Skip to product information
1 of 2

CompTIA

CompTIA SecurityX (CAS-005) Complete Course, Labs, & Practice Exams

CompTIA SecurityX (CAS-005) Complete Course, Labs, & Practice Exams

Regular price $499.00 USD
Regular price Sale price $499.00 USD
Liquid error (snippets/price line 128): divided by 0% OFF Sold out
Type

Master Enterprise Security Architecture 

Prepare to excel in advanced enterprise security with the CompTIA SecurityX (CAS-005) certification course. This comprehensive training equips professionals with the skills to architect, engineer, and manage secure solutions across diverse environments. The course emphasizes practical knowledge in automation, cryptographic technologies, incident response, and governance strategies to support resilient enterprise security. With enterprise security demands at an all-time high, SecurityX certified professionals earn an average salary of $127,451.

Who This Course Is For

  • IT professionals with at least five years of hands-on security experience
  • Security architects, engineers, and analysts seeking advanced certifications
  • Risk management and compliance officers aiming to deepen technical expertise
  • Professionals in industries like finance, healthcare, and government requiring advanced security skills
  • Anyone committed to advancing their career in enterprise security management

What’s Included

  • 40+ hours of expert-led video training
  • Official CompTIA SecurityX (CAS-005) study guide
  • Hands-on labs for real-world troubleshooting
  • Practice Exams - Over 800 questions  designed to mimic the real test
  • 12-month course access

What You’ll Learn

  • Architect and implement secure solutions across cloud, hybrid, and on-premises environments
  • Manage and mitigate enterprise-wide risks using advanced frameworks and strategies
  • Apply cutting-edge cryptographic technologies and AI-driven solutions
  • Enhance detection, monitoring, and incident response capabilities
  • Secure legacy and specialized systems against modern threats
  • Utilize Zero Trust principles to protect critical enterprise assets

Why Choose Dion Training?

  • Learn from industry-leading instructors
  • 60-Day Pass Guarantee – Pass your exam or we pay for your retake
  • Hands-on labs to reinforce real-world skills
  • CompTIA Platinum Partner

