MCSEClasses Certification Training Boot Camp MCSE MCSD MCDBA Cisco CIW Linux Oracle Java Security Military Discounts Testimonials About Us Linux/Unix Certification MCSD Certification Home MCSE Certification MCDBA Certification Cisco Certification Security Certification Java Certification Oracle® Certification CIW Certification Jobs Boot Camp Financing Boot Camp Pricing Boot Camp Technical Schedule Contact Us


CompTIA SecurityX (CAS-005)

Course Length: 5 days
Certifications: CompTIA SecurityX
Number of Exams: 1
Class Schedule
Call for Class Schedule

  • Hands-on instruction by a certified instructor
  • Includes all course materials and practice exams
  • Includes all certification exams
  • Onsite Testing
  • Breakfast and Lunch provided each day

If airfare and lodging are not required, the price is £575 less for 2-week courses, and £285 less for one week courses.


The CompTIA SecurityX (CAS-005) is an advanced-level cybersecurity certification for security architects and senior security engineers charged with leading and improving an enterprise's cybersecurity readiness.

What Skills Will You Gain?

Security Architecture Analyze security requirements in hybrid networks to work toward an enterprise-wide, zero trust security architecture with advanced secure cloud and virtualization solutions.

Security Operations Address advanced threat management, vulnerability management, risk mitigation, incident response tactics and digital forensics analysis.

Governance, Risk, and Compliance Prove an organization's overall cybersecurity resiliency metric and compliance to regulations, such as CMMC, PCI-DSS, SOX, HIPAA, GDPR, FISMA, NIST and CCPA.

Security Engineering and Cryptography Configurations for endpoint security controls, enterprise mobility, cloud/hybrid environments, and enterprise-wide PKI and cryptographic solutions.

Jobs that use CompTIA SecurityX

  • Security Architect
  • Senior Security Engineer
  • SOC Manager
  • Cyber Risk Analyst
  • Chief Information Security Officer

