CompTIA SecurityX® Training

Course 2046
5 DAY COURSE
Price: $3,110.00
Course Outline

This SecurityX® Training course prepares you for the CompTIA SecurityX® certification exam (CVO-004) and demonstrates your knowledge and skills in enterprise security, risk management, research and analysis, and the integration of computing, communications, and business disciplines. You will learn through a CompTIA-approved SecurityX® training program and receive after-course instructor coaching and an exam voucher. 

The course is available in-person or online, with virtual instructor-led training and virtual classroom options, providing a flexible and convenient learning experience.

U.S. DoDM 8140.03 APPROVED BY DEPARTMENT OF DEFENSE

CompTIA SecurityX® Training Benefits

  • In this course, you will learn how to:

    • Architect, engineer, integrate, and implement secure solutions across complex environments to support a resilient enterprise.
    • Use automation, monitoring, detection, and incident response to proactively support ongoing security operations in an enterprise environment.
    • Apply security practices to cloud, on-premises, and hybrid environments.
    • Consider cryptographic technologies and techniques, as well as the impact of emerging trends (e.g., artificial intelligence) on information security.
    • Use the appropriate governance, compliance, risk management, and threat-modeling strategies throughout the enterprise.
    • Training Prerequisites

      • Learning Tree course 446, CompTIA Security+® Training, or equivalent experience
      • Ten years of IT (Information Technology) administration experience, including at least five years of hands-on technical security experience
    • Certification Information

      • You must pass the CompTIA SecurityX (formerly Advanced Security Practitioner, CASP+) certification exam to earn this certification. 
      • Exam vouchers are available upon request and included in the tuition fee.

      SecurityX Exam Overview

      • Number of questions: Maximum of 90
      • Types of questions: Multiple-choice, performance-based
      • Length of test: 165 minutes Passing Score Pass/fail only

    SecurityX Training Outline

    Learning Objectives

    Module 1.0 Governance, Risk, and Compliance

    1.1 Given a set of organizational security requirements, implement the appropriate governance components.           

    • Security program documentation
    • Security program management
    • Governance frameworks
    • Change/configuration management
    • Governance risk and compliance (GRC) tools
    • Data governance in staging environments

    1.2 Given a set of organizational security requirements, perform risk management activities.

    • Impact analysis
    • Third-party risk management
    • Availability risk considerations
    • Confidentiality risk considerations
    • Integrity risk considerations
    • Privacy risk considerations
    • Crisis management
    • Breach response

    1.3 Explain how compliance affects information security strategies.

    • Awareness of industry-specific compliance
    • Industry standards
    • Security and reporting frameworks
    • Audits vs. assessments vs. certifications
    • Privacy regulations
    • Awareness of cross-jurisdictional compliance requirements

    1.4 Given a scenario, perform threat-modeling activities.

    • Actor characteristics
    • Attack patterns
    • Frameworks
    • Attack surface determination
    • Modeling applicability of threats to the organization/environment

    1.5 Summarize the information security challenges associated with artificial intelligence (AI) adoption.

    • Legal and privacy implications
    • Threats to the model
    • AI-enabled attacks
    • Risks of AI usage
    • AI-enabled assistants/digital workers

    Module 2.0 Security Architecture

    2.1 Given a scenario, analyze requirements to design resilient systems.

    • Component placement and configuration
    • Availability and integrity design considerations

    2.2 Given a scenario, implement security in the early stages of the systems life cycle and throughout subsequent stages.

    • Security requirements definition
    • Software assurance
    • Continuous integration/continuous deployment (CI/CD)
    • Supply chain risk management
    • Hardware assurance
    • End-of-life (EOL) considerations

    2.3 Given a scenario, integrate appropriate controls in the design of a secure architecture.

    • Attack surface management and reduction
    • Detection and threat-hunting enablers
    • Information and data security design
    • Hybrid infrastructures
    • Third-party integrations
    • Control effectiveness

    2.4 Given a scenario, apply security concepts to the design of access, authentication, and authorization systems.

    • Provisioning/deprovisioning
    • Federation
    • Single sign-on (SSO)
    • Conditional access
    • Identity provider
    • Service provider
    • Attestations
    • Policy decision and enforcement points
    • Access control models
    • Logging and auditing
    • Public key infrastructure (PKI) architecture
    • Access control systems

    2.5 Given a scenario, securely implement cloud capabilities in an enterprise environment.

    • Cloud access security broker (CASB)
    • Shadow IT detection
    • Shared responsibility model
    • CI/CD pipeline
    • Terraform
    • Ansible
    • Package monitoring
    • Container security
    • Container orchestration
    • Serverless
    • API security
    • Cloud vs. customer-managed
    • Cloud data security considerations
    • Customer-to-cloud connectivity
    • Cloud service integration
    • Cloud service adoption

    2.6 Given a scenario, integrate Zero Trust concepts into system architecture design.

    • Continuous authorization
    • Context-based reauthentication
    • Network architecture
    • API integration and validation
    • Asset identification, management, and attestation
    • Security boundaries
    • Deperimeterization
    • Defining subject-object relationships

     

    Module 3.0 Security Engineering

    3.1 Given a scenario, troubleshoot common issues with identity and access management (IAM) components in an enterprise environment.

