Skip to product information
1 of 2

CompTIA

CompTIA CASP+® (CAS-004) Complete Course, Labs, & Practice Exams

CompTIA CASP+® (CAS-004) Complete Course, Labs, & Practice Exams

Regular price $499.00 USD
Regular price $0.00 USD Sale price $499.00 USD
Liquid error (snippets/price line 128): divided by 0% OFF Sold out
Type

Master Enterprise Security Architecture 

78% of enterprises struggle to find qualified security architects.  CompTIA CASP+ (CAS-004) certification validates your expertise in security architecture, operations, engineering, and governance.  With enterprise security demands at an all-time high, CASP+ certified professionals earn an average salary of $127,451.

Who This Course Is For

  • IT directors and leadership teams
  • Risk management professionals
  • Cybersecurity analysts and engineers
  • Penetration testers and security consultants
  • Individuals preparing for the CASP+ (CAS-004) exam

What’s Included

  • 40+ hours of expert-led video training
  • Official CompTIA CASP+ (CAS-004) study guide
  • Hands-on labs for real-world cybersecurity challenges
  • Practice exams  - Over 800 questions designed to mimic the real test
  • Downloadable study resources and tools
  • 12-month course access

What You’ll Learn

This course prepares you for the CASP+ (CAS-004) exam, covering four key domains:

  • Security Architecture 
  • Security Operations 
  • Security Engineering and Cryptography 
  • Governance, Risk, and Compliance 

Why Choose Dion Training?

