CompTIA Advanced Security Practitioner (CASP)
computer Online: 19. Jan 2026 bis 23. Jan 2026 |
placeAugsburg 19. Jan 2026 bis 23. Jan 2026 |
placeGraz 19. Jan 2026 bis 23. Jan 2026 |
placeInnsbruck 19. Jan 2026 bis 23. Jan 2026 |
placeMünchen 19. Jan 2026 bis 23. Jan 2026 |
placeNürnberg 19. Jan 2026 bis 23. Jan 2026 |
placePassau 19. Jan 2026 bis 23. Jan 2026 |
placeRegensburg 19. Jan 2026 bis 23. Jan 2026 |
placeSalzburg 19. Jan 2026 bis 23. Jan 2026 |
placeWien 19. Jan 2026 bis 23. Jan 2026 |
placeWürzburg 19. Jan 2026 bis 23. Jan 2026 |
computer Online: 26. Jan 2026 bis 30. Jan 2026 |
placeBarcelona 26. Jan 2026 bis 30. Jan 2026 |
placeBilbao 26. Jan 2026 bis 30. Jan 2026 |
placeDortmund 26. Jan 2026 bis 30. Jan 2026 |
placeDüsseldorf 26. Jan 2026 bis 30. Jan 2026 |
placeEssen 26. Jan 2026 bis 30. Jan 2026 |
placeFrankfurt 26. Jan 2026 bis 30. Jan 2026 |
placeKöln 26. Jan 2026 bis 30. Jan 2026 |
placeMadrid 26. Jan 2026 bis 30. Jan 2026 |
- Summarise business and industry influences and associated security risks.
- Compare and contrast security, privacy policies and procedures based on organisational requirements.
- Given a scenario, execute risk mitigation strategies and controls.
- Analyse risk metric scenarios to secure the enterprise.
- Analyse a scenario and integrate network and security components, concepts and architectures to meet security requirements.
- Analyse a scenario to integrate security controls for host devices to meet security requirements.
- Analyse a scenario to integrate security controls for mobile and small form factor devices to meet s…
Es wurden noch keine FAQ hinterlegt. Falls Sie Fragen haben oder Unterstützung benötigen, kontaktieren Sie unseren Kundenservice. Wir helfen gerne weiter!
- Summarise business and industry influences and associated security risks.
- Compare and contrast security, privacy policies and procedures based on organisational requirements.
- Given a scenario, execute risk mitigation strategies and controls.
- Analyse risk metric scenarios to secure the enterprise.
- Analyse a scenario and integrate network and security components, concepts and architectures to meet security requirements.
- Analyse a scenario to integrate security controls for host devices to meet security requirements.
- Analyse a scenario to integrate security controls for mobile and small form factor devices to meet security requirements.
- Given software vulnerability scenarios, select appropriate security controls
- Given a scenario, conduct a security assessment using the appropriate methods.
- Analyse a scenario or output, and select the appropriate tool for a security assessment.
- Given a scenario, implement incident response and recovery procedures
- Given a scenario, integrate hosts, storage, networks and applications into a secure enterprise architecture.
- Given a scenario, integrate cloud and virtualisation technologies into a secure enterprise architecture.
- Given a scenario, integrate and troubleshoot advanced authentication and authorisation technologies to support enterprise security objectives.
- Given a scenario, implement cryptographic techniques.
- Given a scenario, select the appropriate control to secure communications and collaboration solutions.
- Given a scenario, apply research methods to determine industry trends and their impact to the enterprise
- Given a scenario, implement security activities across the technology life cycle.
- Explain the importance of interaction across diverse business units to achieve security goals.
Es wurden noch keine FAQ hinterlegt. Falls Sie Fragen haben oder Unterstützung benötigen, kontaktieren Sie unseren Kundenservice. Wir helfen gerne weiter!
