CompTIA

CompTIA SecurityX

Formerly CASP+

CompTIA SecurityX

SecurityX (formerly CASP+) covers the technical knowledge and skills required to architect, engineer, integrate, and implement secure solutions across complex environments to support a resilient enterprise while considering the impact of governance, risk, and compliance requirements.

Training at a glance

Level

Advanced

Duration

5 Days

Experience

5-10 years: Cybersecurity

Average Salary

$95,000

Labs

Yes

Level

Advanced

Duration

5 Days

Experience

5-10 years: Cybersecurity

Average Salary

$95,000

Labs

Yes

Training Details

CompTIA SecurityX is an advanced cybersecurity certification for experienced security architects and senior security engineers. This expert-level credential validates the ability to lead, design, and enhance an organization’s cybersecurity framework. SecurityX-certified professionals demonstrate expertise in implementing robust security strategies, mitigating risks, and ensuring enterprise-wide cybersecurity readiness. This course equips learners with the knowledge and skills to safeguard critical systems and drive cybersecurity innovation in a rapidly evolving threat landscape.

Course Objectives

The CompTIA SecurityX (CAS-005) validates that the successful candidate has the knowledge and skills required to: Formerly

  • Architect, engineer, integrate, and implement secure solutions across complex environments to support a resilient enterprise.
  • Utilize automation, monitoring, detection, and incident response to support ongoing security operations in an enterprise environment proactively.
  • Apply security best practices across cloud, on-premises, and hybrid environments.
  • Incorporate cryptographic technologies and techniques to strengthen information security, considering the impact of emerging trends such as artificial intelligence.
  • Implement appropriate governance, compliance, risk management, and threat-modeling strategies to enhance enterprise security and resilience.

Module 1: Introduction

  • Lesson 1.1: Preassessment

Module 2: Summarizing Governance Risk and Compliance

  • Lesson 2.1: Implement Appropriate Governance Components
  • Lesson 2.2: Explain Legal Compliance
  • Lesson 2.3: Apply Risk Management Strategies
  • Lesson 2.4: Module Quiz

Module 3: Implementing Architecture and Design

  • Lesson 3.1: Apply Software Development (Part 1)
  • Lesson 3.2: Apply Software Development (Part 2)
  • Lesson 3.3: Integrate Software Architecture (Part 1)
  • Lesson 3.4: Integrate Software Architecture (Part 2)
  • Lesson 3.5: Support Operational Resilience (Part 1)
  • Lesson 3.6: Support Operational Resilience (Part 2)
  • Lesson 3.7: Implement Cloud Infrastructure (Part 1)
  • Lesson 3.8: Implement Cloud Infrastructure (Part 2)
  • Lesson 3.9: Implement Cloud Infrastructure (Part 3)
  • Lesson 3.10: Integrate Zero Trust Concepts (Part 1)
  • Lesson 3.11: Integrate Zero Trust Concepts (Part 2)
  • Lesson 3.12: Troubleshoot using AAA and IAM (Part 1)
  • Lesson 3.13: Troubleshoot using AAA and IAM (Part 2)
  • Lesson 3.14: Module Quiz

Module 4: Understanding Security Engineering

  • Lesson 4.1: Enhance Endpoint Security (Part 1)
  • Lesson 4.2: Enhance Endpoint Security (Part 2)
  • Lesson 4.3: Configure Network Infrastructure
  • Lesson 4.4: Initiate Security Automation (Part 1)
  • Lesson 4.5: Initiate Security Automation (Part 2)
  • Lesson 4.6: Apply Cryptography Concepts (Part 1)
  • Lesson 4.7: Apply Cryptography Concepts (Part 2)
  • Lesson 4.8: Module Quiz

Module 5: Applying Security Operations and Incident Response

  • Lesson 5.1: Perform Threat Modeling
  • Lesson 5.2: Examine Security Monitoring (Part 1)
  • Lesson 5.3: Examine Security Monitoring (Part 2)
  • Lesson 5.4: Analyze Known Attack Methods and Associated Mitigations
  • Lesson 5.5: Apply Threat Hunting Tools and Technologies (Part 1)
  • Lesson 5.6: Apply Threat Hunting Tools and Technologies (Part 2)
  • Lesson 5.7: Evaluate Incident Analysis and Response (Part 1)
  • Lesson 5.8: Evaluate Incident Analysis and Response (Part 2)
  • Lesson 5.9: Module Quiz

At least 10 years of general hands-on IT experience, including at least 5 years of hands-on security experience, with expertise equivalent to Network+, Security+, CySA+, Cloud+, and PenTest+ certifications or similar knowledge.

Upcoming Classes

We Offer More Than Just CompTIA Training

Our successful training results keep our corporate and military clients returning. That’s because we provide everything you need to succeed. This is true for all of our courses.

Strategic Planning & Project Management

From Lean Six Sigma to Project Management Institute Project Management Professional, Agile and SCRUM, we offer the best-in-class strategic planning and project management training available. Work closely with our seasoned multi-decade project managers.

IT & Cybersecurity

ATA is the leading OffSec and Hack the Box US training provider, and a CompTIA and EC-Council award-winning training partner. We offer the best offensive and defensive cyber training to keep your team ahead of the technology skills curve.

Leadership & Management

Let us teach your team the high-level traits and micro-level tools & strategies of effective 21st-century leadership. Empower your team to play to each others’ strengths, inspire others and build a culture that values communication, authenticity, and community.

From Lean Six Sigma to Project Management Institute Project Management Professional, Agile and SCRUM, we offer the best-in-class strategic planning and project management training available. Work closely with our seasoned multi-decade project managers.
ATA is the leading OffSec and Hack the Box US training provider, and a CompTIA and EC-Council award-winning training partner. We offer the best offensive and defensive cyber training to keep your team ahead of the technology skills curve.
Let us teach your team the high-level traits and micro-level tools & strategies of effective 21st-century leadership. Empower your team to play to each others’ strengths, inspire others and build a culture that values communication, authenticity, and community.