• Home
  • Course Catalog
  • Contact Us
  • Request info
    Contact Us
    First Name*
    Last Name*
    Lead Status
    Lead Source*
    Referral Information
    External Referrer
    Partner SMEC ID
    Enter text from the pic*

    Certified Advanced Security Practitioner with Labs


    Additional information


    Data sheet

    Certification included

    To request more information, you can contact us via online chat, our website contact form, or toll free at 1-855-201-6910.

    Online courses are accessible 24/7/365 and self-paced, allowing you to progress at your own pace on your own schedule. They can be taken from anywhere in the world from the comfort of your own home. Classroom courses have a set schedule of the days and times the courses will be held, and you must attend during those specific times.

    Find out if online learning is right for you by contacting our team of registration advisers. Our team is available to answer any of your questions about taking an online course before you commit to enrolling. We will walk you through what to expect to ensure you are making the right decision. You can contact a registration adviser today via online chat, our website contact form, or toll free at 1-855-201-6910.

    No, you are not required to have a diploma or higher education degree to enroll in an online course. However, some occupations may require minimum educational thresholds for employment or certification. For more information on your desired career requirements, please contact us via online chat, our website contact form, or toll free at 1-855-201-6910.

    To take an online course, you will need to have access to an internet connection and an internet ready device such as a laptop, PC, or tablet. For course specific requirements, please visit the course page or contact a registration adviser today.

    Our courses are developed with multiple formats including text, audio, video, and interactivity. Our courses also include multiple resources and tools which can include flashcards, games, activities, and more.

    No, you can take the online courses from anywhere in the world.

    We participate in several financial assistance options including third party funding, both military and non-military. To request more information on the financial assistance options available and check your eligibility, contact us via online chat, our website contact form, or toll free at 1-855-201-6910.

    Duration is the amount of time you will receive access to your course. Durations vary by course and range between 1 month and 12 months. If you complete your course before your duration ends you will continue to have access to your course until the duration period ends.

    Many of our career training programs include certification vouchers. This means that at the successful completion of your course, at no additional charge, you will receive an exam voucher for the corresponding industry certification. This voucher will allow you to register and sit for the appropriate certification exam to obtain your industry credential.

    Our online courses are open enrollment, so you can start immediately. If you are using any third-party funding to cover your course tuition, your start date may be a future date determined by your funding program.

    Once enrolled, you will be assigned a client adviser who will provide you with customer and technical support. Your client adviser will supply you with your course access information, any needed materials, and be available to answer any questions you have during your training experience. They will regularly check-in with you to monitor your progress and assist you with staying on track. You will also be assigned to a course mentor who will provide curriculum support throughout your training. Your mentor is available to answer any questions you have on your course curriculum, will monitor your progress and understanding of the curriculum, and may give assignments or quizzes.

    If you experience any trouble accessing your course including technical issues or lost login credentials, please contact your client adviser at helpdesk@worldeducation.net.

    We strive to provide a fully online experience for students however some of our training courses include physical materials or equipment. Courses that have materials shipped directly to students will be shipped within 7 business days of registration. Some training courses have material for different sections and these courses may require multiple shipments as you completed stages of your course.

    Our goal for students is to successfully complete their training course and achieve their career goals. We understand that extenuating circumstances can interfere with your ability to complete your course in the duration given. Because of this we have free or low-cost extensions available for our courses upon request. To discuss or request an extension please contact your client adviser at helpdesk@worldeducation.net.

    Upon successful completion of your course and fulfillment of any outstanding financial obligations, you will receive your certificate of completion. Certificates are provided to you within 30 days of completion. Your certificate will validate the training course you completed with a stamp of completion.

    Students that successfully complete our career training programs are assigned a career development adviser who will coordinate placement at a local externship or hands on opportunity. These opportunities are optional and may vary based on availability and occupation. Your career development adviser will also provide job search services such as: resume building, mock interviews, job opportunity resources, and more. Our professional enrichment courses do not come with a career adviser or career services.