  • Learn from experienced cybersecurity professionals
  • 60-Day Pass Guarantee – Pass your exam or we pay for your retake
  • Hands-on labs to reinforce real-world skills
  • CompTIA Platinum Partner
View full details
Modules
1 - Introduction
Toggle chapter
#
Lesson
Duration
Type
1.
Welcome
FREE
8m:27s
Video FREE
2.
Download your free study guide
PDF PDF
3.
Lab: Exploring the Lab Environment
Lab Lab
4.
Checkpoint: Introduction
Quiz Quiz
2 - Data Considerations
Toggle chapter
#
Lesson
Duration
Type
1.
Data Considerations
FREE
0m:57s
Video FREE
2.
Data Security
FREE
3m:44s
Video FREE
3.
Data Classification
FREE
2m:47s
Video FREE
4.
Data Types
5m:24s
Video Video
5.
Data Retention
6m:56s
Video Video
6.
Data Destruction
2m:55s
Video Video
7.
Data Ownership
5m:34s
Video Video
8.
Data Sovereignty
3m:18s
Video Video
9.
Checkpoint: Data Considerations
Quiz Quiz
3 - Risk Management
Toggle chapter
#
Lesson
Duration
Type
1.
Risk Management
1m:30s
Video Video
2.
Risk Strategies
4m:30s
Video Video
3.
Risk Management Lifecycle
11m:52s
Video Video
4.
Risk Types
3m:3s
Video Video
5.
Risk Handling
8m:33s
Video Video
6.
Risk Tracking
5m:7s
Video Video
7.
Risk Assessment
18m:0s
Video Video
8.
When Risk Management Fails
3m:44s
Video Video
9.
Checkpoint: Risk Management
Quiz Quiz
4 - Policies and Frameworks
Toggle chapter
#
Lesson
Duration
Type
1.
Policies and Frameworks
1m:23s
Video Video
2.
Policies
12m:1s
Video Video
3.
Frameworks
5m:7s
Video Video
4.
Regulations
8m:8s
Video Video
5.
Standards
6m:11s
Video Video
6.
Contracts and Agreements
9m:23s
Video Video
7.
Legal Considerations
7m:3s
Video Video
8.
Integrating Industries
3m:29s
Video Video
9.
Checkpoint: Policies and Frameworks
Quiz Quiz
5 - Business Continuity
Toggle chapter
#
Lesson
Duration
Type
1.
Business Continuity
1m:11s
Video Video
2.
Business Continuity Plan
13m:43s
Video Video
3.
Business Impact Analysis
13m:52s
Video Video
4.
Privacy Impact Assessment
3m:53s
Video Video
5.
Incident Response Plan
10m:58s
Video Video
6.
Testing Plans
7m:10s
Video Video
7A.
Lab: Understanding DR capabilities in the Azure Cloud
Lab Lab
8.
Checkpoint: Business Continuity
Quiz Quiz
6 - Risk Strategies
Toggle chapter
#
Lesson
Duration
Type
1.
Risk Strategies
1m:32s
Video Video
2.
Asset Value
4m:4s
Video Video
3.
Access Control
6m:21s
Video Video
4.
Aggregating Risk
3m:7s
Video Video
5.
Scenario Planning
8m:21s
Video Video
6.
Security Controls
9m:16s
Video Video
7.
Security Solutions
8m:54s
Video Video
8.
Cost Of A Data Breach
6m:2s
Video Video
9.
Checkpoint: Risk Strategies
Quiz Quiz
7 - Vendor Risk
Toggle chapter
#
Lesson
Duration
Type
1.
Vendor Risk
4m:1s
Video Video
2.
Business Models
11m:5s
Video Video
3.
Influences
7m:25s
Video Video
4.
Organizational Changes
6m:11s
Video Video
5.
Shared Responsibility Model
4m:50s
Video Video
6.
Viability and Support
10m:50s
Video Video
7.
Dependencies
4m:39s
Video Video
8.
Considerations
10m:35s
Video Video
9.
Supply Chain
5m:59s
Video Video
10.
Checkpoint: Vendor Risk
Quiz Quiz
8 - Securing Networks
Toggle chapter
#
Lesson
Duration
Type
1.
Securing Networks
6m:48s
Video Video
2.
Switches
7m:27s
Video Video
3.
Routers
8m:27s
Video Video
4.
Wireless and Mesh
3m:23s
Video Video
5.
Firewalls
11m:30s
Video Video
6A.
Lab: Implementing a Web Application Firewall
Lab Lab
7.
