CompTIA SecurityX® Training

Course 2046

  • Duration: 5 days
  • Exam Voucher: Yes
  • Language: English
  • 29 CompTIA CEUs
  • 29 NASBA CPE Credits (live, in-class training only)
  • Level: Advanced

This SecurityX® Training course prepares you for the CompTIA SecurityX® certification exam (CVO-004) and demonstrates your knowledge and skills in enterprise security, risk management, research and analysis, and the integration of computing, communications, and business disciplines. You will learn through a CompTIA-approved SecurityX® training program and receive after-course instructor coaching and an exam voucher. 

The course is available in-person or online, with virtual instructor-led training and virtual classroom options, providing a flexible and convenient learning experience.

U.S. DoDM 8140.03 APPROVED BY DEPARTMENT OF DEFENSE

SecurityX Training Delivery Methods

  • In-Person

  • Online

  • Upskill your whole team by bringing Private Team Training to your facility.

SecurityX Training Information

In this course, you will learn how to:

  • Architect, engineer, integrate, and implement secure solutions across complex environments to support a resilient enterprise.
  • Use automation, monitoring, detection, and incident response to proactively support ongoing security operations in an enterprise environment.
  • Apply security practices to cloud, on-premises, and hybrid environments.
  • Consider cryptographic technologies and techniques, as well as the impact of emerging trends (e.g., artificial intelligence) on information security.
  • Use the appropriate governance, compliance, risk management, and threat-modeling strategies throughout the enterprise.

    Training Prerequisites

    • Learning Tree course 446, CompTIA Security+® Training, or equivalent experience
    • Ten years of IT (Information Technology) administration experience, including at least five years of hands-on technical security experience

    Certification Information

    • You must pass the CompTIA SecurityX (formerly Advanced Security Practitioner, CASP+) certification exam to earn this certification. 
    • Exam vouchers are available upon request and included in the tuition fee.

    SecurityX Exam Overview

    • Number of questions: Maximum of 90
    • Types of questions: Multiple-choice, performance-based
    • Length of test: 165 minutes Passing Score Pass/fail only

    SecurityX Training Outline

    Module 1.0 Governance, Risk, and Compliance

    1.1 Given a set of organizational security requirements, implement the appropriate governance components.           

    • Security program documentation
    • Security program management
    • Governance frameworks
    • Change/configuration management
    • Governance risk and compliance (GRC) tools
    • Data governance in staging environments

    1.2 Given a set of organizational security requirements, perform risk management activities.

    • Impact analysis
    • Third-party risk management
    • Availability risk considerations
    • Confidentiality risk considerations
    • Integrity risk considerations
    • Privacy risk considerations
    • Crisis management
    • Breach response

    1.3 Explain how compliance affects information security strategies.

    • Awareness of industry-specific compliance
    • Industry standards
    • Security and reporting frameworks
    • Audits vs. assessments vs. certifications
    • Privacy regulations
    • Awareness of cross-jurisdictional compliance requirements

    1.4 Given a scenario, perform threat-modeling activities.

    • Actor characteristics
    • Attack patterns
    • Frameworks
    • Attack surface determination
    • Modeling applicability of threats to the organization/environment

    1.5 Summarize the information security challenges associated with artificial intelligence (AI) adoption.

    • Legal and privacy implications
    • Threats to the model
    • AI-enabled attacks
    • Risks of AI usage
    • AI-enabled assistants/digital workers

    Module 2.0 Security Architecture

    2.1 Given a scenario, analyze requirements to design resilient systems.

    • Component placement and configuration
    • Availability and integrity design considerations

    2.2 Given a scenario, implement security in the early stages of the systems life cycle and throughout subsequent stages.

    • Security requirements definition
    • Software assurance
    • Continuous integration/continuous deployment (CI/CD)
    • Supply chain risk management
    • Hardware assurance
    • End-of-life (EOL) considerations