    Website Short Description

    The current landscape of cybersecurity requires specialized skills to troubleshoot via customized hacks and build solid solutions. Each hack is unique and must be combated with master-level security skills and experience. As a CASP-certified IT professional, you will demonstrate that you can provide the best cybersecurity solutions and protection for organizations worldwide. The CASP exam covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers, while managing risk.
    This course includes an exam voucher for CompTIA CASP Exam!
    This course also includes 3 Practice Labs! With our Practice Labs we cover topics for the CompTIA CASP exam using real CompTIA equipment. The associated lab guides cover exam and real world scenarios carried out


    12 months



    Instructor Description

    Though this course is self-paced, it is supported by a client adviser. Client advisers are available to answer student questions and monitor student progress to ensure completion of the course. Motivating and encouraging students, the client adviser gives students inspiration to succeed.

    Required Materials

    All required reference materials are provided with this program. Technical requirements:

    Internet Connection
    • Broadband or High-Speed (DSL, Cable, Wireless)
    Hardware Requirements
    • Processor - 2GHz Processor or Higher
    • Memory - 1 GB RAM Minimum Recommended

    Software Requirements
    • Operating Systems - Windows 7, 8 or 10; Mac OS x 10 or higher
    • Internet Browsers - Google Chrome is highly recommended
    • Cookies MUST be enabled
    • Pop-ups MUST be allowed (Pop-up Blocker disabled)