View full details
Modules
1 - Introduction
Toggle chapter
#
Lesson
Duration
Type
1.
Introduction
11m:36s
Video Video
2.
Download your free study guide
PDF PDF
3.
Exam Tips
4m:43s
Video Video
4.
100% Pass Guarantee
4m:25s
Video Video
5.
Our Lab Environment
6m:7s
Video Video
6.
Exploring the VM Lab Environment
Lab Lab
7.
Checkpoint:
Quiz Quiz
2 - Governance
Toggle chapter
#
Lesson
Duration
Type
1.
Governance
7m:43s
Video Video
2.
Security Program Documentation
10m:34s
Video Video
3.
Awareness and Training Considerations
9m:24s
Video Video
4.
Governance Frameworks
5m:16s
Video Video
5.
Governance, Risk, and Compliance (GRC) Tools
6m:13s
Video Video
6.
Management Involvement
6m:10s
Video Video
7.
Change and Configuration Management
6m:23s
Video Video
8.
The Data Lifecycle
7m:18s
Video Video
9.
Communication Considerations
6m:4s
Video Video
10.
Checkpoint:
Quiz Quiz
3 - Risk Management
Toggle chapter
#
Lesson
Duration
Type
1.
Risk Management
10m:9s
Video Video
2.
Confidentiality Risk Considerations
8m:38s
Video Video
3.
Integrity Risk Considerations
10m:13s
Video Video
4.
Availability Risk Considerations
9m:40s
Video Video
5.
Privacy Risk Considerations
7m:14s
Video Video
6.
Risk Assessment Frameworks
6m:37s
Video Video
7.
Risk Assessment
8m:50s
Video Video
8.
Risk Response
4m:40s
Video Video
9.
Impact Analysis
5m:44s
Video Video
9a.
LAB: Evaluate Findings from Assessment
Lab Lab
10.
Third-Party Risk Management
5m:30s
Video Video
11.
Checkpoint: Risk Management
Quiz Quiz
4 - Compliance
Toggle chapter
#
Lesson
Duration
Type
1.
Compliance
10m:38s
Video Video
2.
Industry Compliance
9m:24s
Video Video
3.
Industry Standards
7m:49s
Video Video
4.
Security Frameworks
7m:28s
Video Video
5.
Security Organziation Control Type 2 (SOC 2)
5m:21s
Video Video
6.
NIST Cybersecurity Framework (CSF)
4m:27s
Video Video
7.
Cloud Security Alliance (CSA)
3m:42s
Video Video
8.
Privacy Regulations
10m:8s
Video Video
9.
Security Reviews
7m:11s
Video Video
10.
Cross-Jurisdictional Compliance
6m:34s
Video Video
11.
Checkpoint:
Quiz Quiz
5 - Resilient System Design
Toggle chapter
#
Lesson
Duration
Type
1.
Resilient System Design
10m:41s
Video Video
2.
Security Devices
11m:16s
Video Video
3.
Monitoring and Detection
12m:53s
Video Video
4.
Network Traffic Management
9m:42s
Video Video
5a.
LAB: Testing a Web Application Firewall (WAF)
Lab Lab
5.
Application Layer Security
6m:38s
Video Video
6.
Availability Considerations
7m:20s
Video Video
7.
Scaling Considerations
6m:57s
Video Video
8.
Recovery Strategies
5m:37s
Video Video
9.
Deployment Strategies
5m:37s
Video Video
9a.
LAB: Host and Network Security Techniques
Lab Lab
10.
Checkpoint: Resilient System Design
Quiz Quiz
6 - Secure Architecture Design
Toggle chapter
#
Lesson
Duration
Type
1.
Secure Architecture Design
9m:37s
Video Video
2.
Data States
7m:24s
Video Video
3.
Data Classification
8m:54s
Video Video
4.
Data Labeling and Tagging
8m:51s
Video Video
5.
Data Loss Prevention (DLP)
6m:42s
Video Video
6.
Hybrid Infrastrucutres
9m:0s
Video Video
7.
Third-Party Integrations
7m:12s
Video Video
8.
Attack Surface Management
13m:7s
Video Video
8a.
LAB: Evaluating Attack Surface Management and Reduction
Lab Lab
9.
Control Effectiveness
9m:5s
Video Video
10.
Checkpoint:
Quiz Quiz
7 - Security in Systems
Toggle chapter
#
Lesson
Duration
Type
1.
Security in Systems
12m:35s
Video Video
2.
Hardware Assurance
8m:51s
Video Video
3.
Security Requirements
9m:42s
Video Video
4.
Software Assurance
11m:18s
Video Video
5.
Supply Chain Assurance
8m:30s
Video Video
8.
