CSIE: CompTIA Security Infrastructure Expert Guide
Ready to start learning? Individual Plans →Team Plans →
[ Course ]

CompTIA Security Infrastructure Expert (CSIE)

Master advanced security skills by exploring comprehensive strategies for endpoint protection, threat hunting, vulnerability testing, and architecture decisions.


83 Hrs 36 Min385 Videos748 QuestionsCertificate of CompletionClosed Captions



csie is not a beginner’s credential, and that is exactly why it matters. If you are already the person expected to secure endpoints, hunt threats, test weaknesses, and make architecture decisions, the CompTIA® Security Infrastructure Expert path gives you a structured way to prove you can do all of it, not just one slice of it. This on-demand course is built for experienced IT professionals who want to prepare for the stackable certification path that combines Security+, CySA+, PenTest+, and CASP+ into one higher-level achievement.

I built this course for people who have outgrown isolated checklists and want the full security picture. You are not just memorizing definitions here. You are learning how the pieces fit together: how to lock down an environment, detect behavior that does not belong, validate exposures before an attacker does, and make advanced security recommendations that stand up in production. That is what the csie certification path is really about.

What the CSIE path actually proves

The csie designation is a stackable certification from CompTIA that signals breadth and depth across four distinct security disciplines. That combination matters because real security work does not happen in silos. A vulnerability report is useless if you cannot prioritize it. A detection rule is weak if you do not understand the attack path behind it. A secure architecture means nothing if your team cannot enforce it in the field. This path is designed to validate that you can move across those layers.

To earn the badge, you work through the learning materials for Security+, CySA+, PenTest+, and CASP+, then pass the associated exams. In practice, this means you are preparing for:

  • Security+ with SY0-501
  • CySA+ with CS0-001
  • PenTest+ with PTO-001
  • CASP+ with CAS-003

That is a serious mix of foundational, defensive, offensive, and advanced security skills. The value of csie comptia training is that it keeps you from becoming one-dimensional. You learn to think like the defender, the tester, and the architect. That is the kind of thinking employers notice when they are deciding who gets trusted with sensitive systems.

If you are comparing this with other security tracks, this is not about chasing a single certification for its own sake. It is about building a recognized security profile that says you understand infrastructure, risk, threat behavior, and operational security in a way that is relevant to enterprise environments.

How I structured this CompTIA CSIE training path

This course follows the real logic of the stackable path. I did not want to throw four unrelated certification prep tracks at you and call it a day. I organized the material so your understanding grows in the same sequence a competent security professional would use on the job. You start with the control basics and terminology that hold the rest together, then move into analysis, testing, and finally advanced security leadership.

That sequence matters. If you jump into attack tools without a strong baseline in hardening, identity, and risk, you will learn tricks instead of judgment. If you study detection without understanding attack methods, your analysis will stay shallow. The csie certification path is valuable because it forces you to connect those disciplines rather than treating them as separate islands.

As you move through the CompTIA CSIE material, you will reinforce the practical skills behind each exam:

  • Security concepts, controls, and foundational defense principles
  • Threat identification, incident indicators, and behavioral analysis
  • Reconnaissance, vulnerability validation, and penetration testing workflow
  • Advanced enterprise security architecture, governance, and technical decision-making

I like this kind of training because it respects the reality of security work. A good security professional does not just know what a tool does. You need to know why it is appropriate, when it is risky, what it tells you, and what to do next. That is the kind of judgment this path is meant to sharpen.

CompTIA CSIE and the four exams behind it

Each exam in the path has its own personality, and you should understand that before you start. Security+ tests whether you can speak the language of modern security and apply core controls. CySA+ goes deeper into threat detection and analysis, asking whether you can interpret what an environment is telling you. PenTest+ pushes you into controlled offensive methodology, where discipline matters as much as technical knowledge. CASP+ then asks whether you can operate at an advanced level, making decisions that affect enterprise security outcomes.

That progression is the reason the csie credential has weight. It is not a single narrow test. It is proof that you can move across a security program from baseline protection to advanced implementation. If you are already working in security operations, network defense, vulnerability management, or infrastructure support, this path gives you a formal structure for the experience you have been accumulating.

Here is the practical way I want you to think about these exams:

  1. Security+ gives you the vocabulary and baseline control model.
  2. CySA+ teaches you to read events, alerts, and behavior with more sophistication.
  3. PenTest+ makes you think in terms of exploit paths, exposure, and verification.
  4. CASP+ pushes you into architecture, integration, and high-level security decisions.

