This is an intense, 5-day, Instructor-Led, CompTIA Authorized SecurityX Certification course that prepares students to pass the SecurityX Exam from CompTIA. This is achieved through a combination of lecture, review, drill sessions, extensive mentoring, practice questions and answer sessions. We are a CompTIA Authorized Training Provider using courseware that is constantly updated to make sure we are covering and synchronized with the latest exam objectives.
The SecurityX exam will certify that the successful candidate has the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. The candidate will apply critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers. Our 5-day SecurityX bootcamp will provide you with a fast proven method for mastering all of the SecurityX domains. If you are looking to pass the SecurityX exam, you found the right place. This 5-day bootcamp is geared for the government, military and contractors seeking 8140 compliance. Classes are scheduled across the USA and also live online.
Have a group of 5 or more people? Let us know and we can deliver a PRIVATE SESSION at your location.
Training Includes:
- The top CompTIA SecurityX training in the industry
- Instruction by a high-level Certified CompTIA expert
- SecurityX Courseware - continually updated
- Practice and skill development
- SecurityX Practice questions & quizzes
- Class hours: 8:00 - 4:00 daily
- Snacks and beverages provided daily
- SecurityX exam voucher included
- Free exam retake if needed
Learning Objectives
You will be tested on the following four major exam objectives:
Governance, Risk, and Compliance: Prove an organization's overall cybersecurity resiliency metric and compliance to regulations, such as CMMC, PCI-DSS, SOX, HIPAA, GDPR, FISMA, NIST and CCPA. Security Architecture Analyze security requirements in hybrid networks to work toward an enterprise-wide, zero trust security architecture with advanced secure cloud and virtualization solutions. Security Engineering Configurations for endpoint security controls, enterprise mobility, cloud/hybrid environments, and enterprise-wide PKI and Cryptographic solutions. Security Operations Address advanced threat management, vulnerability management, risk mitigation, incident response tactics and digital forensics analysis.
CompTIA SecurityX (CAS-005) Course Outline
Governance, Risk, and Compliance
- Implement the appropriate governance components.
- Perform risk management activities.
- Explain how compliance affects information security strategies.
- Perform threat-modeling activities.
- Summarize the information security challenges associated with artificial intelligence (AI)
Analyze requirements to design resilient systems
- Implement security in the early stages of the systems life cycle and throughout subsequent stages.
- Integrate appropriate controls in the design of a secure architecture.
- Apply security concepts to the design of access, authentication, and authorization systems.
- Securely implement cloud capabilities in an enterprise environment.
- Integrate Zero Trust concepts into system architecture design.
Security Engineering
- Troubleshoot common issues with identity and access management (IAM) components in an enterprise environment.
- Analyze requirements to enhance the security of endpoints and servers.
- Troubleshoot complex network infrastructure security issues.
- Implement hardware security technologies and techniques.
- Secure specialized and legacy systems against threats.
- Use automation to secure the enterprise.
- Explain the importance of advanced cryptographic concepts.
- Apply the appropriate cryptographic use case and/or technique.
Security Operations
- Analyze data to enable monitoring and response activities.
- Analyze vulnerabilities and attacks and recommend solutions to reduce the attack surface.
- Apply threat-hunting and threat intelligence concepts.
- Analyze data and artifacts in support of incident response activities.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):