CompTIA Advanced Security Practitioner (CASP)
computer Online: 13. Apr 2026 bis 17. Apr 2026 |
placeStuttgart 13. Apr 2026 bis 17. Apr 2026 |
placeZürich 13. Apr 2026 bis 17. Apr 2026 |
computer Online: 20. Apr 2026 bis 24. Apr 2026 |
placeBerlin 20. Apr 2026 bis 24. Apr 2026 |
placeHamburg 20. Apr 2026 bis 24. Apr 2026 |
computer Online: 27. Apr 2026 bis 1. Mai 2026 |
computer Online: 11. Mai 2026 bis 15. Mai 2026 |
computer Online: 18. Mai 2026 bis 22. Mai 2026 |
placeFrankfurt 18. Mai 2026 bis 22. Mai 2026 |
placeKöln 18. Mai 2026 bis 22. Mai 2026 |
placeMadrid 18. Mai 2026 bis 22. Mai 2026 |
computer Online: 25. Mai 2026 bis 29. Mai 2026 |
computer Online: 15. Jun 2026 bis 19. Jun 2026 |
placeStuttgart 15. Jun 2026 bis 19. Jun 2026 |
placeZürich 15. Jun 2026 bis 19. Jun 2026 |
computer Online: 22. Jun 2026 bis 26. Jun 2026 |
placeAugsburg 22. Jun 2026 bis 26. Jun 2026 |
placeGraz 22. Jun 2026 bis 26. Jun 2026 |
placeInnsbruck 22. Jun 2026 bis 26. Jun 2026 |
- Summarise business and industry influences and associated security risks.
- Compare and contrast security, privacy policies and procedures based on organisational requirements.
- Given a scenario, execute risk mitigation strategies and controls.
- Analyse risk metric scenarios to secure the enterprise.
- Analyse a scenario and integrate network and security components, concepts and architectures to meet security requirements.
- Analyse a scenario to integrate security controls for host devices to meet security requirements.
- Analyse a scenario to integrate security controls for mobile and small form factor devices to meet s…
Es wurden noch keine FAQ hinterlegt. Falls Sie Fragen haben oder Unterstützung benötigen, kontaktieren Sie unseren Kundenservice. Wir helfen gerne weiter!
- Summarise business and industry influences and associated security risks.
- Compare and contrast security, privacy policies and procedures based on organisational requirements.
- Given a scenario, execute risk mitigation strategies and controls.
- Analyse risk metric scenarios to secure the enterprise.
- Analyse a scenario and integrate network and security components, concepts and architectures to meet security requirements.
- Analyse a scenario to integrate security controls for host devices to meet security requirements.
- Analyse a scenario to integrate security controls for mobile and small form factor devices to meet security requirements.
- Given software vulnerability scenarios, select appropriate security controls
- Given a scenario, conduct a security assessment using the appropriate methods.
- Analyse a scenario or output, and select the appropriate tool for a security assessment.
- Given a scenario, implement incident response and recovery procedures
- Given a scenario, integrate hosts, storage, networks and applications into a secure enterprise architecture.
- Given a scenario, integrate cloud and virtualisation technologies into a secure enterprise architecture.
- Given a scenario, integrate and troubleshoot advanced authentication and authorisation technologies to support enterprise security objectives.
- Given a scenario, implement cryptographic techniques.
- Given a scenario, select the appropriate control to secure communications and collaboration solutions.
- Given a scenario, apply research methods to determine industry trends and their impact to the enterprise
- Given a scenario, implement security activities across the technology life cycle.
- Explain the importance of interaction across diverse business units to achieve security goals.
Es wurden noch keine FAQ hinterlegt. Falls Sie Fragen haben oder Unterstützung benötigen, kontaktieren Sie unseren Kundenservice. Wir helfen gerne weiter!