If you are searching for comptia csie because you already know you need more than a single cert, this is the path that actually matches that need. It gives you a way to demonstrate maturity, not just memory.

Security teams do not fail because they lack tools. They fail because people cannot connect the findings from one discipline to the decisions required in another. That is the real gap the CSIE path is meant to close.

Who should take this course

This training is designed for experienced professionals, not entry-level learners. CompTIA positions the csie path for people with 5 or more years of experience, and that makes sense. You will get the most value if you already work with networks, systems, security controls, incident response, or enterprise infrastructure. If you have spent time troubleshooting real environments, you will recognize the scenarios quickly.

Common job titles that benefit from this path include:

  • Security Analyst
  • Cybersecurity Analyst
  • Penetration Tester
  • Security Engineer
  • Network Security Administrator
  • Infrastructure Engineer
  • Systems Administrator moving into security
  • Senior SOC Analyst

This course is especially useful if you have been asked to broaden your role. That happens a lot. Maybe you were hired as a systems admin and now you are expected to help with vulnerability remediation. Maybe you are in a SOC and have started being pulled into architecture reviews. Maybe you already perform technical assessments and want a credential that reflects a wider security skill set. The csie comptia path fits those career moves well.

Salary ranges vary by region, industry, and seniority, but professionals with multi-domain security expertise often sit in the mid-to-upper range of security compensation. In the U.S., roles aligned with this skill set frequently land somewhere around the $90,000 to $160,000 range, with senior security engineers, pentesters, and security architects often exceeding that in competitive markets. The certification does not create the salary, of course. Your ability to perform does. But the credential can help validate the expertise you already bring.

What you will learn in Security+, CySA+, PenTest+, and CASP+

Let me be blunt: the value is not in passing four exams. The value is in becoming the sort of professional who can navigate the whole security lifecycle. This course helps you build that capability through the four domains represented in the path.

Security+ focuses on core security principles, threat types, access control, cryptography basics, secure network design, and operational security. You will strengthen the foundational knowledge that supports every other security decision. If your fundamentals are weak, everything else gets fragile fast.

CySA+ shifts you into behavior-based defense. You will work with indicators, event analysis, vulnerability response, threat detection logic, and security monitoring concepts. This is where you begin thinking like an analyst who can distinguish noise from meaningful activity.

PenTest+ develops structured offensive thinking. You will study assessment planning, scanning, exploitation workflow, post-exploitation considerations, reporting, and remediation guidance. The point is not to become reckless. The point is to understand exposure well enough to validate it responsibly.

CASP+ addresses advanced enterprise security problems. That includes architecture, integration, risk management, research, collaboration with stakeholders, and technical implementation at scale. This is where you move from “what is the vulnerability?” to “what is the most defensible way to solve the problem across the environment?”

Put together, those skills make the csie path unusually practical. You are building the full range of security judgment: baseline, detection, assessment, and advanced design.

Why CSIE matters in real security work

One reason I respect the csie certification path is that it reflects the messiness of actual enterprise security. In the field, you are rarely dealing with just one type of problem. A phishing campaign may lead to credential abuse, which leads to unusual lateral movement, which exposes a segmentation weakness, which then reveals a design flaw in your privileged access model. That is one incident, but it crosses four security mindsets.

This is where csie training earns its keep. It helps you move through those layers without losing the thread. You are not only asking, “What happened?” You are also asking:

  • What control should have stopped this?
  • What telemetry would have shown it earlier?
  • How would I test this weakness safely?
  • What architectural change would reduce the risk long term?

That kind of thinking is what separates a generalist who reads alerts from a professional who can actually improve security posture. It is also why hiring managers like stackable certifications. They suggest depth across multiple functions rather than isolated familiarity with a single vendor tool or a single exam topic.

If your work touches SIEM platforms, vulnerability management, incident response, network defense, or security architecture, this training gives you a common framework for making decisions. That makes you more useful to your team, and frankly, more credible in the room when priorities are being set.

Prerequisites and how to know if you are ready

This is not the place to start if you are still learning what a firewall does. You will be much better served if you already have at least several years of hands-on IT or security experience. CompTIA’s own positioning for the csie comptia path reflects that, and I agree with it. The material assumes you can recognize basic infrastructure concepts without needing every term explained from scratch.

