Course Code: IT 117
212 Course Visits
CompTIA Advanced Security Practitioner (CASP+)
Course Sector:
Information Technology
Course Dates and Locations
Choose a date and location to book your seat
No.
Date
Days
Location
Fees
Enrollment
01
21 - 25 Jul 2025
5 Days
Vienna, Austria
$4,950
02
03 - 07 Nov 2025
5 Days
Dubai, UAE
$4,250
Introduction
Training course introducion / brief

This training course is designed to provide participants with the fundamental concept and knowledge on information security to apply more advanced principles and keep your organization safe from threats. Today's advanced digital world demands IT professionals and individuals with a higher demonstrable skill. This course will help participants develop the skill set needed to confidently perform the tasks as an advanced security professional. 

Course Objectives
At the end of the training course, participants will be able to

  • Determine and choose among different types of virtualized, distributed and shared computing
  • Integrate hosts, networks, infrastructures, applications and storage into secure comprehensive solutions
  • Discuss the security implications of enterprise storage
  • Know the importance of application security
  • Conduct security activities across the technology life cycle
  • Perform relevant analysis for the purpose of securing the enterprise
  • Integrate and implement secure solutions across complex environments to support a resilient enterprise
  • Use monitoring, detection, incident response and automation to proactively support ongoing security operations in an enterprise environment
  • Apply security practices to cloud, on-premises, endpoint and mobile infrastructure, while considering cryptographic technologies and techniques
  • Consider the impact of governance, risk and compliance requirements throughout the enterprise

Course Audience
Who is this course for, and can benefit the most

This training course is designed for IT professionals who want to acquire the technical knowledge and skills needed to conceptualize, engineer, integrate, and implement secure solutions across complex enterprise environments. IT professionals should have at least a minimum of 10 years of experience in IT administration and at least five years of hands-on security in an enterprise environment

Course Outline
The course aims and learning outcomes

Module 1: Security Architecture

  • Given a scenario, analyze the security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network.
  • Given a scenario, analyze the organizational requirements to determine the proper infrastructure security design.
  • Given a scenario, integrate software applications securely into an enterprise architecture.
  • Given a scenario, implement data security techniques for securing enterprise architecture.
  • Given a scenario, analyze the security requirements and objectives to provide the appropriate authentication and authorization controls

Module 1: Security Architecture

  • Explain how cryptography and public key infrastructure (PKI) support security objectives and requirements
  • Explain the impact of emerging technologies on enterprise security and privacy.

 

Module 2: Security Operations

  • Given a scenario, perform threat management activities.
  • Given a scenario, analyze indicators of compromise and formulate an appropriate response
  • Given a scenario, perform vulnerability management activities.
  • Given a scenario, use the appropriate vulnerability assessment and penetration testing methods and tools.

Module 2: Security Operations

  • Given a scenario, analyze vulnerabilities and recommend risk mitigations.
  • Given a scenario, use processes to reduce risk
  • Given an incident, implement the appropriate response.
  • Explain the importance of forensic concepts.
  • Given a scenario, use forensic analysis tools.


Module 3: Security Engineering and Cryptography

  • Given a scenario, apply secure configurations to enterprise mobility.
  • Given a scenario, configure and implement endpoint security controls.
  • Explain security considerations impacting specific sectors and operational technologies.
  • Explain how cloud technology adoption impacts organizational security
  • Given a business requirement, implement the appropriate PKI solution.
  • Given a business requirement, implement the appropriate cryptographic protocols and algorithms
  • Given a scenario, troubleshoot issues with cryptographic implementations.


  • Module 4: Governance, Risk, and Compliance
  • Given a set of requirements, apply the appropriate risk strategies
  • Explain the importance of managing and mitigating vendor risk.
  • Explain compliance frameworks and legal considerations, and their organizational impact.
  • Explain the importance of business continuity and disaster recovery concepts


Providers and Associations
Providing the best training services and benefits to our valued clients
Boost certificate of completion
BOOST's Professional Attendance Certificate “BPAC” is always given to the delegates after completing the training course, and depends on their attendance of the program at a rate of no less than 80%, besides their active participation and engagement during the program sessions.
ENDORSED EDUCATION PROVIDER
Over all rating
Excellent
Average
Below average
Flexible deadlines
Customized dates accordance to your schedule
Shareable Certificate
Earn certificate upon completion
COURSE METHODOLOGY

Our Training programs are implemented by combining the participants' academic knowledge and practical practice (30% theoretical / 70% practical activities).

At The end of the training program, Participants are involved in practical workshop to show their skills in applying what they were trained for. A detailed report is submitted to each participant and the training department in the organization on the results of the participant's performance and the return on training. Our programs focus on exercises, case studies, and individual and group presentations.

Trending Courses
The most bespoke and flexible training courses
10
Nov
- 05 -
Days
Practical Negotiation Skills for Contract Management
Jeddah, KSA
20
Jan
- 05 -
Days
Leading and Building a Positive, Motivated, and Empowered Teams
Online, Virtual
18
Aug
- 05 -
Days
ISO 55001 2014 Lead Auditor (Asset Management Systems) – Lead Auditor
Muscat, Oman
20
Jan
- 05 -
Days
Certified Treasury Professional
Dubai, UAE
14
Sep
- 05 -
Days
Competitive Bidding: Understanding Procurement Bids
Riyadh, KSA
10
Aug
- 05 -
Days
Emotional Intelligence and Advanced Communication Skills for Leaders
Salalah, Oman
01
Sep
- 05 -
Days
Certified Business Analysis Professional- IIBA
Dubai, UAE
30
Jun
- 05 -
Days
The Risk Management Professional (PMI-RMP Exam Preparation)
Istanbul, Turkey
10
Feb
- 05 -
Days
The Scheduling Professional (PMI-SP Exam Preparation)
Dubai, UAE
01
Sep
- 05 -
Days
Introduction to Machine Learning and Artificial Intelligence
Abu Dhabi, UAE
13
Apr
- 05 -
Days
OSHA: Occupational Safety and Health Administration Standards
Riyadh, KSA
15
Dec
- 05 -
Days
The Business Analyst (PBA) - PMI Certified
Dubai, UAE
18
May
- 05 -
Days
Professional in Business Analysis (PMI-PBA Exam Preparation)
Jeddah, KSA
24
Nov
- 03 -
Days
Happiness To Have and Hold
Dubai, UAE
17
Feb
- 05 -
Days
Artificial Intelligence for Leaders
Abu Dhabi, UAE
07
Apr
- 05 -
Days
IOSH Managing and Working Safely
Abu Dhabi, UAE