Continuous Integration/Continuous Deployment (CI/CD) Management
6m:50s
Video Video
6a.
LAB: Dynamic Application Security Testing (DAST)
Lab Lab
6.
Pre-Deployment Testing
12m:33s
Video Video
7.
Post-Deployment Testing
10m:4s
Video Video
9a.
LAB: Designing a CI/CD Pipeline
Lab Lab
9.
Continuous Integration/Continuous Deployment (CI/CD) Testing
6m:57s
Video Video
10.
End-of-Life (EOL) Considerations
8m:9s
Video Video
11.
Checkpoint: Security in Systems
Quiz Quiz
8 - Access, Authentication, Authorization
Toggle chapter
#
Lesson
Duration
Type
1.
Access, Authentication, Authorization
9m:21s
Video Video
2.
Access Control Systems
8m:35s
Video Video
3.
Access Provision
5m:53s
Video Video
4.
Rule-Based Access Control
12m:23s
Video Video
5.
Role-Based Access Control (RBAC)
3m:40s
Video Video
6.
Identity and Authentication
9m:25s
Video Video
7.
Access Control Policies
4m:44s
Video Video
8.
Monitoring and Oversight
8m:3s
Video Video
9.
Checkpoint:
Quiz Quiz
9 - Zero Trust Design
Toggle chapter
#
Lesson
Duration
Type
1.
Zero Trust Design
11m:8s
Video Video
2.
Security Boundaries
8m:2s
Video Video
3.
VPN Architecture
9m:16s
Video Video
4.
Segmentation
7m:1s
Video Video
5.
Deperimeterization
10m:1s
Video Video
7.
Application Programming Interface (API) Integeration and Validation
8m:32s
Video Video
6a.
LAB: Implementing Continuous Authentication
Lab Lab
6.
Access Management
6m:49s
Video Video
8.
Asset Control
7m:25s
Video Video
9.
Checkpoint: Zero Trust Design
Quiz Quiz
10 - Hardware Security
Toggle chapter
#
Lesson
Duration
Type
1.
Hardware Security
10m:3s
Video Video
2.
Roots of Trust
9m:17s
Video Video
3.
Boot Options
7m:48s
Video Video
4.
Security Coprocessors
6m:39s
Video Video
5.
Self-Encrypting Drives (SED)
4m:53s
Video Video
6.
Host-Based Encryption
9m:21s
Video Video
7.
Self-Healing Hardware
4m:56s
Video Video
8.
Virtual Hardware
5m:58s
Video Video
9.
Checkpoint:
Quiz Quiz
11 - Endpoint and Server Security
Toggle chapter
#
Lesson
Duration
Type
1.
Endpoint and Server Security
9m:24s
Video Video
2.
Configuration and Privilege Management
5m:55s
Video Video
3.
Operating System Security
9m:9s
Video Video
4a.
LAB: HIPS/HIDS (Host-Based Intrusion Protection System/Host-Based Detection System)
Lab Lab
4.
Threat Protection
9m:49s
Video Video
4b.
LAB: Implementing Host-Based Firewalls
Lab Lab
5.
Application Management
5m:57s
Video Video
6.
Monitoring and Response
13m:46s
Video Video
7.
Mobile Management
7m:32s
Video Video
8a.
LAB: Evaluating Information and Data Security Design
Lab Lab
8.
Attack Surface Management
12m:48s
Video Video
9.
Checkpoint: Enpoint and Server Security
Quiz Quiz
12 - Data Security Concepts
Toggle chapter
#
Lesson
Duration
Type
1.
Data Security Concepts
11m:43s
Video Video
2.
Data Integrity
9m:48s
Video Video
3.
Integrity Use Cases
8m:54s
Video Video
4.
Blockchain
15m:58s
Video Video
5.
Data Protection
13m:23s
Video Video
6.
Data State Protection
13m:39s
Video Video
7.
Data Handling and Management
10m:27s
Video Video
8.
Data Compliance and Privacy
10m:44s
Video Video
9.
Checkpoint:
Quiz Quiz
13 - Cryptographic Types
Toggle chapter
#
Lesson
Duration
Type
1.
Cryptographic Types
11m:12s
Video Video
2.
Symmetric Cryptography
8m:28s
Video Video
3.
Symmetric Algorithms
15m:5s
Video Video
4.
Symmetric Cryptography Considerations
9m:37s
Video Video
5.
Asymmetric Cryptography
9m:44s
Video Video
6.
Asymmetric Algorithms
13m:26s
Video Video
7.
Digital Signatures
10m:25s
Video Video
8.
Asymmetric Cryptography Use Cases
13m:10s
Video Video
9.
Checkpoint:
Quiz Quiz
14 - PKI Architecture
