SKU: comptia-csap Category:

CompTIA Security Analytics Professional (CSAP)

$129.00

The CompTIA CSAP is a stackable certification by CompTIA. It is designed for IT professionals with 2 to 5 years of experience. The ITU Certification Path for the CompTIA CSAP certification
consists of the learning materials to allow you to study for and pass the CompTIA Security+ and CompTIA CySA+ exams.

Get an exceptional deal on this course at a lower price.  View our Master CompTIA Training Series which includes this course.

Completing this path and passing the two exams means you end of with two CompTIA certifications and are a designated a CompTIA Security Analytics Professional (CSAP).

The two courses contained in this path are:

About The Exams for CompTIA CSAP

For the CompTIA Security+ certification, you must pass the following exam.

For CompTIA CySA+ certification, you are required to pass one exam:

Upon successfully passing the applicable exams provided by CompTIA, you will earn the CSAP certification badge.

For more information on CompTIA Stackable Certifications, visit the CompTIA website. Pricing charged by CompTIA varies by exam. For details on current pricing, visit CompTIA Pricing on their website.

Course Outline

Module 1: Threats, Attacks and Vulnerabilities
  •  Module 1 Workbook
  •  Introduction
  •  Types Of Malware-Part 1
  •  Types Of Malware-Part 2
  •  Types Of Attacks-Part 1
  •  Types Of Attacks-Part 2
  •  Types Of Attacks-Part 3
  •  Types Of Attacks-Part 4
  •  Types Of Attacks-Part 5
  •  Threat Actors-Part 1
  •  Threat Actors-Part 2
  •  Penetration Testing And Vulnerability Scanning-Part 1
  •  Penetration Testing And Vulnerability Scanning-Part 2
  •  Impact Of Vulnerabilities-Part 1
  •  Impact Of Vulnerabilities-Part 2
Module 2: Technologies and Tools
  •  Module 2 Workbook
  •  Networking Hardware And Software-Part 1
  •  Networking Hardware And Software-Part 2
  •  Networking Hardware And Software-Part 3
  •  Networking Hardware And Software-Part 4
  •  Networking Hardware And Software-Part 5
  •  Networking Hardware And Software-Part 6
  •  Security Assessment-Part 1
  •  Security Assessment-Part 2
  •  Troubleshooting Issues-Part 1
  •  Troubleshooting Issues-Part 2
  •  Securing Mobile Devices-Part 1
  •  Securing Mobile Devices-Part 2
  •  Securing Mobile Devices-Part 3
  •  Securing Mobile Devices-Part 4
  •  Secure Protocols-Part 1
  •  Secure Protocols-Part 2
Module 3: Architecture and Design
  •  Module 3 Workbook
  •  Secure Network Architecture-Part 1
  •  Secure Network Architecture-Part 2
  •  Secure System Designs-Part 1
  •  Secure System Designs-Part 2
  •  Secure Staging Deployment Concepts
  •  Embedded Systems-Part 1
  •  Embedded Systems-Part 2
  •  Application Development And Deployment-Part 1
  •  Application Development And Deployment-Part 2
  •  Application Development And Deployment-Part 3
  •  Physical Security Controls-Part 1
  •  Physical Security Controls-Part 2
  •  Physical Security Controls-Part 3
  •  Cloud Virtualization-Part 1
  •  Cloud Virtualization-Part 2
Module 4: Identity and Access Management
  •  Module 4 Workbook
  •  Identity And Access Management-Part1
  •  Identity And Access Management-Part2
  •  Identity And Access Services-Part1
  •  Identity And Access Services-Part2
  •  Management Controls-Part1
  •  Management Controls-Part2
  •  Account Management Practices-Part1
  •  Account Management Practices-Part2
  •  Account Management Practices-Part3
Module 5: Risk Management
  •  Module 5 Workbook
  •  Organizational Security-Part1
  •  Organizational Security-Part2
  •  Business Impact Analysis Concepts-Part1
  •  Business Impact Analysis Concepts-Part2
  •  Risk Management-Part1
  •  Risk Management-Part2
  •  Incident Response Procedures-Part1
  •  Incident Response Procedures-Part2
  •  Forensics-Part1
  •  Forensics-Part2
  •  Disaster Recovery-Part1
  •  Disaster Recovery-Part2
  •  Types Of Control-Part1
  •  Types Of Control-Part2
  •  Data Security And Privacy Practices-Part1
  •  Data Security And Privacy Practices-Part2
Module 6: Cryptography and PKI
  •  Module 6 Workbook
  •  Cryptographic Basics-Part1
  •  Cryptographic Basics-Part2
  •  Cryptographic Basics-Part3
  •  Cryptographic Algorithms-Part1
  •  Cryptographic Algorithms-Part2
  •  Wireless Security-Part1
  •  Wireless Security-Part2
  •  Implementing PKI-Part1
  •  Implementing PKI-Part2
  •  Implementing PKI-Part3
  •  Conclusion
CompTIA Security Analytics Professional (CSAP)

This Certification Path will enable you to study to obtain the CompTIA CSAP designation.


Save For Later
Add to Wishlist