    Chapter 01 - Understanding Risk Management Lesson A: Understanding Business and Industry Influences • Ongoing Risk Management • New Products and User Behaviors • Business Models and Strategies • Cloud Technologies • Acquisitions and Mergers • Due Diligence Team • Data Ownership • Data Reclassification • Integrating Diverse Industries • Common Regulations • Geographic Differences • Data Sovereignty • Internal and External Influences • De-perimeterization • Understand Changes in Network Boundaries Lesson B: Policies and Procedures • Understanding Policies and Procedures • Policy Life Cycle • Process Life Cycle • Reviewing Policies and Processes • Common Business Documents • Security for Contracts • Contract Requirements • General Privacy Principles • Standard Security Practices • Demo - Examining Security Policies Lesson C: Risk Mitigation and Control • Introduction to Risk Mitigation • Categorizing Data • Incorporating Stakeholder Input • Aggregate CIA Scores • Selecting and Implementing Controls • Security Control Frameworks • Options for Frameworks • Extreme Scenario Planning • System-Specific Risk Analysis • Qualitative Risk Analysis • Quantitative Risk Analysis • Risk Impact • Likelihood of Threat • Return on Investment • Understanding Payback • Total Cost of Ownership • TCO Guidelines • Translate to Business Terms • Risk Management Strategies • Risk Management Processes • Information and Asset Value and Costs • Vulnerabilities and Threat Identification • Additional Factors Lesson D: Business Continuity Planning • Continuity Planning • BCP Components • BCP Steps • Additional Plans • Conducting Business Impact Analysis • Chapter 01 Review Chapter 02 - Network and Security Components and Architecture Lesson A: Physical and Virtual Network • Security Devices • Unified Threat Management • Analyzing UTM • Intrusion Detection and Prevention • In-Line Network Encryptor • Network Access Control • SIEM • Firewalls • Firewall Architecture • Wireless Controller • Routers and Switches • Proxy Servers Lesson B: Application and Protocol Level Security • Web Application Firewalls • Hardware Security Modules • Vulnerability Scanners Lesson C: Advanced Network Design • Virtual Private Networks • VPN Protocols • IP Security (IPSec) • IPSec Modes • Demo - Examining IPSec Policies • Secure Sockets Layer (SSL) • Transport Layer Security (TLS) • Additional Security Protocols • Authentication Protocols Lesson D: Network Solutions for Data Flow • Data Loss Prevention • Data Flow Enforcement • Network Flow Lesson E: Secure Baselines of Networking and Security Components • Securing Device Configurations • Access Control Lists (ACLs) • ACL Rule Sets • Change Monitoring • Configuration Lockdown • Availability Controls • Disk Availability • Key Availability Terms Lesson F: Advanced Configuration of Network Devices • Additional Configurations • Transport Security • Trunking Security • Port Security • Ports and Sockets • Security Zones • Network Segmentation • Network Access Control • NAC Concepts • Network Enabled Devices • Automation Systems • Physical Security • Chapter 02 Review Chapter 03 - Implementing Advanced Authentication and Cryptographic Techniques Lesson A: Understanding Authentication and Authorization Concepts • Authentication • The Importance of Identity • Additional Password Options • Demo - Enforcing Strong Passwords • Biometric Authentication • Biometric Considerations • Beyond Single Factor • Certificate Authentication • Authorization • Open Authorization • XACML • SPML • Authorization Concepts • Trust Models Lesson B: Cryptographic Techniques • Introduction to Cryptography • Cryptographic Techniques • Key Stretching • Hashing • Message Digest (MD) Algorithms • Secure Hash Algorithm (SHA) • Digital Signatures • Message Authentication • Code Signing • Additional Concepts • Protecting Data in Transit • Protecting Data in Memory • Protecting Data at Rest • Symmetric Algorithms • Asymmetric Algorithms • Encryption Methods Lesson C: Cryptographic Implementations • Crypto Options • Additional Crypto Options • Cryptographic Applications • Crypto Considerations • Stream vs. Block Ciphers • Block Cipher Modes • Public Key Infrastructure • Primary PKI Functions • Additional PKI Concepts • Chapter 03 Review Chapter 04 - Implementing Security for Systems, Applications, and Storage Lesson A: Security for Host Devices • Trusted OS • Trusted OS Options • Security Software • Additional Host-Based Software Options • Demo - Configuring a Host-Based Firewall • Auditing • Demo - Configuring Audit Policies • Endpoint Detection Response • Host Hardening • Group Policy • Demo - Configuring Group Policy Security • Command Shell Restrictions • Out-of-Band Management • Dedicated Interfaces • External I/O Restrictions • Wireless Technologies • Wi-Fi Components • 802.11 Standards • Wireless Security • Securing Other Host Devices • Boot Security • Additional Boot Security Options Lesson B: Mobile Device Security • Enterprise Mobility Management • MDM Concepts • Management Options • Context Aware Management • Security and Privacy • Physical Security Options • Additional Mobile Device Concepts • Authentication Options • Mobile Devices • Wearable Security Implications Lesson C: Software Security Controls • Application Security Design Considerations • Application Issues • Data Remnants • Securing Applications • Using JSON and REST • Browser Extensions • Application Vulnerabilities • Chapter 04 Review Chapter 05 - Implementing Security for Cloud and Virtualization Technologies Lesson A: Cloud and Virtualization Technology • Cloud Computing and Virtualization • Cloud Options • Security Considerations • Cloud Service Models • Demo - Examining Cloud Service Models • Security and Virtualization • Cloud-Augmented Security Services • Security as a Service • Virtualization Vulnerabilities Lesson B: Securing Remote Access and Collaboration • Remote Access • Dial-Up Access • Virtual Private Networks • Remote Access Purposes • Security Considerations • Unified Collaboration Tools • Web Conferencing • Video Conferencing • Storage and Document Collaboration • Unified Communication • Instant Messaging • Presence • E-Mail • Chapter 05 Review Chapter 06 - Utilizing Security Assessments and Incident Response Lesson A: Security Assessments • Importance of Security Assessments • Malware Sandboxing • Memory Dumping • Runtime Debugging • Reconnaissance • Fingerprinting • Code Review • Social Engineering • Public Information • Demo - Accessing Public Information • Penetration Test • Vulnerability Assessment • Assessment Styles Lesson B: Security Assessment Tools • Network Tool Types • Security Content Automation Protocol (SCAP) • Common Vulnerability Scoring System (CVSS) • Fuzzing • Exploit Kits • Host Tools • Additional Host Tools • Physical Security Tools Lesson C: Incident Response and Recovery • E-discovery • Data Breach • Incident Response Process • Chapter 06 Review • Course Closure



    There are no prerequisites, but at least a familiarity with the internet and with basic security concepts is recommended.

    Technical Requirements

    All required reference materials are provided with this program. Technical requirements: Internet Connection • Broadband or High-Speed (DSL, Cable, Wireless) Hardware Requirements • Processor - 2GHz Processor or Higher • Memory - 1 GB RAM Minimum Recommended Software Requirements • Operating Systems - Windows 7, 8 or 10; Mac OS x 10 or higher • Internet Browsers - Google Chrome is highly recommended • Cookies MUST be enabled • Pop-ups MUST be allowed (Pop-up Blocker disabled)


    CASP covers enterprise security, risk management and incident response, research and analysis, integration of computing, communications and business disciplines as well as technical integration of enterprise components. Each state may have additional licensing requirements, be sure to research your states requirements for employment by visiting your states occupation board.


    No reviews yet. Try this course and be the first to review!

    Write your review

    The following email wasn't used for buying this product