You should be comfortable with:

  • Networking fundamentals such as TCP/IP, ports, and common services
  • Operating system administration on Windows and Linux
  • Identity and access concepts
  • Basic scripting or command-line comfort
  • Security concepts like authentication, authorization, and least privilege

If you have already worked help desk, system administration, network support, security operations, or junior analysis roles, you may be more ready than you think. What matters most is not a perfect resume. It is whether you can recognize how systems behave when they are healthy versus when they are under pressure.

If you are unsure, here is my honest advice: if you still need a lot of translation between the exam objectives and your daily work, start with the foundational material and move deliberately. The csie path rewards people who have already spent time in real environments. It is not designed for shortcuts.

How this training helps your career move forward

The best outcome from this course is not just another badge. It is leverage. The csie credential can help you reposition yourself for roles that require broader responsibility and more trust. That includes security engineering, advanced SOC work, penetration testing, vulnerability management, and architecture-focused positions.

Employers like seeing the stackable path because it suggests you can communicate across teams. You understand control implementation, but you also understand adversarial thinking and advanced design. That is valuable when a security team needs somebody who can translate between operations and leadership.

Career-wise, this can support moves such as:

  • From systems or network administration into security engineering
  • From SOC analyst into threat analysis or detection engineering
  • From junior pentester into more structured assessment work
  • From senior practitioner into security architect or technical lead roles

That is the practical appeal of the csie certification. It is not just proof that you studied. It is a credible signal that you can contribute across multiple security functions and handle more complex work without needing constant supervision.

What you should focus on while studying

If you are serious about passing the exams in this path, do not study by passive reading alone. You need to build recall, pattern recognition, and decision-making. Security exams reward the person who can reason through a scenario, not just repeat a definition. The good news is that this course is designed for that kind of preparation.

Here is how I would recommend approaching the csie material:

  • Pay close attention to control relationships, not just individual terms.
  • Compare similar attack and defense concepts so you understand the differences.
  • Think in terms of workflow: detect, analyze, validate, respond, improve.
  • When you see a technical issue, ask what the business impact would be.
  • Practice explaining your reasoning as if you were reporting to a manager or client.

That last point matters more than people realize. Security professionals are often evaluated on their ability to make complex issues understandable. If you can explain why a finding matters and what should happen next, you are already ahead of many technically capable candidates who cannot communicate clearly.

That is why I tell students to treat this as professional development, not just exam prep. You are training for the conversations you will need to have after the test is over.

Why this on-demand format works for experienced professionals

Because this is an on-demand course, you can move at the speed your schedule and experience allow. That is exactly what a seasoned learner needs. You do not need a fixed classroom pace when you are balancing work, family, and an already demanding technical role. You need direct access to the material so you can study when you are sharp and revisit the parts that deserve another pass.

I like on-demand delivery for advanced certification prep because it respects the way experienced professionals actually learn. You may already understand one section deeply and need more time on another. You may want to revisit penetration testing concepts after a real assignment at work. You may want to review advanced architecture topics right before sitting for CASP+. That flexibility is useful.

For a path like csie, that matters even more because you are not preparing for one narrow skill. You are balancing multiple bodies of knowledge. Self-paced study lets you build confidence without forcing artificial progress. You can slow down where the concepts are dense and move faster where your job experience already gives you an edge.

That is the right way to approach a high-level security path: intentionally, practically, and with a focus on what you will actually use in the field.

CompTIA® and Security+™, CySA+™, PenTest+™, and CASP+™ are trademarks of CompTIA. This content is for educational purposes.

