Course Descriptions



5 days


The CompTIA Advanced Security Practitioner certification validates advanced-level competency in risk management; enterprise security operations and architecture; research and collaboration; and integration of enterprise security. Successful candidates will have the knowledge required to:

  • Enterprise Security domain expanded to include operations and architecture concepts, techniques, and requirements

  • More emphasis on analyzing risk through interpreting trend data and anticipating cyber defense needs to meet business goals

  • Expanding security control topics to include Mobile and small form factor devices, as well as software vulnerability

  • Broader coverage of integrating cloud and virtualization technologies into a secure enterprise architecture

  • Inclusion of implementing cryptographic techniques, such as Blockchain- Cryptocurrency and Mobile device encryption


  1. Enterprise Security

    • Given a scenario, select appropriate cryptographic concepts and techniques.

    • Explain the security implications associated with enterprise storage.

    • Given a scenario, analyze network and security components, concepts and architectures.

    • Given a scenario, select and troubleshoot security controls for hosts

    • Differentiate application vulnerabilities and select appropriate security controls

  2. Risk Management and Incident Response

    • Interpret business and industry influences and explain associated security risks.

    • Given a scenario, execute risk mitigation planning, strategies and controls.

    • Compare and contrast security, privacy policies and procedures based on organizational requirements

    • Given a scenario, conduct incident response and recovery procedures.

  3. Research, Analysis and Assessment

    • Apply research methods to determine industry trends and impact to the enterprise.

    • Analyze scenarios to secure the enterprise.

    • Given a scenario, select methods or tools appropriate to conduct an assessment and analyze results.

  4. Integration of Computing, Communications and Business Disciplines

    • Given a scenario, facilitate collaboration across diverse business units to achieve security goals

    • Given a scenario, select the appropriate control to secure communications and collaboration solutions.

    • Implement security activities across the technology life cycle.

  5. Technical Integration of Enterprise Components

    • Given a scenario, integrate hosts, storage, networks and applications into a secure enterprise architecture.

    • Given a scenario, integrate advanced authentication and authorization technologies to support enterprise objectives.

Request a Quote