    2.3 Given a scenario, integrate appropriate controls in the design of a secure architecture.

    • Attack surface management and reduction
    • Detection and threat-hunting enablers
    • Information and data security design
    • Hybrid infrastructures
    • Third-party integrations
    • Control effectiveness

    2.4 Given a scenario, apply security concepts to the design of access, authentication, and authorization systems.

    • Provisioning/deprovisioning
    • Federation
    • Single sign-on (SSO)
    • Conditional access
    • Identity provider
    • Service provider
    • Attestations
    • Policy decision and enforcement points
    • Access control models
    • Logging and auditing
    • Public key infrastructure (PKI) architecture
    • Access control systems

    2.5 Given a scenario, securely implement cloud capabilities in an enterprise environment.

    • Cloud access security broker (CASB)
    • Shadow IT detection
    • Shared responsibility model
    • CI/CD pipeline
    • Terraform
    • Ansible
    • Package monitoring
    • Container security
    • Container orchestration
    • Serverless
    • API security
    • Cloud vs. customer-managed
    • Cloud data security considerations
    • Customer-to-cloud connectivity
    • Cloud service integration
    • Cloud service adoption

    2.6 Given a scenario, integrate Zero Trust concepts into system architecture design.

    • Continuous authorization
    • Context-based reauthentication
    • Network architecture
    • API integration and validation
    • Asset identification, management, and attestation
    • Security boundaries
    • Deperimeterization
    • Defining subject-object relationships

     

    Module 3.0 Security Engineering

    3.1 Given a scenario, troubleshoot common issues with identity and access management (IAM) components in an enterprise environment.

    • Subject access control
    • Biometrics
    • Secrets management
    • Attestation
    • Cloud IAM access and trust policies
    • Logging and monitoring
    • Privilege identity management
    • Authentication and authorization - Security Assertions Markup Lang

    3.2 Given a scenario, analyze requirements to enhance the security of endpoints and servers.

    • Application control
    • Endpoint detection response (EDR)
    • Event logging and monitoring
    • Endpoint privilege management
    • Attack surface monitoring and reduction
    • Host-based intrusion protection system/ host-based detection system (HIPS/ HIDS)
    • Anti-malware
    • SELinux
    • Host-based firewall
    • Browser isolation
    • Configuration management
    • Mobile device management (MDM) technologies
    • Threat-actor tactics, techniques, and procedures (TTPs)

    3.3 Given a scenario, troubleshoot complex network infrastructure security issues.

    • Network misconfigurations
    • IPS/IDS issues
    • Observability
    • Domain Name System (DNS) security
    • Transport Layer Security (TLS) errors
    • Cipher mismatch • PKI issues
    • Issues with cryptographic implementations
    • DoS/distributed denial of service (DDoS)
    • Resource exhaustion
    • Network access control list (ACL) issues

    3.4 Given a scenario, implement hardware security technologies and techniques.

    • Roots of trust
    • Virtual hardware
    • Host-based encryption
    • Self-encrypting drive (SED)
    • Secure Boot
    • Measured boot
    • Self-healing hardware
    • Tamper detection and countermeasures
    • Threat-actor TTPs

    3.5 Given a set of requirements, secure specialized and legacy systems against threats.

    • Operational technology (OT)
    • Internet of Things (IoT)
    • System-on-chip (SoC)
    • Embedded systems
    • Wireless technologies/radio frequency (RF)
    • Security and privacy considerations

    3.6 Given a scenario, use automation to secure the enterprise.

    • Scripting
    • Cron/scheduled tasks
    • Event-based triggers
    • Infrastructure as code (IaC)
    • Configuration files
    • Cloud APIs/software development kits (SDKs)
    • Generative AI
    • Containerization
    • Automated patching
    • Auto-containment
    • Security orchestration, automation, and response (SOAR)
    • Vulnerability scanning and reporting
    • Security Content Automation Protocol (SCAP)

    3.7 Explain the importance of advanced cryptographic concepts.

    • Post-quantum cryptography (PQC)
    • Key stretching and splitting
    • Homomorphic encryption
    • Forward secrecy
    • Hardware acceleration
    • Envelope encryption
    • Performance vs. security
    • Secure multiparty computation
    • Authenticated encryption with associated data (AEAD)
    • Mutual authentication