Proxies
7m:13s
Video Video
8.
Gateways
4m:39s
Video Video
9.
IDS and IPS
6m:28s
Video Video
10.
Network Access Control (NAC)
2m:56s
Video Video
11.
Remote Access
8m:59s
Video Video
12.
Unified Communications
19m:8s
Video Video
13.
Cloud vs On-premise
4m:49s
Video Video
14.
DNSSEC
4m:16s
Video Video
15A.
Lab: Understanding the Role of SPF Records and DNSSEC
Lab Lab
16.
Load Balancer
6m:48s
Video Video
17.
Checkpoint: Securing Networks
Quiz Quiz
9 - Securing Architectures
Toggle chapter
#
Lesson
Duration
Type
1.
Securing Architectures
1m:16s
Video Video
2.
Traffic Mirroring
4m:23s
Video Video
3.
Network Sensors
11m:46s
Video Video
4.
Host Sensors
6m:15s
Video Video
5.
Layer 2 Segmentation
5m:14s
Video Video
6.
Network Segmentation
13m:14s
Video Video
7.
Server Segmentation
10m:51s
Video Video
8.
Zero Trust
6m:37s
Video Video
9.
Merging Networks
5m:32s
Video Video
10.
Software-Defined Networking (SDN)
5m:27s
Video Video
11.
Checkpoint: Securing Architectures
Quiz Quiz
10 - Infrastructure Design
Toggle chapter
#
Lesson
Duration
Type
1.
Infrastructure Design
1m:9s
Video Video
2.
Scalability
5m:39s
Video Video
3.
Resiliency Issues
12m:49s
Video Video
4.
Automation
6m:26s
Video Video
5.
Performance Design
6m:3s
Video Video
6.
Virtualization
8m:19s
Video Video
7.
Containerization
5m:48s
Video Video
8A.
Lab: Implementing and Updating Containers on Windows Server 2019
Lab Lab
8B.
Lab: Performing Container Update Tasks
Lab Lab
9.
Checkpoint: Infrastructure Design
Quiz Quiz
11 - Cloud and Virtualization
Toggle chapter
#
Lesson
Duration
Type
1.
Cloud and Virtualization
1m:6s
Video Video
2.
Cloud Deployment Models
4m:34s
Video Video
3.
Cloud Service Models
5m:7s
Video Video
4.
Deployment Considerations
4m:57s
Video Video
5.
Provider Limitations
2m:59s
Video Video
6.
Extending Controls
5m:6s
Video Video
7.
Provision and Deprovision
2m:59s
Video Video
8.
Storage Models
5m:22s
Video Video
9.
Virtualization
7m:56s
Video Video
10A.
Lab: Implementing a VNet in Azure
Lab Lab
10B.
Lab: Implementing Virtual Private Cloud (VPC) in AWS
Lab Lab
11.
Checkpoint: Cloud and Virtualization
Quiz Quiz
12 - Software Applications
Toggle chapter
#
Lesson
Duration
Type
1.
Software Applications
2m:42s
Video Video
2.
Systems Development Life Cycle
6m:36s
Video Video
3.
Software Development Life Cycle
5m:52s
Video Video
4.
Development Approaches
10m:51s
Video Video
5.
Software Assurance
8m:56s
Video Video
6.
Baselines and Templates
6m:31s
Video Video
7.
Best Practices
6m:7s
Video Video
8.
Integrating Applications
4m:31s
Video Video
9.
Checkpoint: Software Applications
Quiz Quiz
13 - Data Security
Toggle chapter
#
Lesson
Duration
Type
1.
Data Security
3m:36s
Video Video
2.
Data Life Cycle
10m:29s
Video Video
3.
Data Classification
6m:55s
Video Video
4.
Labeling and Tagging
8m:11s
Video Video
5.
Deidentification
11m:3s
Video Video
6.
Data Encryption
7m:32s
Video Video
7.
Data Loss Prevention (DLP)
10m:1s
Video Video
8.
DLP Detection
6m:42s
Video Video
9.
Data Loss Detection
11m:34s
Video Video
10A.
Lab: Using Automation to Identify and Label Sensitive Data
Lab Lab
11.
Checkpoint: Data Security
Quiz Quiz
14 - Authentication and Authorization
Toggle chapter
#
Lesson
Duration
Type
1.
Authentication and Authorization
1m:44s
Video Video
2.
Access Control
4m:47s
Video Video
3.