Module 1 – The Pen Test Engagement
  • Module 1 Notes
  • 1.0 PenTest Plus Introduction
  • 1.1 PenTest Plus Topics
  • 1.2 PenTest Engagement
  • 1.3 Threat Modeling
  • 1.4 Technical Constraints
  • 1.5 PenTest Engagement Review
  • 1.6 Examining PenTest Engagement Documents Act
Module 2 – Passive Reconnaissance
  • Module 2 Notes
  • 2.1 Passive Reconnaissance part1
  • 2.2 WHOIS Act
  • 2.3 Passive Reconnaissance part2
  • 2.4 Google Hacking Act
  • 2.5 Passive Reconnaissance part3
  • 2.6 DNS Querying Act
  • 2.7 Passive Reconnaissance part4
  • 2.8 Email Server Querying Act
  • 2.9 SSL-TLS Cerfificates
  • 2.10 Shodan Act
  • 2.11 The Havester
  • 2.12 TheHarvester Act
  • 2.13 Recon-ng
  • 2.14 Recon-g Act
  • 2.14 Recon-ng-Part-2-API-key Act
  • 2.15 Maltego
  • 2.16 Have I been Pwned
  • 2.17 Punked and Owned Pwned Act
  • 2.18 Fingerprinting Organization with Collected Archives
  • 2.19 FOCA Act
  • 2.20 Findings Analysis Weaponization
  • 2.21 Chp 2 Review
Module 3 – Active Reconnaissance
  • Module 3 Notes
  • 3.1 Active Reconnaissannce
  • 3.2 Discovery Scans Act
  • 3.3 Nmap
  • 3.4 Nmap Scans Types Act
  • 3.5 Nmap Options
  • 3.6 Nmap Options Act
  • 3.7 Stealth Scans
  • 3.8 Nmap Stealth Scans Act
  • 3.9 Full Scans
  • 3.10 Full Scans Act
  • 3.11 Packet Crafting
  • 3.12 Packet Crafting Act
  • 3.13 Network Mapping
  • 3.14 Metasploit
  • 3.15 Scanning with Metasploit Act
  • 3.16 Enumeration
  • 3.17 Banner Grabbing Act
  • 3.18 Windows Host Enumeration
  • 3.19 Winddows Host Enumeration Act
  • 3.20 Linux Host Enumeration
  • 3.21 Linux Host Enumeration Act
  • 3.22 Service Enumeration
  • 3.23 Service Enumeration Act
  • 3.24 Network Shares
  • 3.25 SMB Share Enumeration Act
  • 3.26 NFS Network Share Enumeration
  • 3.27 NFS Share Enumeration Act
  • 3.28 Null Sessions
  • 3.29 Null Sessions Act
  • 3.30 Website Enumeration
  • 3.31 Website Enumeration Act
  • 3.32 Vulnerability Scans
  • 3.33 Compliance Scans Act
  • 3.34 Credentialed Non-credentialed Scans
  • 3.35 Using Credentials in Scans Act
  • 3.36 Server Service Vulnerability Scan
  • 3.37 Vulnerability Scanning Act
  • 3.38 Web Server Database Vulnerability Scan
  • 3.39 SQL Vulnerability Scanning Act
  • 3.40 Vulnerability Scan Part 2 OpenVAS Act
  • 3.41 Web App Vulnerability Scan
  • 3.42 Web App Vulnerability Scanning Act
  • 3.43 Network Device Vulnerability Scan
  • 3.44 Network Device Vuln Scanning Act
  • 3.45 Nmap Scripts
  • 3.46 Using Nmap Scripts for Vuln Scanning Act
  • 3.47 Packet Crafting for Vulnerbility Scans
  • 3.48 Firewall Vulnerability Scans
  • 3.49 Wireless Access Point Vunerability
  • 3.50 Wireless AP Scans Act
  • 3.51 WAP Vulnerability Scans
  • 3.52 Container Security issues
  • 3.53 How to Update Metasploit Pro Expired Trial License
Module 4 – Physical Security
  • Module 4 Notes
  • 4.1 Physical Security
  • 4.2 Badge Cloning Act
  • 4.3 Physical Security Review
Module 5 – Social Engineering
  • Module 5 Notes
  • 5.1 Social Engineering
  • 5.2 Using Baited USB Stick Act
  • 5.3 Using Social Enginnering to Assist Attacks
  • 5.4 Phishing Act
  • 5.5 Social Engineering Review
Module 6 – Vulnerability Scan Analysis
  • Module 6 Notes
  • 6.1 Vulnerbility Scan Analysis
  • 6.2 Validating Vulnerability Scan Results Act
  • 6.3 Vulnerbility Scan Analysis Review
Module 7 – Password Cracking
  • Module 7 Notes
  • 7.1 Password Cracking
  • 7.2 Brute Force Attack Against Network Service Act
  • 7.3 Network Authentication Interception Attack
  • 7.4 Intercepting Network Authentication Act
  • 7.5 Pass the Hash Attacks
  • 7.6 Pass the Hash Act
  • 7.7 Password Cracking Review
Module 8 – Penetrating Wired Networks
  • Module 8 Notes
