safari)

All systems:

Internet bandwidth of 1Mb or faster
Flash player or a browser with HTML5 video capabilities (We recommend Google Chrome)