    3.8 Given a scenario, apply the appropriate cryptographic use case and/or technique.

    Module 4.0 Security Operations

    4.1 Given a scenario, analyze data to enable monitoring and response activities.

    • Security information event management (SIEM)
    • Aggregate data analysis
    • Behavior baselines and analytics

    4.2 Given a scenario, analyze vulnerabilities and attacks, and recommend solutions to reduce the attack surface.

    • Vulnerabilities and attacks
    • Mitigations

    4.3 Given a scenario, apply threat-hunting and threat intelligence concepts.

    • Internal intelligence sources
    • External intelligence sources
    • Counterintelligence and operational security
    • Threat intelligence platforms (TIPs)
    • Indicator of compromise (IoC) sharing
    • Rule-based languages

    4.4 Given a scenario, analyze data and artifacts in support of incident response activities.

    • Malware analysis
    • Reverse engineering
    • Volatile/non-volatile storage analysis
    • Network analysis
    • Host analysis
    • Metadata analysis
    • Data recovery and extraction
    • Threat response
    • Preparedness exercises
    • Timeline reconstruction
    • Root cause analysis
    • Cloud workload protection platform (CWPP)
    • Insider threat

     

    Need Help Finding The Right Training Solution?

    Our training advisors are here for you.

    CompTIA SecurityX Training FAQs

    CompTIA Advanced Security Practitioner certification is a technical certification that demonstrates your knowledge and skills in enterprise security, risk management, research, and analysis, as well as the integration of computing, communications, and business disciplines.

    This course will teach you how to prepare for the CompTIA SecurityX Certification Exam. You will investigate enterprise storage requirements, examine risk management security policies and procedures, research potential threats and identify appropriate countermeasures, evaluate collaboration methodologies for secure communications, and more.

    Additionally, you will receive after-course instructor coaching and an exam voucher.

    You must have completed Learning Tree course 446, CompTIA Security+ Training, or equivalent experience. You must also have ten years of IT administration experience, including at least five years of hands-on technical security experience.

    The SecurityX exam comprises five domains: Risk Management, Enterprise Security Architecture, Enterprise Security Operations, Technical Integration of Enterprise Components, and Research, Development, and Collaboration.

    The exam uses performance-based and multiple-choice questions to test your knowledge and skills in these areas.

    To maintain your certification, you must earn CompTIA Continuing Education Units (CEUs) by completing approved training courses applicable to A+, Network+, Security+, SecurityX, and CSA+ certifications. Learning Tree, a CompTIA-authorized partner, offers several approved training courses.

    You can take SecurityX training in person or online. Our virtual instructor-led training and virtual classroom options offer a flexible learning experience that can be tailored to your needs.

    We offer various employee training options, including virtual instructor-led training and virtual classroom courses. These courses can provide a learning experience that is flexible and convenient.

    The learning techniques for the SecurityX exam include analyzing scenarios, identifying security concerns, evaluating collaboration methodologies, and performing ongoing research to support best practices.

    Ethical hacking is a process in which security professionals, also known as penetration testers, use their skills and knowledge to identify vulnerabilities in a system or network. Ethical hacking aims to identify and address these vulnerabilities before attackers can exploit them.

    Vulnerability management is the process of identifying, evaluating, and addressing vulnerabilities in a system or network. This can involve identifying potential threats, assessing the level of risk, and implementing measures to reduce the risk of a security breach.

    Virtual instructor-led training can provide a more personalized learning experience, as the instructor can work with you to address your specific needs and answer any questions you may have.

    Additionally, virtual training can offer greater flexibility and convenience, as you can participate from any location with an internet connection.

    AnyWare virtual training is an online learning environment allowing students to participate in live, interactive sessions with instructors and other students. This learning experience can provide many benefits of traditional classroom-based training while offering greater flexibility and convenience.

    Chat With Us