CompTIA Advanced Security Practitioner (CASP)
computer Online: 26. Jan 2026 bis 30. Jan 2026 |
placeBarcelona 26. Jan 2026 bis 30. Jan 2026 |
placeBilbao 26. Jan 2026 bis 30. Jan 2026 |
placeDortmund 26. Jan 2026 bis 30. Jan 2026 |
placeDüsseldorf 26. Jan 2026 bis 30. Jan 2026 |
placeEssen 26. Jan 2026 bis 30. Jan 2026 |
placeFrankfurt 26. Jan 2026 bis 30. Jan 2026 |
placeKöln 26. Jan 2026 bis 30. Jan 2026 |
placeMadrid 26. Jan 2026 bis 30. Jan 2026 |
placeMalaga 26. Jan 2026 bis 30. Jan 2026 |
placeMünster 26. Jan 2026 bis 30. Jan 2026 |
placeValencia 26. Jan 2026 bis 30. Jan 2026 |
computer Online: 9. Feb 2026 bis 13. Feb 2026 |
placeMünchen 9. Feb 2026 bis 13. Feb 2026 |
placeWien 9. Feb 2026 bis 13. Feb 2026 |
computer Online: 16. Feb 2026 bis 20. Feb 2026 |
placeBerlin 16. Feb 2026 bis 20. Feb 2026 |
placeHamburg 16. Feb 2026 bis 20. Feb 2026 |
computer Online: 23. Feb 2026 bis 27. Feb 2026 |
placeBasel 23. Feb 2026 bis 27. Feb 2026 |
- Summarise business and industry influences and associated security risks.
- Compare and contrast security, privacy policies and procedures based on organisational requirements.
- Given a scenario, execute risk mitigation strategies and controls.
- Analyse risk metric scenarios to secure the enterprise.
- Analyse a scenario and integrate network and security components, concepts and architectures to meet security requirements.
- Analyse a scenario to integrate security controls for host devices to meet security requirements.
- Analyse a scenario to integrate security controls for mobile and small form factor devices to meet s…
Es wurden noch keine FAQ hinterlegt. Falls Sie Fragen haben oder Unterstützung benötigen, kontaktieren Sie unseren Kundenservice. Wir helfen gerne weiter!
- Summarise business and industry influences and associated security risks.
- Compare and contrast security, privacy policies and procedures based on organisational requirements.
- Given a scenario, execute risk mitigation strategies and controls.
- Analyse risk metric scenarios to secure the enterprise.
- Analyse a scenario and integrate network and security components, concepts and architectures to meet security requirements.
- Analyse a scenario to integrate security controls for host devices to meet security requirements.
- Analyse a scenario to integrate security controls for mobile and small form factor devices to meet security requirements.
- Given software vulnerability scenarios, select appropriate security controls
- Given a scenario, conduct a security assessment using the appropriate methods.
- Analyse a scenario or output, and select the appropriate tool for a security assessment.
- Given a scenario, implement incident response and recovery procedures
- Given a scenario, integrate hosts, storage, networks and applications into a secure enterprise architecture.
- Given a scenario, integrate cloud and virtualisation technologies into a secure enterprise architecture.
- Given a scenario, integrate and troubleshoot advanced authentication and authorisation technologies to support enterprise security objectives.
- Given a scenario, implement cryptographic techniques.
- Given a scenario, select the appropriate control to secure communications and collaboration solutions.
- Given a scenario, apply research methods to determine industry trends and their impact to the enterprise
- Given a scenario, implement security activities across the technology life cycle.
- Explain the importance of interaction across diverse business units to achieve security goals.
Es wurden noch keine FAQ hinterlegt. Falls Sie Fragen haben oder Unterstützung benötigen, kontaktieren Sie unseren Kundenservice. Wir helfen gerne weiter!
