Facebook Pixel
Microsoft Certification Training
Search classes by keyword:
Search classes by category:
Microsoft Certification and Microsoft Training, Cisco Certification and MCSE Certification
CompTIA SecurityX space


CompTIA SecurityX Certification Training Course

CompTIA SecurityX (CAS-005)

Course Number: #CED-1769
Course Length: 5 days
Number of Exams: 1
Certifications: CompTIA SecurityX

Grants (discounts) are available for multiple students for the same or different courses.

Guaranteed to Run Guaranteed to Run


Upcoming Dates Class Times Class Format Quote
2/24 - 2/28, 2025Guaranteed to Run 10:00 AM - 6:00 PM ET
9:00 AM - 5:00 PM CT
7:00 AM - 3:00 PM PT
5:00 AM - 1:00 PM HT
Instructor-Led Instant Quote
3/17 - 3/21, 2025Guaranteed to Run 10:00 AM - 6:00 PM ET
9:00 AM - 5:00 PM CT
7:00 AM - 3:00 PM PT
5:00 AM - 1:00 PM HT
Instructor-Led Instant Quote
4/7 - 4/11, 2025Guaranteed to Run 10:00 AM - 6:00 PM ET
9:00 AM - 5:00 PM CT
7:00 AM - 3:00 PM PT
5:00 AM - 1:00 PM HT
Instructor-Led Instant Quote

Instructor-Led

  • Certified Instructor
  • Includes all course materials

Can't travel or you want to stay with your family or business. No problem!

Stay in your own city and save the additional expenses of roundtrip airfare, lodging, transportation, and meals and receive the same great instruction live from our instructors in our Live Instructor-Led Remote Classroom Training.

Remote Classroom Training

Our Remote Classroom Training is a live class with students observing the instructor and listening through your computer speakers.

You will see the instructor's computer, slides, notes, etc., just like in the classroom. You will be following along, doing work, labs, and individual assignments.


CED Solutions Rewards Points Program

CED Solutions Rewards Points Program


Like us on Facebook and SAVE $100 on your next course

The CompTIA SecurityX (CAS-005) is an advanced-level cybersecurity certification for security architects and senior security engineers charged with leading and improving an enterprise's cybersecurity readiness.

What Skills Will You Gain?

Security Architecture Analyze security requirements in hybrid networks to work toward an enterprise-wide, zero trust security architecture with advanced secure cloud and virtualization solutions.

Security Operations Address advanced threat management, vulnerability management, risk mitigation, incident response tactics and digital forensics analysis.

Governance, Risk, and Compliance Prove an organization's overall cybersecurity resiliency metric and compliance to regulations, such as CMMC, PCI-DSS, SOX, HIPAA, GDPR, FISMA, NIST and CCPA.

Security Engineering and Cryptography Configurations for endpoint security controls, enterprise mobility, cloud/hybrid environments, and enterprise-wide PKI and cryptographic solutions.

Jobs that use CompTIA SecurityX

  • Security Architect
  • Senior Security Engineer
  • SOC Manager
  • Cyber Risk Analyst
  • Chief Information Security Officer

