This EdCert workshop uses 3rd party courseware. Due to licensing restrictions, only technical staff who use the skills taught in their jobs, currently enrolled IU students, and faculty who teach this topic in academic classes are eligible to register for this workshop.
Please note this session runs Tuesdays for 5 consecutive weeks.This workshop is being offered in classroom and online.\
This workshop lasts 5 days.
The CompTIA Advanced Security Practitioner (CASP) Certification is a vendor-neutral credential. The CASP exam is an internationally targeted validation of advanced-level security skills and knowledge. While there is no required prerequisite, the CASP certification is intended to follow CompTIA Security+ or equivalent experience and has a technical, “hands-on” focus at the enterprise level.
The CASP exam will certify that the successful candidate has the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. The candidate will apply critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers.
This EdCert workshop uses courseware licensed from CompTIA. Due to licensing restrictions, only technical staff (which includes LSPs and UITS staff), currently enrolled IU students, and faculty who teach this topic in academic classes are eligible to register for this workshop.
Additionally, since the materials for EdCert workshops are ordered from a 3rd party source, you must register for EdCert workshops 3 business days in advance of the first teach date to guarantee your seat. If you believe you are eligible but are unable to register, or if you have missed the cut off date and would like to register, please contact our IUPUI office.
What You'll learn
Enterprise Security covering cryptographic tools and techniques
Distinguish and select among different types of virtualized, distributed and shared computing
Explain security implications of enterprise storage
Integrate hosts, networks, infrastructures, applications and storage into secure comprehensive solutions
Risk Management, Policy/Procedure and Legal - risk mitigation strategies and controls
Explain the importance of preparing for and supporting the incident response and recovery process
Research and Analysis - Analyze industry trends and outline potential impact to the enterprise
Carry out relevant analysis for the purpose of securing the enterprise
Integration of Computing, Communications and Business Desciplines
What you need to know
Vendor specific tools and technologies such as: Laptops, Virtualized appliances ( firewalls, IPS, RSA authentication) Basic Server
If you don't have those skills, consider first taking the workshop:
There are no upcoming dates for this event.