Toggle chapter
#
Lesson
Duration
Type
1.
Public Key Infrastructure (PKI) Architecture
8m:11s
Video Video
2.
Certificate Management
16m:58s
Video Video
3.
Certificate Authority (CA) Functions
15m:31s
Video Video
4.
Certificate Validation
14m:28s
Video Video
5.
Certificate Deployment
8m:11s
Video Video
6.
Checkpoint:
Quiz Quiz
15 - Advanced Cryptographic Concepts
Toggle chapter
#
Lesson
Duration
Type
1.
Advanced Cryptographic Concepts
13m:7s
Video Video
2.
Cryptographic Blockers
5m:56s
Video Video
3.
Key Management
8m:46s
Video Video
4.
Encryption Techniques
6m:41s
Video Video
5.
Security Properties
9m:27s
Video Video
6.
Collaborative Considerations
8m:4s
Video Video
7.
Performance Considerations
10m:59s
Video Video
8.
Post-Quantum Cryptography (PQC)
9m:3s
Video Video
9.
Post-Quantum Implications
7m:56s
Video Video
10.
Checkpoint:
Quiz Quiz
16 - Troubleshooting IAM
Toggle chapter
#
Lesson
Duration
Type
1.
Troubleshooting IAM
15m:22s
Video Video
2.
Management Frameworks
7m:51s
Video Video
3.
Subject Access Control
6m:28s
Video Video
4.
User Identity Control
11m:48s
Video Video
4a.
LAB: Implementing Azure MFA
Lab Lab
5.
Secrets Management
15m:47s
Video Video
6.
Authentication and Authorization
15m:49s
Video Video
7.
Cloud IAM access and Trust Policies
7m:11s
Video Video
8.
WiFi Authentication
16m:53s
Video Video
9.
Access Control
12m:22s
Video Video
10.
Conditional Access
9m:16s
Video Video
10a.
Implementing an Azure Conditional Access Control Policy
Lab Lab
11.
Logging and Monitoring
6m:9s
Video Video
12.
Checkpoint: Troubleshooting IAM
Quiz Quiz
17 - Troubleshooting Network Infrastructure
Toggle chapter
#
Lesson
Duration
Type
1.
Troubleshooting Network Infrastructure
16m:39s
Video Video
2.
Observability
6m:4s
Video Video
3.
Network Errors
14m:58s
Video Video
4a.
LAB: Troubleshooting Network Misconfigurations
Lab Lab
4.
Network Misconfigurations
9m:1s
Video Video
5.
IPS/IDS Issues
10m:30s
Video Video
5a.
LAB: Configuring Intrusion Detection System (IDS)
Lab Lab
6.
Alert Analysis
8m:49s
Video Video
7.
DNS Security
15m:51s
Video Video
8.
Email Security
16m:11s
Video Video
9.
Network Issues
10m:1s
Video Video
10.
Cryptographic Issues
11m:34s
Video Video
11.
PKI Issues
13m:43s
Video Video
12.
Checkpoint: Troubleshooting Network Infrastructure
Quiz Quiz
18 - Cloud Security
Toggle chapter
#
Lesson
Duration
Type
1.
Cloud Security
14m:8s
Video Video
2.
Cloud Implementation
7m:37s
Video Video
3.
Cloud Management
8m:38s
Video Video
4.
Connectivity and Integration
12m:11s
Video Video
4a.
LAB: Detecting Shadow IT
Lab Lab
5.
Cloud Security Considerations
13m:40s
Video Video
6.
API Security
10m:13s
Video Video
7.
Cloud Access Security Broker (CASB)
9m:27s
Video Video
8.
Development and Deployment
11m:38s
Video Video
6a.
LAB: Implementing API Security
Lab Lab
9.
CI/CD Pipeline
8m:31s
Video Video
10.
Container Management
7m:41s
Video Video
11.
Serverless Computing
10m:23s
Video Video
12.
Checkpoint: Cloud Security
Quiz Quiz
10a.
LAB: Implementing Container Security
Lab Lab
19 - Specialized System Security
Toggle chapter
#
Lesson
Duration
Type
1.
Specialized System Security
12m:38s
Video Video
2.
Specialized Systems
10m:24s
Video Video
3.
Operational Technology (OT)
10m:38s
Video Video
4.
Characteristics of Specialized/Legacy Systems
12m:7s
Video Video
5.
Security Practices
6m:56s
Video Video
6.
Data Management
9m:42s
Video Video
7.
Compliance and Regulatory Considerations
7m:51s
Video Video
8.
Critical Services Challenges
8m:0s
Video Video
9.
Commercial and Government Challenges