  • 8.1 Penetrating Wired Network
  • 8.2 Sniffing Act
  • 8.3 Eavesdropping
  • 8.4 Eavesdropping Act
  • 8.5 ARP Poisoning
  • 8.6 ARP Poisoning Act
  • 8.7 Man In The Middle
  • 8.8 MITM Act
  • 8.9 TCP Session HiJacking
  • 8.10 Server Message Blocks SMB Exploits
  • 8.11 SMB Attack Act
  • 8.12 Web Server Attacks
  • 8.13 FTP Attacks
  • 8.14 Telnet Server Attacks
  • 8.15 SSH Server Attacks
  • 8.16 Simple Network Mgmt Protocol SNMP
  • 8.17 Simple Mail Transfer Protocol SMTP
  • 8.18 Domain Name System DNS Cache Poisoning
  • 8.19 Denail of Service Attack DoS-DDoS
  • 8.20 DoS Attack Act
  • 8.21 VLAN Hopping Review
Module 9 – Penetrating Wireless Networks
  • Module 9 Notes
  • 9.1 Penetrating Wireless Networks
  • 9.2 Jamming Act
  • 9.3 Wireless Sniffing
  • 9.4 Replay Attacks
  • 9.5 WEP Cracking Act
  • 9.6 WPA-WPA2 Cracking
  • 9.7 WAP Cracking Act
  • 9.8 Evil Twin Attacks
  • 9.9 Evil Twin Attack Act
  • 9.10 WiFi Protected Setup
  • 9.11 Bluetooth Attacks
  • 9.12 Penetrating Wireless Networks
Module 10 – Windows Exploits
  • Module 10 Notes
  • 10.1 Windows Exploits
  • 10.2 Dumping Stored Passwords Act
  • 10.3 Dictionary Attacks
  • 10.4 Dictionary Attack Against Windows Act
  • 10.5 Rainbow Table Attacks
  • 10.6 Credential Brute Force Attacks
  • 10.7 Keylogging Attack Act
  • 10.8 Windows Kernel
  • 10.9 Kernel Attack Act
  • 10.10 Windows Components
  • 10.11 Memory Vulnerabilities
  • 10.12 Buffer Overflow Attack Act
  • 10.13 Privilegde Escalation in Windows
  • 10.14 Windows Accounts
  • 10.15 Net and WMIC Commands
  • 10.16 Sandboxes
Module 11 – Linux Exploits
  • Module 11 Notes
  • 11.1 Linux Exploits
  • 11.2 Exploiting Common Linux Features Act
  • 11.3 Password Cracking in Linux
  • 11.4 Cracking Linux Passwords Act
  • 11.5 Vulnerability Linux
  • 11.6 Priviledge Escalation Linux
  • 11.7 Linux Accounts
  • 11.8 Linux Exploits Review
Module 12 – Mobile Devices
  • Module 12 Notes
  • 12.1 Mobile Devices
  • 12.2 Hacking Android Act
  • 12.3 Apple Exploits
  • 12.4 Moblie Devices Review
Module 13 – Specialized Systems
  • Module 13 Notes
  • 13.1 Specialized Systems
  • 13.2 Specialized Systems Review
Module 14 – Scripts
  • Module 14 Notes
  • 14.1 Scripts
  • 14.2 Powershell
  • 14.3 Python
  • 14.4 Ruby
  • 14.5 Common Scripting Elements
  • 14.6 Scripts Review
  • 14.7 Better Ping Sweep
  • 14.8 Simple Port Scanner2
  • 14.9 Multitarget Port Scanner
  • 14.10 Port Scanner with Nmap
  • 14.11 Scripts Review
Module 15 – Application Testing
  • Module 15 Notes
  • 15.1 Application Testing
  • 15.2 Reverse Engineering
Module 16 – Web App Exploits
  • Module 16 Notes
  • 16.1 Webb App Exploits
  • 16.2 Injection Attacks
  • 16.3 HTML Injection
  • 16.4 SQL Hacking – SQLmap Act
  • 16.5 Cross-Site Attacks
  • 16.6 Cross-Site Request Forgery
  • 16.7 Other Web-based Attacks
  • 16.8 File Inclusion Attacks
  • 16.9 Web Shells
  • 16.10 Web Shells Review
Module 17 – Lateral Movement
  • Module 17 Notes
  • 17.1 Lateral Movement
  • 17.2 Lateral Movement with Remote Mgmt Services
  • 17.3 Process Migration Act
  • 17.4 Passing Control Act
  • 17.5 Pivoting
  • 17.6 Tools the Enable Pivoting
  • 17.7 Lateral Movement Review
Module 18 – Persistence
  • Module 18 Notes
  • 18.1 Persistence
  • 18.2 Breeding RATS Act
  • 18.3 Bind and Reverse Shells
  • 18.4 Bind Shells Act
  • 18.5 Reverse Shells
  • 18.6 Reverse Shells Act
  • 18.7 Netcat
  • 18.8 Netcat Act
  • 18.9 Scheduled Tasks
  • 18.10 Scheduled Tasks Act
  • 18.11 Services and Domains
  • 18.12 Persistence Review
Module 19 – Cover Your Tracks
  • Module 19 Notes
  • 19.1 Cover Your Tracks
  • 19.2 Cover Your Tracks – Timestomp Files Act
  • 19.3 Cover Your Tracks – Frame the Administrator Act