    • Subject access control
    • Biometrics
    • Secrets management
    • Attestation
    • Cloud IAM access and trust policies
    • Logging and monitoring
    • Privilege identity management
    • Authentication and authorization - Security Assertions Markup Lang

    3.2 Given a scenario, analyze requirements to enhance the security of endpoints and servers.

    • Application control
    • Endpoint detection response (EDR)
    • Event logging and monitoring
    • Endpoint privilege management
    • Attack surface monitoring and reduction
    • Host-based intrusion protection system/ host-based detection system (HIPS/ HIDS)
    • Anti-malware
    • SELinux
    • Host-based firewall
    • Browser isolation
    • Configuration management
    • Mobile device management (MDM) technologies
    • Threat-actor tactics, techniques, and procedures (TTPs)

    3.3 Given a scenario, troubleshoot complex network infrastructure security issues.

    • Network misconfigurations
    • IPS/IDS issues
    • Observability
    • Domain Name System (DNS) security
    • Transport Layer Security (TLS) errors
    • Cipher mismatch • PKI issues
    • Issues with cryptographic implementations
    • DoS/distributed denial of service (DDoS)
    • Resource exhaustion
    • Network access control list (ACL) issues

    3.4 Given a scenario, implement hardware security technologies and techniques.

    • Roots of trust
    • Virtual hardware
    • Host-based encryption
    • Self-encrypting drive (SED)
    • Secure Boot
    • Measured boot
    • Self-healing hardware
    • Tamper detection and countermeasures
    • Threat-actor TTPs

    3.5 Given a set of requirements, secure specialized and legacy systems against threats.

    • Operational technology (OT)
    • Internet of Things (IoT)
    • System-on-chip (SoC)
    • Embedded systems
    • Wireless technologies/radio frequency (RF)
    • Security and privacy considerations

    3.6 Given a scenario, use automation to secure the enterprise.

    • Scripting
    • Cron/scheduled tasks
    • Event-based triggers
    • Infrastructure as code (IaC)
    • Configuration files
    • Cloud APIs/software development kits (SDKs)
    • Generative AI
    • Containerization
    • Automated patching
    • Auto-containment
    • Security orchestration, automation, and response (SOAR)
    • Vulnerability scanning and reporting
    • Security Content Automation Protocol (SCAP)

    3.7 Explain the importance of advanced cryptographic concepts.

    • Post-quantum cryptography (PQC)
    • Key stretching and splitting
    • Homomorphic encryption
    • Forward secrecy
    • Hardware acceleration
    • Envelope encryption
    • Performance vs. security
    • Secure multiparty computation
    • Authenticated encryption with associated data (AEAD)
    • Mutual authentication

    3.8 Given a scenario, apply the appropriate cryptographic use case and/or technique.

    Module 4.0 Security Operations

    4.1 Given a scenario, analyze data to enable monitoring and response activities.

    • Security information event management (SIEM)
    • Aggregate data analysis
    • Behavior baselines and analytics

    4.2 Given a scenario, analyze vulnerabilities and attacks, and recommend solutions to reduce the attack surface.

    • Vulnerabilities and attacks
    • Mitigations

    4.3 Given a scenario, apply threat-hunting and threat intelligence concepts.

    • Internal intelligence sources
    • External intelligence sources
    • Counterintelligence and operational security
    • Threat intelligence platforms (TIPs)
    • Indicator of compromise (IoC) sharing
    • Rule-based languages

    4.4 Given a scenario, analyze data and artifacts in support of incident response activities.

    • Malware analysis
    • Reverse engineering
    • Volatile/non-volatile storage analysis
    • Network analysis
    • Host analysis
    • Metadata analysis
    • Data recovery and extraction
    • Threat response
    • Preparedness exercises
    • Timeline reconstruction
    • Root cause analysis
    • Cloud workload protection platform (CWPP)
    • Insider threat

     

    Course Dates
    Attendance Method
    Additional Details (optional)