10m:12s
Video Video
10.
Checkpoint:
Quiz Quiz
20 - Automated Security Operations
Toggle chapter
#
Lesson
Duration
Type
1.
Automated Security Operations
11m:11s
Video Video
2.
Vulnerability Scanning and Reporting
8m:20s
Video Video
3.
Scripting
10m:1s
Video Video
4.
Bash
8m:55s
Video Video
5.
PowerShell
10m:7s
Video Video
6.
Python
10m:29s
Video Video
7.
Cron/Scheduled Tasks
14m:16s
Video Video
8.
Workflow Automation
7m:36s
Video Video
9.
Checkpoint:
Quiz Quiz
21 - Integrated Security and Automation
Toggle chapter
#
Lesson
Duration
Type
1.
Integrated Security and Automation
14m:59s
Video Video
2.
Configuration Files
9m:16s
Video Video
3.
Automated Patching
9m:18s
Video Video
4.
Dynamic Security Controls
7m:57s
Video Video
5.
Security Orchestration, Automation, and Response (SOAR)
12m:40s
Video Video
4a.
LAB: Implementing Event-Based Triggers
Lab Lab
6.
Cloud Automation
11m:0s
Video Video
7.
Cloud APIs/Software Development Kits (SDKs)
7m:40s
Video Video
8.
Vulnerability Management
9m:10s
Video Video
9.
Security Content Automation Protocol (SCAP)
8m:4s
Video Video
8a.
LAB: Investigating and Remediating Vulnerabilities
Lab Lab
5a.
LAB: Investigating Security Orchestration, Automate, and Response (SOAR)
Lab Lab
10.
Checkpoint: Integrated Security and Automation
Quiz Quiz
22 - Artificial Intelligence
Toggle chapter
#
Lesson
Duration
Type
1.
Artificial Intelligence (AI)
15m:30s
Video Video
2.
Generative AI
9m:15s
Video Video
3.
Ethical and Governance Considerations
8m:31s
Video Video
4.
Legal and Privacy Risks
7m:44s
Video Video
5.
Threats to the Model
8m:22s
Video Video
6.
AI-enabled Attacks
9m:55s
Video Video
7.
AI Manipulation Attacks
10m:1s
Video Video
8.
AI Usage Risks
10m:49s
Video Video
9.
AI Bots
8m:38s
Video Video
10.
Checkpoint:
Quiz Quiz
23 - Vulnerabilities and Attacks
Toggle chapter
#
Lesson
Duration
Type
1.
Vulnerabilities and Attacks
15m:36s
Video Video
2.
Injection Vulnerabilities
25m:3s
Video Video
3.
Memory-related Vulnerabilities
15m:28s
Video Video
4.
Configuration Vulnerabilities
15m:25s
Video Video
5.
Authorization Vulnerabilities
9m:28s
Video Video
6.
Malicious Code Attacks
5m:35s
Video Video
7.
Hardware and Firmware Attacks
9m:3s
Video Video
8.
Memory-based Attacks
8m:30s
Video Video
9.
Electro-magnetic Attacks
5m:45s
Video Video
10.
Checkpoint:
Quiz Quiz
24 - Detection and Mitigation
Toggle chapter
#
Lesson
Duration
Type
1.
Detection and Mitigation
11m:25s
Video Video
2.
Tamper Detection and Countermeasures
7m:50s
Video Video
3.
Design Mitigations
10m:32s
Video Video
4.
Validation Mitigations
7m:36s
Video Video
5.
Safe Functions
9m:35s
Video Video
6.
Access Control Mitigations
10m:24s
Video Video
7.
Confidentiality Management
10m:54s
Video Video
8.
Update Management
11m:6s
Video Video
9.
Fail-Safe Mechanisms
5m:52s
Video Video
10.
Checkpoint:
Quiz Quiz
25 - Threat Modeling Considerations
Toggle chapter
#
Lesson
Duration
Type
1.
Threat Modeling Considerations
10m:16s
Video Video
2.
Threat Actor Motivation
13m:17s
Video Video
3.
Threat Actor Resources
6m:45s
Video Video
4.
Threat Actor Capabilities
10m:6s
Video Video
5.
Attack Patterns
10m:33s
Video Video
6.
Threat Actor Methods
8m:36s
Video Video
7.
Initial Access and Escalation Methods
14m:1s
Video Video
8.
Post-exploitation and Evasion Methods
10m:30s
Video Video
9.
Checkpoint:
Quiz Quiz
26 - Threat Modeling Frameworks
Toggle chapter
#
Lesson
Duration
Type
1.
Threat Modeling Frameworks
11m:19s
Video Video
2.
Cyber Kill Chain
8m:55s
Video Video
3.
Common Attack Pattern Enumeration and Classification (CAPEC)