Credential Management
4m:27s
Video Video
4.
Password Policies
8m:2s
Video Video
5.
Multifactor Authentication
8m:25s
Video Video
6.
Authentication Protocols
10m:0s
Video Video
7.
Federation
7m:2s
Video Video
8.
Root of Trust
4m:24s
Video Video
9.
Attestation
2m:14s
Video Video
10.
Identity Proofing
3m:33s
Video Video
11.
Checkpoint: Authentication and Authorization
Quiz Quiz
15 - Cryptography
Toggle chapter
#
Lesson
Duration
Type
1.
Cryptography
1m:48s
Video Video
2.
Privacy and Confidentiality
6m:32s
Video Video
3.
Integrity and Non-repudiation
6m:30s
Video Video
4.
Compliance and Policy
3m:33s
Video Video
5.
Data States
7m:2s
Video Video
6.
Cryptographic Use Cases
6m:17s
Video Video
7.
PKI Use Cases
8m:41s
Video Video
8.
Checkpoint: Cryptography
Quiz Quiz
16 - Emerging Technology
Toggle chapter
#
Lesson
Duration
Type
1.
Emerging Technology
4m:18s
Video Video
2.
Artificial Intelligence & Machine Learning (AI & ML)
8m:55s
Video Video
3.
Deep Learning
8m:58s
Video Video
4.
Big Data
4m:40s
Video Video
5.
Blockchain & Distributed Consensus
5m:36s
Video Video
6.
Passwordless Authentication
5m:17s
Video Video
7.
Homomorphic Encryption
3m:37s
Video Video
8.
Virtual/Augmented Reality
4m:32s
Video Video
9.
3D Printing
3m:3s
Video Video
10.
Quantum Computing
5m:34s
Video Video
11.
Checkpoint: Emerging Technology
Quiz Quiz
17 - Enterprise Mobility
Toggle chapter
#
Lesson
Duration
Type
1.
Enterprise Mobility
2m:36s
Video Video
2.
Enterprise Mobility Management (EMM)
9m:36s
Video Video
3.
WPA3
7m:20s
Video Video
4A.
Lab: Analyze and Attack Wireless Network Protections
Lab Lab
5.
Connectivity Options
8m:48s
Video Video
6.
Security Configurations
8m:7s
Video Video
7.
DNS Protection
3m:15s
Video Video
8A.
Lab: Understanding DNS over HTTPS (DoH)
Lab Lab
9.
Deployment Options
4m:38s
Video Video
10.
Reconnaissance Concerns
8m:0s
Video Video
11.
Mobile Security
7m:50s
Video Video
12.
Checkpoint: Enterprise Mobility
Quiz Quiz
18 - Endpoint Security Controls
Toggle chapter
#
Lesson
Duration
Type
1.
Endpoint Security Controls
2m:24s
Video Video
2.
Device Hardening
8m:30s
Video Video
3.
Patching
4m:41s
Video Video
4.
Security Settings
5m:41s
Video Video
5.
Mandatory Access Controls (MAC)
6m:44s
Video Video
6.
Secure Boot
5m:49s
Video Video
7.
Hardware Encryption
4m:48s
Video Video
8.
Endpoint Protections
9m:54s
Video Video
9.
Logging and Monitoring
6m:14s
Video Video
10A.
Lab: Using Security Incident and Event Management (SIEM) Features
Lab Lab
11.
Resiliency
6m:4s
Video Video
12.
Checkpoint: Endpoint Security Controls
Quiz Quiz
19 - Cloud Technologies
Toggle chapter
#
Lesson
Duration
Type
1.
Cloud Technologies
2m:37s
Video Video
2.
Business Continuity/Disaster Recovery (BC/DR)
7m:51s
Video Video
3.
Cloud Encryption
5m:22s
Video Video
4.
Serverless Computing
8m:54s
Video Video
5.
Software-Defied Networking (SDN)
6m:52s
Video Video
6.
Log Collection and Analysis
4m:22s
Video Video
7A.
Lab: Configure Monitoring in the AWS Cloud
Lab Lab
8.
Cloud Access Security Broker (CASB)
6m:16s
Video Video
9.
Cloud Misconfigurations
10m:57s
Video Video
10A.
Lab: Deploying a Hardened Server Image in the Azure Cloud
Lab Lab
11.
Checkpoint: Cloud Technologies
Quiz Quiz
20 - Operational Technologies
Toggle chapter
#
Lesson
Duration
Type
1.
Operational Technologies
2m:5s