  • 19.4 Cover Your Tracks – Clear the Event Log Act
  • 19.5 Cover Your Tracks Review
Module 20 – The Report
  • Module 20 Notes
  • 20.1 The Report
  • 20.2 The Report Review
Module 21 – Post Engagement Cleanup
  • Module 21 Notes
  • 21.1 Post Engagement Cleanup_1
  • 21.3 Post Engagement Cleanup Review
  • 21.4 PenTest Plus Conclusion.mp4
Module 1 – Risk Management
  • Module 1 Notes
  • Intro CASP
  • CASP Introduction
  • Mod 1.1 Exploring Cloud Services Act
  • Mod 1.1 Acquisition Merger Demerger
  • Mod 1.1 Acquisition Merger Demerger Part2
  • Mod 1.2 Compare and Contrast
  • Mod 1.3 Given Scenario Execute Risk
  • Mod 1.3 Given Scenario Execute Risk Part2
  • Mod 1.3 Continuing Terminology IT Governance
  • Mod 1.4 Analyze Security Solution Metrics and Attributes
  • Mod 1.4 Analyze Risk
  • Mod 1.4 Trend Analysis Act
Module 2 – Enterprise Security Architecture
  • Module 2 Notes
  • Mod 2 Enterprise Security Architecture
  • Mod 2.1 Network Device Security Act
  • Mod 2.1 Application and Protocol
  • Mod 2.1 Advanced Network Security Act
  • Mod 2.1 Complex Network Security Solution
  • Mod 2.1 Implementing VLANs Switchport Sec Act
  • Mod 2.1 Implementing VLANs Switchport Sec Act Part2
  • Mod 2.1 Distributed Denial of Service
  • Mod 2.1 Exploring DoS Attacks Act
  • Mod 2.1 Security Zones
  • Mod 2.1 Network Access Control
  • Mod 2.1 Searching for Vulnerablie ICS-SCADA Act
  • Mod 2.2 Analyze a Scenario Integrate Security
  • Mod 2.2 Configuring Windows Firewall Act
  • Mod 2.2 Log Monitoring and Auditing
  • Mod 2.2 Group Policy Act
  • Mod 2.2 Patch Management
  • Mod 2.2 Management Interface
  • Mod 2.2 Measured Launch
  • Mod 2.3 Analyze a Scenario to Integrate Security Controls
  • Mod 2.3 Security Implications Privacy
  • Mod 2.3 Baseband
  • Mod 2.4 Given Software Vulnerabilty Scenarios
  • Mod 2.4 SQL Injection Act
  • Mod 2.4 Improper Error and Exception Handling
  • Mod 2.4 Buffer Overflows Act
  • Mod 2.4 Memory Leaks
  • Mod 2.4 Researching Vulnerabilities Exploits Act
Module 3 – Enterprise Security Operations
  • Module 3 Notes
  • Mod 3 Enterprise Security Operations
  • Mod 3 Runtime Debugging
  • Mod 3.1 Fingerprinting an OS Services Act
  • Mod 3.1 Code Review
  • Mod 3.1 Conducting OSINT Act
  • Mod 3.1 Types
  • Mod 3.1 Conducting a Vulnerability Assessment Act
  • Mod 3.2 Analyze a Scenario Output
  • Mod 3.2 Network Sniffing Act
  • Mod 3.2 Security Content Automation
  • Mod 3.2 Using a SCAP Scanner Act
  • Mod 3.2 Network Enumerator
  • Mod 3.2 Password Cracking Act
  • Mod 3.2 Host Vulnerability Scanner
  • Mod 3.2 Using Command Line Tools Act
  • Mod 3.2 OpenSSL
  • Mod 3.2 Scanning for Heartbleed Act
  • Mod 3.2 Local Exploitation Tools
  • Mod 3.2 Verifying File Integrity with SFC Act
  • Mod 3.2 Log Analysis Tools
  • Mod 3.3 Given Scenario Implement Incident
  • Mod 3.3 Facilitate Incident Detection Response
  • Mod 3.3 Using Incident Response Support Tools Act
  • Mod 3.3 Severity of Incident Detection Breach
Module 4 – Technical Integration of Enterprise Security
  • Module 4 Notes
  • Mod 4 Technical Integration of Enterprise
  • Mod 4 Technical Integration of Enterprise Part2
  • Mod 4.1 DataSecurity Considerations
  • Mod 4.1 Examing Network Diagrams Act
  • Mod 4.1 Security and Privacy Considerations of Storage integration
  • Mod 4.1 Exploring Directory Services and DNS Act
  • Mod 4.2 Given Scenario Integrate Cloud and Virtualization
  • Mod 4.2 Taking Another Look at Cloud Services Act
  • Mod 4.2 Security Advantages and Disadvanatges of Virtualization
  • Mod 4.2 Using Virtualization Act
  • Mod 4.2 Cloud Augmented Security
  • Mod 4.3 Given Scenario Integrate and Troubleshoot Advanced Authentication