Course Content

1.0 Governance, Risk, and Compliance
Given a set of organizational security requirements, implement the appropriate governance components.
  • Security program documentation
  • Security program management
  • Governance frameworks
  • Change/configuration management
  • Governance risk and compliance (GRC) tools
  • Data governance in staging environments
Given a set of organizational security requirements, perform risk management activities.
  • Impact analysis
  • Risk assessment and management
  • Third-party risk management
  • Availability risk considerations
  • Confidentiality risk considerations
  • Integrity risk considerations
  • Privacy risk considerations
  • Crisis management
  • Breach response
Explain how compliance affects information security strategies.
  • Awareness of industry-specific compliance
  • Industry standards
  • Security and reporting frameworks
  • Audits vs. assessments vs. certifications
  • Privacy regulations
  • Awareness of cross-jurisdictional compliance requirements
Given a scenario, perform threat-modeling activities.
  • Actor characteristics
  • Attack patterns
  • Frameworks
  • Attack surface determination
  • Methods
  • Modeling applicability of threats to the organization/environment
Summarize the information security challenges associated with artificial intelligence (AI) adoption.
  • Legal and privacy implications
  • Threats to the model
  • AI-enabled attacks
  • Risks of AI usage
  • AI-enabled assistants/digital workers
2.0 Security Architecture
Given a scenario, analyze requirements to design resilient systems.
  • Component placement and configuration
  • Availability and integrity design considerations
Given a scenario, implement security in the early stages of the systems life cycle and throughout subsequent stages.
  • Security requirements definition
  • Software assurance
  • Continuous integration/continuous deployment (CI/CD)
  • Supply chain risk management
  • Hardware assurance
  • End-of-life (EOL) considerations
Given a scenario, integrate appropriate controls in the design of a secure architecture.
  • Attack surface management and reduction
  • Detection and threat-hunting enablers
  • Information and data security design
  • DLP
  • Hybrid infrastructures
  • Third-party integrations
  • Control effectiveness
Given a scenario, apply security concepts to the design of access, authentication, and authorization systems.
  • Provisioning/deprovisioning
  • Federation
  • Single sign-on (SSO)
  • Conditional access
  • Identity provider
  • Service provider
  • Attestations
  • Policy decision and enforcement points
  • Access control models
  • Logging and auditing
  • Public key infrastructure (PKI) architecture
  • Access control systems
Given a scenario, securely implement cloud capabilities in an enterprise environment.
  • Cloud access security broker (CASB)
  • Shadow IT detection
  • Shared responsibility model
  • CI/CD pipeline
  • Terraform
  • Ansible
  • Package monitoring
  • Container security
  • Container orchestration
  • Serverless
  • API security
  • Cloud vs. customer-managed
  • Cloud data security considerations
  • Cloud control strategies
  • Customer-to-cloud connectivity
  • Cloud service integration
  • Cloud service adoption
Given a scenario, integrate Zero Trust concepts into system architecture design.
  • Continuous authorization
  • Context-based reauthentication
  • Network architecture
  • API integration and validation
  • Asset identification, management, and attestation
  • Security boundaries
  • Deperimeterization
  • Defining subject-object relationships
3.0 Security Engineering
Given a scenario, troubleshoot common issues with identity and access management (IAM) components in an enterprise environment.
  • Subject access control
  • Biometrics
  • Secrets management
  • Conditional access
  • Attestation
  • Cloud IAM access and trust policies
  • Logging and monitoring
  • Privilege identity management
  • Authentication and authorization
Given a scenario, analyze requirements to enhance the security of endpoints and servers.
  • Application control
  • Endpoint detection response (EDR)
  • Event logging and monitoring
  • Endpoint privilege management
  • Attack surface monitoring and reduction
  • Host-based intrusion protection system/ host-based detection system (HIPS/ HIDS)
  • Anti-malware
  • SELinux
  • Host-based firewall
  • Browser isolation
  • Configuration management
  • Mobile device management (MDM) technologies
  • Threat-actor tactics, techniques, and procedures (TTPs)
Given a scenario, troubleshoot complex network infrastructure security issues.
  • Network misconfigurations
  • IPS/IDS issues
  • Observability
  • Domain Name System (DNS) security
  • Email security
  • Transport Layer Security (TLS) errors
  • Cipher mismatch
  • PKI issues
  • Issues with cryptographic implementations
  • DoS/distributed denial of service (DDoS)
  • Resource exhaustion
  • Network access control list (ACL) issues
Given a scenario, implement hardware security technologies and techniques.
  • Roots of trust
  • Security coprocessors
  • Virtual hardware
  • Host-based encryption
  • Self-encrypting drive (SED)
  • Secure Boot
  • Measured boot
  • Self-healing hardware
  • Tamper detection and countermeasures
  • Threat-actor TTPs
Given a set of requirements, secure specialized and legacy systems against threats.
  • Operational technology (OT)
  • Internet of Things (IoT)
  • System-on-chip (SoC)
  • Embedded systems
  • Wireless technologies/radio frequency (RF)
  • Security and privacy considerations
  • Industry-specific challenges
  • Characteristics of specialized/legacy systems
Given a scenario, use automation to secure the enterprise.
  • Scripting
  • Cron/scheduled tasks
  • Event-based triggers
  • Infrastructure as code (IaC)
  • Configuration files
  • Cloud APIs/software development kits (SDKs)
  • Generative AI
  • Containerization
  • Automated patching
  • Auto-containment
  • Security orchestration, automation, and response (SOAR)
  • Vulnerability scanning and reporting
  • Security Content Automation Protocol (SCAP)
  • Workflow automation
Explain the importance of advanced cryptographic concepts.
  • Post-quantum cryptography (PQC)
  • Key stretching
  • Key splitting
  • Homomorphic encryption
  • Forward secrecy
  • Hardware acceleration
  • Envelope encryption
  • Performance vs. security
  • Secure multiparty computation
  • Authenticated encryption with associated data (AEAD)
  • Mutual authentication
Given a scenario, apply the appropriate cryptographic use case and/or technique.
  • Use cases
  • Techniques
4.0 Security Operations
Given a scenario, analyze data to enable monitoring and response activities.
  • Security information event management (SIEM)
  • Aggregate data analysis
  • Behavior baselines and analytics
  • Incorporating diverse data sources
  • Alerting
  • Reporting and metrics
Given a scenario, analyze vulnerabilities and attacks, and recommend solutions to reduce the attack surface.
  • Vulnerabilities and attacks
  • Mitigations
Given a scenario, apply threat-hunting and threat intelligence concepts.
  • Internal intelligence sources
  • External intelligence sources
  • Counterintelligence and operational security
  • Threat intelligence platforms (TIPs)
  • Indicator of compromise (IoC) sharing
  • Rule-based languages
  • Indicators of attack
Given a scenario, analyze data and artifacts in support of incident response activities.
  • Malware analysis
  • Reverse engineering
  • Volatile/non-volatile storage analysis
  • Network analysis
  • Host analysis
  • Metadata analysis
  • Hardware analysis
  • Data recovery and extraction
  • Threat response
  • Preparedness exercises
  • Timeline reconstruction
  • Root cause analysis
  • Cloud workload protection platform (CWPP)
  • Insider threat

CED Solutions is your best choice for CompTIA SecurityX, CompTIA SecurityX training, CompTIA SecurityX certification, CompTIA SecurityX boot camp, CompTIA SecurityX certification training, CompTIA SecurityX certification course, CompTIA SecurityX course, CompTIA SecurityX class.



CompTIA SecurityX space
Search classes by keyword:
Search classes by category:


Copyright © 2025 CED Solutions. CED Solutions Refund Policy. All Rights Reserved.