Video Video
2.
Embedded Systems
10m:28s
Video Video
3.
ICS and SCADA
9m:18s
Video Video
4.
ICS Protocols
10m:54s
Video Video
5.
Industries and Sectors
4m:48s
Video Video
6.
Checkpoint: Operational Technologies
Quiz Quiz
21 - Hashing and Symmetric Algorithms
Toggle chapter
#
Lesson
Duration
Type
1.
Hashing and Symmetric Algorithms
1m:13s
Video Video
2.
Hashing
6m:55s
Video Video
3.
Message Authentication
3m:7s
Video Video
4.
Symmetric Algorithms
3m:33s
Video Video
5.
Stream Ciphers
5m:43s
Video Video
6.
Block Ciphers
4m:32s
Video Video
7A.
Lab: Implementing Data Protection using Symmetric Encryption
Lab Lab
8.
Checkpoint: Hashing and Symmetric Algorithms
Quiz Quiz
22 - Asymmetric Algorithms
Toggle chapter
#
Lesson
Duration
Type
1.
Asymmetric Algorithms
2m:11s
Video Video
2.
Using Asymmetric Algorithms
9m:28s
Video Video
3.
SSL/TLS and Cipher Suites
8m:21s
Video Video
4.
S/MIME and SSH
7m:27s
Video Video
5.
EAP
5m:39s
Video Video
6.
IPSEC
14m:34s
Video Video
7.
Elliptic Curve Cryptography (ECC)
3m:33s
Video Video
8.
Forward Secrecy
3m:35s
Video Video
9.
Authenticated Encryption with Associated Data (AEAD)
1m:52s
Video Video
10.
Key Stretching
4m:30s
Video Video
11.
Checkpoint: Asymmetric Algorithms
Quiz Quiz
23 - Public Key Infrastructure
Toggle chapter
#
Lesson
Duration
Type
1.
Public Key Infrastructure
2m:50s
Video Video
2.
PKI Components
10m:18s
Video Video
3.
Digital Certificates
7m:44s
Video Video
4.
Using Digital Certificates
5m:40s
Video Video
5.
Trust Models
4m:28s
Video Video
6.
Certificate Management
2m:44s
Video Video
7.
Certificate Validity (CRL and OCSP)
3m:48s
Video Video
8.
Protecting Web Traffic
3m:30s
Video Video
9A.
Lab: Implementing HTTP Server Certificates
Lab Lab
10.
Troubleshooting Certificates
5m:22s
Video Video
11A.
Lab: Troubleshooting HTTP Server Certificates
Lab Lab
12.
Troubleshooting Keys
183m:34s
Video Video
13.
Checkpoint: Public Key Infrastructure
Quiz Quiz
24 - Threat and Vulnerability Management
Toggle chapter
#
Lesson
Duration
Type
1.
Threat and Vulnerability Management
1m:56s
Video Video
2.
Threat Intelligence
6m:19s
Video Video
3.
Threat Hunting
6m:43s
Video Video
4.
Intelligence Collection
11m:9s
Video Video
5.
Threat Actors
9m:21s
Video Video
6.
Threat Management Frameworks
12m:45s
Video Video
7A.
Lab: Exploring MITRE ATT&CK Navigator
Lab Lab
8.
Vulnerability Management Activities
11m:44s
Video Video
9.
Security Content Automation Protocol (SCAP)
7m:21s
Video Video
10.
Checkpoint: Threat and Vulnerability Management
Quiz Quiz
25 - Vulnerability Assessments
Toggle chapter
#
Lesson
Duration
Type
1.
Vulnerability Assessments
1m:34s
Video Video
2.
Penetration Test
4m:49s
Video Video
3.
PenTest Steps
7m:2s
Video Video
4.
PenTest Requirements
11m:25s
Video Video
5.
Code Analysis
8m:29s
Video Video
6A.
Lab: Performing Static Code Analysis
Lab Lab
7.
Protocol Analysis
7m:52s
Video Video
8.
Analysis Utilities
5m:19s
Video Video
9.
Checkpoint: Vulnerability Assessments
Quiz Quiz
26 - Risk Reduction
Toggle chapter
#
Lesson
Duration
Type
1.
Risk Reduction
1m:32s
Video Video
2.
Deceptive Technologies
5m:1s
Video Video
3.
Security Data Analytics
8m:4s
Video Video
4.
Preventative Controls
5m:10s
Video Video
5.
Application Controls
9m:42s
Video Video
6A.
Lab: Implementing an Application Blocklist Policy
Lab Lab
7.