  • Mod 4.4 Given Scenario Cryptographic
  • Mod 4.4 Cryptographic Part2
  • Mod 4.4 Mobile Device Encryption
  • Mod 4.4 Cryptography Act
  • Mod 4.5 Select the Appropriate Control
  • Mod 4.5 Phising Act
  • Mod 4.5 Telephony VoIP Integration
Module 5 – Research, Development and Collaboration
  • Module 5 Notes
  • Mod 5 Research Methods to Determine Industry Trends
  • Mod 5.1 Practicing Threat Intelligence Act
  • Mod 5.2 Scenario Implememt Security Activities Across
  • Mod 5.2 Static Testing
  • Mod 5.3 Explain the Importance of Interaction
  • CASP Conclusion
Module 1: Threats, Attacks and Vulnerabilities
  • Module 1 Workbook
  • Introduction
  • Types Of Malware-Part 1
  • Types Of Malware-Part 2
  • Types Of Attacks-Part 1
  • Types Of Attacks-Part 2
  • Types Of Attacks-Part 3
  • Types Of Attacks-Part 4
  • Types Of Attacks-Part 5
  • Threat Actors-Part 1
  • Threat Actors-Part 2
  • Penetration Testing And Vulnerability Scanning-Part 1
  • Penetration Testing And Vulnerability Scanning-Part 2
  • Impact Of Vulnerabilities-Part 1
  • Impact Of Vulnerabilities-Part 2
Module 2: Technologies and Tools
  • Module 2 Workbook
  • Networking Hardware And Software-Part 1
  • Networking Hardware And Software-Part 2
  • Networking Hardware And Software-Part 3
  • Networking Hardware And Software-Part 4
  • Networking Hardware And Software-Part 5
  • Networking Hardware And Software-Part 6
  • Security Assessment-Part 1
  • Security Assessment-Part 2
  • Troubleshooting Issues-Part 1
  • Troubleshooting Issues-Part 2
  • Securing Mobile Devices-Part 1
  • Securing Mobile Devices-Part 2
  • Securing Mobile Devices-Part 3
  • Securing Mobile Devices-Part 4
  • Secure Protocols-Part 1
  • Secure Protocols-Part 2
Module 3: Architecture and Design
  • Module 3 Workbook
  • Secure Network Architecture-Part 1
  • Secure Network Architecture-Part 2
  • Secure System Designs-Part 1
  • Secure System Designs-Part 2
  • Secure Staging Deployment Concepts
  • Embedded Systems-Part 1
  • Embedded Systems-Part 2
  • Application Development And Deployment-Part 1
  • Application Development And Deployment-Part 2
  • Application Development And Deployment-Part 3
  • Physical Security Controls-Part 1
  • Physical Security Controls-Part 2
  • Physical Security Controls-Part 3
  • Cloud Virtualization-Part 1
  • Cloud Virtualization-Part 2
Module 4: Identity and Access Management
  • Module 4 Workbook
  • Identity And Access Management-Part1
  • Identity And Access Management-Part2
  • Identity And Access Services-Part1
  • Identity And Access Services-Part2
  • Management Controls-Part1
  • Management Controls-Part2
  • Account Management Practices-Part1
  • Account Management Practices-Part2
  • Account Management Practices-Part3
Module 5: Risk Management
  • Module 5 Workbook
  • Organizational Security-Part1
  • Organizational Security-Part2
  • Business Impact Analysis Concepts-Part1
  • Business Impact Analysis Concepts-Part2
  • Risk Management-Part1
  • Risk Management-Part2
  • Incident Response Procedures-Part1
  • Incident Response Procedures-Part2
  • Forensics-Part1
  • Forensics-Part2
  • Disaster Recovery-Part1
  • Disaster Recovery-Part2
  • Types Of Control-Part1
  • Types Of Control-Part2
  • Data Security And Privacy Practices-Part1
  • Data Security And Privacy Practices-Part2
Module 6: Cryptography and PKI
  • Module 6 Workbook
  • Cryptographic Basics-Part1
  • Cryptographic Basics-Part2
  • Cryptographic Basics-Part3
  • Cryptographic Algorithms-Part1
  • Cryptographic Algorithms-Part2
  • Wireless Security-Part1
  • Wireless Security-Part2
  • Implementing PKI-Part1
  • Implementing PKI-Part2
  • Implementing PKI-Part3
  • Conclusion