Course Content

1.0 Governance, Risk, and Compliance
Given a set of organizational security requirements, implement the appropriate governance components.
  • Security program documentation
  • Security program management
  • Governance frameworks
  • Change/configuration management
  • Governance risk and compliance (GRC) tools
  • Data governance in staging environments
Given a set of organizational security requirements, perform risk management activities.
  • Impact analysis
  • Risk assessment and management
  • Third-party risk management
  • Availability risk considerations
  • Confidentiality risk considerations
  • Integrity risk considerations
  • Privacy risk considerations
  • Crisis management
  • Breach response
Explain how compliance affects information security strategies.
  • Awareness of industry-specific compliance
  • Industry standards
  • Security and reporting frameworks
  • Audits vs. assessments vs. certifications
  • Privacy regulations
  • Awareness of cross-jurisdictional compliance requirements
Given a scenario, perform threat-modeling activities.
  • Actor characteristics
  • Attack patterns
  • Frameworks
  • Attack surface determination
  • Methods
  • Modeling applicability of threats to the organization/environment
Summarize the information security challenges associated with artificial intelligence (AI) adoption.
  • Legal and privacy implications
  • Threats to the model
  • AI-enabled attacks
  • Risks of AI usage
  • AI-enabled assistants/digital workers
2.0 Security Architecture
Given a scenario, analyze requirements to design resilient systems.
  • Component placement and configuration
  • Availability and integrity design considerations
Given a scenario, implement security in the early stages of the systems life cycle and throughout subsequent stages.
  • Security requirements definition
  • Software assurance
  • Continuous integration/continuous deployment (CI/CD)
  • Supply chain risk management
  • Hardware assurance
  • End-of-life (EOL) considerations
Given a scenario, integrate appropriate controls in the design of a secure architecture.
  • Attack surface management and reduction
  • Detection and threat-hunting enablers
  • Information and data security design
  • DLP
  • Hybrid infrastructures
  • Third-party integrations
  • Control effectiveness
Given a scenario, apply security concepts to the design of access, authentication, and authorization systems.
  • Provisioning/deprovisioning
  • Federation
  • Single sign-on (SSO)
  • Conditional access
  • Identity provider
  • Service provider
  • Attestations
  • Policy decision and enforcement points
  • Access control models
  • Logging and auditing
  • Public key infrastructure (PKI) architecture
  • Access control systems
Given a scenario, securely implement cloud capabilities in an enterprise environment.
  • Cloud access security broker (CASB)
  • Shadow IT detection
  • Shared responsibility model
  • CI/CD pipeline
  • Terraform
  • Ansible
  • Package monitoring
  • Container security
  • Container orchestration
  • Serverless
  • API security
  • Cloud vs. customer-managed
  • Cloud data security considerations
  • Cloud control strategies
  • Customer-to-cloud connectivity
  • Cloud service integration
  • Cloud service adoption
Given a scenario, integrate Zero Trust concepts into system architecture design.
  • Continuous authorization
  • Context-based reauthentication
  • Network architecture
  • API integration and validation
  • Asset identification, management, and attestation
  • Security boundaries
  • Deperimeterization
  • Defining subject-object relationships
3.0 Security Engineering
Given a scenario, troubleshoot common issues with identity and access management (IAM) components in an enterprise environment.
  • Subject access control
  • Biometrics
  • Secrets management
  • Conditional access
  • Attestation
  • Cloud IAM access and trust policies
  • Logging and monitoring
  • Privilege identity management
  • Authentication and authorization
Given a scenario, analyze requirements to enhance the security of endpoints and servers.
  • Application control
  • Endpoint detection response (EDR)
  • Event logging and monitoring
  • Endpoint privilege management
  • Attack surface monitoring and reduction
  • Host-based intrusion protection system/ host-based detection system (HIPS/ HIDS)
  • Anti-malware
  • SELinux
  • Host-based firewall
  • Browser isolation
  • Configuration management
  • Mobile device management (MDM) technologies
  • Threat-actor tactics, techniques, and procedures (TTPs)
Given a scenario, troubleshoot complex network infrastructure security issues.
  • Network misconfigurations
  • IPS/IDS issues
  • Observability
  • Domain Name System (DNS) security
  • Email security
  • Transport Layer Security (TLS) errors
  • Cipher mismatch
  • PKI issues
  • Issues with cryptographic implementations
  • DoS/distributed denial of service (DDoS)
  • Resource exhaustion
  • Network access control list (ACL) issues
Given a scenario, implement hardware security technologies and techniques.
  • Roots of trust
  • Security coprocessors
  • Virtual hardware
  • Host-based encryption
  • Self-encrypting drive (SED)
  • Secure Boot
  • Measured boot
  • Self-healing hardware
  • Tamper detection and countermeasures
  • Threat-actor TTPs
Given a set of requirements, secure specialized and legacy systems against threats.
  • Operational technology (OT)
  • Internet of Things (IoT)
  • System-on-chip (SoC)
  • Embedded systems
  • Wireless technologies/radio frequency (RF)
  • Security and privacy considerations
  • Industry-specific challenges
  • Characteristics of specialized/legacy systems
Given a scenario, use automation to secure the enterprise.
  • Scripting
  • Cron/scheduled tasks
  • Event-based triggers
  • Infrastructure as code (IaC)
  • Configuration files
  • Cloud APIs/software development kits (SDKs)
  • Generative AI
  • Containerization
  • Automated patching
  • Auto-containment
  • Security orchestration, automation, and response (SOAR)
  • Vulnerability scanning and reporting
  • Security Content Automation Protocol (SCAP)
  • Workflow automation
Explain the importance of advanced cryptographic concepts.
  • Post-quantum cryptography (PQC)
  • Key stretching
  • Key splitting
  • Homomorphic encryption
  • Forward secrecy
  • Hardware acceleration
  • Envelope encryption
  • Performance vs. security
  • Secure multiparty computation
  • Authenticated encryption with associated data (AEAD)
  • Mutual authentication
Given a scenario, apply the appropriate cryptographic use case and/or technique.
  • Use cases
  • Techniques
4.0 Security Operations
Given a scenario, analyze data to enable monitoring and response activities.
  • Security information event management (SIEM)
  • Aggregate data analysis
  • Behavior baselines and analytics
  • Incorporating diverse data sources
  • Alerting
  • Reporting and metrics
Given a scenario, analyze vulnerabilities and attacks, and recommend solutions to reduce the attack surface.
  • Vulnerabilities and attacks
  • Mitigations
Given a scenario, apply threat-hunting and threat intelligence concepts.
  • Internal intelligence sources
  • External intelligence sources
  • Counterintelligence and operational security
  • Threat intelligence platforms (TIPs)
  • Indicator of compromise (IoC) sharing
  • Rule-based languages
  • Indicators of attack
Given a scenario, analyze data and artifacts in support of incident response activities.
  • Malware analysis
  • Reverse engineering
  • Volatile/non-volatile storage analysis
  • Network analysis
  • Host analysis
  • Metadata analysis
  • Hardware analysis
  • Data recovery and extraction
  • Threat response
  • Preparedness exercises
  • Timeline reconstruction
  • Root cause analysis
  • Cloud workload protection platform (CWPP)
  • Insider threat

MCSEClasses.com is your best choice for CompTIA SecurityX, CompTIA SecurityX training, CompTIA SecurityX certification, CompTIA SecurityX certification boot camp, CompTIA SecurityX boot camp, CompTIA SecurityX certification training, CompTIA SecurityX boot camp training, CompTIA SecurityX boot camp certification, CompTIA SecurityX certification course, CompTIA SecurityX course, training CompTIA SecurityX, certification CompTIA SecurityX, boot camp CompTIA SecurityX, certification CompTIA SecurityX boot camp, certification CompTIA SecurityX training, boot camp CompTIA SecurityX training, certification CompTIA SecurityX course.



mcseclasses home | technical schedule | application schedule | class outlines | mcse, mcdba, mcsd training | microsoft .net | cisco certification | security training | ced solutions oracle® certification training | linux, unix, aix | comptia certification | webmaster training | pricing | locations | financing | instructors needed | e-mail us





Search classes by keyword:


Search classes by category:

Copyright © 2025 CED Solutions. CED Solutions Refund Policy. All Rights Reserved.