Security Automation
10m:42s
Video Video
8.
Physical Security
6m:44s
Video Video
9.
Checkpoint: Risk Reduction
Quiz Quiz
27 - Analyzing Vulnerabilities
Toggle chapter
#
Lesson
Duration
Type
1.
Analyzing Vulnerabilities
1m:22s
Video Video
2.
Race Conditions
4m:58s
Video Video
3.
Buffer Overflows
12m:26s
Video Video
4.
Authentication and References
5m:55s
Video Video
5.
Ciphers and Certificates
10m:45s
Video Video
6.
Improper Headers
6m:9s
Video Video
7.
Software Composition
9m:49s
Video Video
8.
Vulnerable Web Applications
11m:45s
Video Video
9A.
Lab: Analyzing Web Application Vulnerabilities
Lab Lab
10.
Checkpoint: Analyzing Vulnerabilities
Quiz Quiz
28 - Attacking Vulnerabilities
Toggle chapter
#
Lesson
Duration
Type
1.
Attacking Vulnerabilities
1m:15s
Video Video
2.
Directory Traversals
9m:48s
Video Video
3.
Cross-Site Scripting (XSS)
8m:59s
Video Video
4.
Cross-Site Request Forgery (CSRF)
7m:15s
Video Video
5.
SQL Injections
7m:5s
Video Video
6.
XML Injections
6m:29s
Video Video
7.
Other Injection Attacks
4m:21s
Video Video
8A.
Lab: Exploiting Web Applications – Stored XSS, SQL Injection
Lab Lab
9.
Authentication Bypass
6m:45s
Video Video
10.
VM Attacks
8m:41s
Video Video
11.
Network Attacks
4m:52s
Video Video
12A.
Lab: Exploiting the Server Message Block (SMB) Protocol
Lab Lab
12B.
Lab: Analyzing SMB Vulnerabilities
Lab Lab
13.
Social Engineering
7m:15s
Video Video
14.
Checkpoint: Attacking Vulnerabilities
Quiz Quiz
29 - Indicators of Compromise
Toggle chapter
#
Lesson
Duration
Type
1.
Indicators of Compromise
1m:49s
Video Video
2.
Types of IoCs
3m:55s
Video Video
3.
PCAP Files
4m:16s
Video Video
4.
NetFlow
7m:5s
Video Video
5.
Logs
7m:1s
Video Video
6.
IoC Notifications
7m:38s
Video Video
7A.
Lab: Exploring and Interpreting Intrusion Detection System (IDS) Alerts
Lab Lab
7B.
Lab: Analyzing Intrusion Detection System Logs
Lab Lab
8.
Response to IoCs
5m:15s
Video Video
9.
Checkpoint: Indicators of Compromise
Quiz Quiz
30 - Incident Response
Toggle chapter
#
Lesson
Duration
Type
1.
Incident Response
1m:26s
Video Video
2.
Triage
8m:4s
Video Video
3.
Communication Plan
10m:3s
Video Video
4.
Stakeholder Management
7m:9s
Video Video
5.
Incident Response Process
10m:20s
Video Video
6.
Playbooks
8m:25s
Video Video
7.
Checkpoint: Incident Response
Quiz Quiz
31 - Digital Forensics
Toggle chapter
#
Lesson
Duration
Type
1.
Digital Forensics
1m:4s
Video Video
2.
Forensic Process
4m:36s
Video Video
3.
Chain of Custody
7m:4s
Video Video
4.
Order of Volatility
6m:28s
Video Video
5.
Forensic Analysis
6m:38s
Video Video
6A.
Lab: Exploring Cryptography and Cryptanalysis Using Visual Tools
Lab Lab
7.
Checkpoint: Digital Forensics
Quiz Quiz
32 - Digital Forensic Tools
Toggle chapter
#
Lesson
Duration
Type
1.
Digital Forensic Tools
2m:22s
Video Video
2.
Forensic Workstations
5m:8s
Video Video
3.
File Carving Tools
3m:33s
Video Video
4.
Binary Analysis Tools
7m:9s
Video Video
5A.
Lab: Analyzing Firmware using Binary Analysis and Hardware Emulation
Lab Lab
6.
Forensic Analysis Tools
8m:8s
Video Video
7.
Imaging Tools
7m:45s
Video Video
8.
Collection Tools
6m:14s
Video Video
9.
Checkpoint: Digital Forensic Tools
Quiz Quiz
33 - Conclusion
Toggle chapter
#
Lesson
Duration
Type
1.
Conclusion
10m:19s
Video Video
2.
CASP+ (CAS-004) Practice Exam
Lab Lab

Reviews