This course is included in all of our team and individual training plans. Choose the option that works best for you.

[ Team Training ]

Enroll My Team.

Give your entire team access to this course and our full training library. Includes team dashboards, progress tracking, and group management.

Get Team Pricing

[ Individual Plans ]

Choose a Plan.

Get unlimited access to this course and our entire library with a monthly, quarterly, annual, or lifetime plan.

View Individual Plans

[ FAQ ]

Frequently Asked Questions.

What is the CompTIA Security Infrastructure Expert (CSIE) certification?

The CSIE certification is an advanced, stackable credential designed for experienced IT professionals specializing in security infrastructure. It validates your ability to secure endpoints, conduct threat hunting, test system vulnerabilities, and make critical architecture decisions within an enterprise environment.

This certification is not meant for beginners; instead, it recognizes your comprehensive expertise across multiple cybersecurity domains. It leverages prior certifications like Security+, CySA+, and PenTest+ to demonstrate a broad and deep understanding of security infrastructure concepts and practices.

How does the CSIE certification differ from other CompTIA security certifications?

The CSIE stands out because it is a stackable, advanced-level credential that synthesizes knowledge from multiple foundational certifications, such as Security+, CySA+, and PenTest+. It emphasizes practical skills required to design, implement, and manage complex security architectures.

Unlike entry-level certifications that focus on basic security principles, the CSIE targets seasoned professionals who are responsible for securing enterprise environments and making strategic security decisions. It demonstrates a higher level of mastery in cybersecurity infrastructure and threat mitigation.

What topics are covered in the CSIE certification course?

The CSIE course covers a comprehensive range of security infrastructure topics, including endpoint security, threat hunting, vulnerability testing, and security architecture design. It prepares you to identify security gaps, respond to cyber threats, and implement secure network and system configurations.

The curriculum builds on knowledge from existing certifications and emphasizes practical, real-world skills. You will learn advanced techniques for securing enterprise environments, analyzing security risks, and making informed architecture decisions to protect organizational assets.

Is the CSIE certification suitable for beginners in cybersecurity?

No, the CSIE is not a beginner’s credential. It is designed for experienced IT professionals who already possess a solid foundation in cybersecurity principles and practices. Candidates should have prior certifications like Security+, CySA+, or PenTest+ and practical experience in security roles.

This certification aims to validate advanced skills in security infrastructure management, threat detection, and architecture design. If you are just starting your cybersecurity journey, it is recommended to pursue foundational certifications before aiming for CSIE.

How can I prepare for the CSIE exam?

Preparation for the CSIE exam involves a combination of hands-on experience, studying relevant coursework, and reviewing exam objectives. The on-demand course provides a structured learning path that covers all necessary topics and skills.

Additionally, practicing real-world scenarios, taking practice exams, and engaging with cybersecurity communities can enhance your readiness. Having prior certifications like Security+, CySA+, and PenTest+ will also help you grasp the advanced concepts covered in the CSIE exam.

Ready to start learning? Individual Plans →Team Plans →