6m:50s
Video Video
4.
MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK)
10m:18s
Video Video
4a.
LAB: Implementing MITRE ATT&CK Framework
Lab Lab
5.
Diamond Model of Intrusion Analysis
7m:30s
Video Video
6.
Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevtation of Privilege (STRIDE)
6m:13s
Video Video
7.
Open Web Application Security Project (OWASP)
6m:26s
Video Video
8.
Checkpoint: Threat Modeling Frameworks
Quiz Quiz
27 - Attack Surface Determination
Toggle chapter
#
Lesson
Duration
Type
1.
Attack Surface Determination
11m:52s
Video Video
2.
Technical Attack Surface
12m:37s
Video Video
3.
Operational Attack Surface
10m:23s
Video Video
4.
Organizational Attack Surface
7m:17s
Video Video
5.
Cloud Attack Surface
10m:35s
Video Video
6.
Organizational Change Attack Surface
9m:47s
Video Video
7.
Modeling with an Existing System
7m:38s
Video Video
8.
Modeling without an Existing System
8m:25s
Video Video
9.
Checkpoint:
Quiz Quiz
28 - Monitoring and Response
Toggle chapter
#
Lesson
Duration
Type
1.
Monitoring and Response
14m:49s
Video Video
2.
Aggregate Data Analysis
9m:38s
Video Video
3.
Threat Intelligence Sources
14m:41s
Video Video
4.
System Log Sources
13m:33s
Video Video
5.
Vulnerabilities and Data Security
10m:16s
Video Video
6a.
LAB: Establishing Behavior Baselines and Analytics
Lab Lab
6.
Behavior Baselines and Analytics
9m:19s
Video Video
7.
SIEM Event Management
9m:38s
Video Video
8.
SIEM Data Management
7m:36s
Video Video
9.
Alerting
13m:15s
Video Video
11.
Reporting and Metrics
7m:2s
Video Video
9a.
LAB: Logging, Auditing and Alerting
Lab Lab
10.
Alert Prioritization Factors
10m:11s
Video Video
12.
Checkpoint: Monitoring and Response
Quiz Quiz
29 - Threat-hunting
Toggle chapter
#
Lesson
Duration
Type
1.
Threat-hunting
12m:52s
Video Video
2.
Indicators of Attack
10m:21s
Video Video
3.
Behavior and Data Analysis
9m:59s
Video Video
2a.
LAB: Auditing Indicators of Attacks
Lab Lab
4.
Internal Intelligence Sources
9m:9s
Video Video
5.
Detection and Threat-hunting Enablers
9m:12s
Video Video
6.
External Intelligence Sources
11m:31s
Video Video
7.
Threat Intelligence Platforms (TIPs)
7m:27s
Video Video
8.
IoC Sharing
12m:25s
Video Video
6a.
LAB: Investigating External Intelligence Sources
Lab Lab
9.
Rule-Based Languages
9m:53s
Video Video
10.
Counterintelligence and Operational Security
9m:8s
Video Video
11.
Checkpoint: Threat-hunting
Quiz Quiz
30 - Indication Analysis
Toggle chapter
#
Lesson
Duration
Type
1.
Indication Analysis
11m:11s
Video Video
3a.
LAB: Extracting and Analyzing Metadata
Lab Lab
2.
Infrastructure Analysis
9m:46s
Video Video
3.
Metadata Analysis
11m:21s
Video Video
4.
Volatile and Non-volatile Storage Analysis
12m:25s
Video Video
5.
Reverse Engineering
11m:52s
Video Video
6a.
LAB: Investigating Indicators of Compromise (IoC)
Lab Lab
6b.
LAB: Conducting Malware Analysis
Lab Lab
6.
Malware Analysis
7m:58s
Video Video
7.
Code Stylometry
9m:16s
Video Video
9.
Checkpoint: Indication Analysis
Quiz Quiz
8a.
LAB: Enhancing Cybersecurity through Practical Analysis
Lab Lab
8.
Cloud Workload Protection Platform
7m:14s
Video Video
31 - Incident Response
Toggle chapter
#
Lesson
Duration
Type
1.
Incident Response
8m:11s
Video Video
2.
Preparedness Exercises
7m:56s
Video Video
3.
Immediate Response
9m:14s
Video Video
4.
Event Response
9m:44s
Video Video
5.
Attribution
6m:48s
Video Video
6.
Root Cause Analysis
4m:46s
Video Video
7.
Checkpoint:
Quiz Quiz
32 - Conclusion
Toggle chapter
#
Lesson
Duration
Type
1.
Conclusion
12m:56s
Video Video