CompTIA Advanced Security Practitioner (CASP)
computer Online: 9. Feb 2026 bis 13. Feb 2026 |
placeMünchen 9. Feb 2026 bis 13. Feb 2026 |
placeWien 9. Feb 2026 bis 13. Feb 2026 |
computer Online: 16. Feb 2026 bis 20. Feb 2026 |
placeBerlin 16. Feb 2026 bis 20. Feb 2026 |
placeHamburg 16. Feb 2026 bis 20. Feb 2026 |
computer Online: 23. Feb 2026 bis 27. Feb 2026 |
placeBasel 23. Feb 2026 bis 27. Feb 2026 |
placeFreiburg 23. Feb 2026 bis 27. Feb 2026 |
placeGenf 23. Feb 2026 bis 27. Feb 2026 |
placeHeidelberg 23. Feb 2026 bis 27. Feb 2026 |
placeKarlsruhe 23. Feb 2026 bis 27. Feb 2026 |
placeSaarbrücken 23. Feb 2026 bis 27. Feb 2026 |
placeStuttgart 23. Feb 2026 bis 27. Feb 2026 |
placeZürich 23. Feb 2026 bis 27. Feb 2026 |
computer Online: 16. Mär 2026 bis 20. Mär 2026 |
placeFrankfurt 16. Mär 2026 bis 20. Mär 2026 |
placeKöln 16. Mär 2026 bis 20. Mär 2026 |
placeMadrid 16. Mär 2026 bis 20. Mär 2026 |
computer Online: 23. Mär 2026 bis 27. Mär 2026 |
- Summarise business and industry influences and associated security risks.
- Compare and contrast security, privacy policies and procedures based on organisational requirements.
- Given a scenario, execute risk mitigation strategies and controls.
- Analyse risk metric scenarios to secure the enterprise.
- Analyse a scenario and integrate network and security components, concepts and architectures to meet security requirements.
- Analyse a scenario to integrate security controls for host devices to meet security requirements.
- Analyse a scenario to integrate security controls for mobile and small form factor devices to meet s…
Es wurden noch keine FAQ hinterlegt. Falls Sie Fragen haben oder Unterstützung benötigen, kontaktieren Sie unseren Kundenservice. Wir helfen gerne weiter!
- Summarise business and industry influences and associated security risks.
- Compare and contrast security, privacy policies and procedures based on organisational requirements.
- Given a scenario, execute risk mitigation strategies and controls.
- Analyse risk metric scenarios to secure the enterprise.
- Analyse a scenario and integrate network and security components, concepts and architectures to meet security requirements.
- Analyse a scenario to integrate security controls for host devices to meet security requirements.
- Analyse a scenario to integrate security controls for mobile and small form factor devices to meet security requirements.
- Given software vulnerability scenarios, select appropriate security controls
- Given a scenario, conduct a security assessment using the appropriate methods.
- Analyse a scenario or output, and select the appropriate tool for a security assessment.
- Given a scenario, implement incident response and recovery procedures
- Given a scenario, integrate hosts, storage, networks and applications into a secure enterprise architecture.
- Given a scenario, integrate cloud and virtualisation technologies into a secure enterprise architecture.
- Given a scenario, integrate and troubleshoot advanced authentication and authorisation technologies to support enterprise security objectives.
- Given a scenario, implement cryptographic techniques.
- Given a scenario, select the appropriate control to secure communications and collaboration solutions.
- Given a scenario, apply research methods to determine industry trends and their impact to the enterprise
- Given a scenario, implement security activities across the technology life cycle.
- Explain the importance of interaction across diverse business units to achieve security goals.
Es wurden noch keine FAQ hinterlegt. Falls Sie Fragen haben oder Unterstützung benötigen, kontaktieren Sie unseren Kundenservice. Wir helfen gerne weiter!
