CompTIA SecurityX

Prepare for the CompTIA SecurityX (CAS-005) exam with hands-on labs, real enterprise scenarios, and advanced security training. Learn to design secure architectures, manage risk, and respond to threats in complex environments

(SECURITY-005.AE1) / ISBN : 979-8-90059-004-2
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

About This Course

This CompTIA SecurityX (CAS-005) course gives you a clear path to master advanced cybersecurity skills. You work on real enterprise scenarios, design secure systems, and practice threat detection and response. With hands-on labs, interactive lessons, and exam-focused practice, you stay focused on certification and real-world application. Build skills required for senior security roles and complex environments.

Skills You’ll Get

  •  Design secure enterprise architectures
  •  Apply governance, risk, and compliance strategies
  •  Implement identity and access management (IAM)
  •  Detect and respond to advanced security threats
  •  Secure cloud, hybrid, and on-prem environments
  •  Use cryptography in real-world scenarios
  •  Perform threat intelligence and incident response

1

Introduction

  • Before You Begin the CompTIA SecurityX Certification Exam
  • Who Should Read This Course
  • What You Will Learn
  • How to Use This Course
  • Tips for Taking the SecurityX Exam
  • CompTIA SecurityX Study Guide Exam Objectives
  • The SecurityX Exam Objective Map
2

Security Governance

  • Security Program Management and Documentation
  • Governance Frameworks
  • Change and Configuration Management
  • Summary
3

Risk Management and Compliance

  • Risk Assessment and Management
  • Risk Considerations
  • Privacy Regulations
  • Cross-Jurisdictional Compliance Requirements
  • Summary
4

Security Frameworks and Regulations

  • Industry Information Security Standards
  • Security and Reporting Frameworks
  • Summary
5

Threat Actors and Security Challenges

  • Types of Threat Actors
  • Threat Actor Characteristics
  • Attack Frameworks and Models
  • Attack Surface Determination
  • Security Challenges with Artificial Intelligence
  • Summary
6

Security Architecture

  • Resilient System Design
  • Software and Hardware Assurance Methods
  • Continuous Integration/Continuous Delivery (CI/CD) Pipelines
  • Secure Architecture Design
  • Summary
7

Access Controls and Identity Management

  • Access Control Technologies
  • Access Control Models
  • Public Key Infrastructure (PKI)
  • Secure Cloud Identity and Access Capabilities
  • Zero Trust in Secure Architecture
  • Subject Access Control
  • Secrets Management
  • Conditional Access
  • IAM Components
  • Summary
8

Enterprise Security Engineering

  • Endpoint and Server Security
  • Network Infrastructure Security Issues
  • Domain Name Security
  • Email Security
  • Hardware Security Techniques
  • Securing Legacy Systems
  • Summary
9

Security Operations and Monitoring

  • Security Automation
  • Security Content Automation Protocol (SCAP)
  • Summary
10

Cryptography in Practice

  • Advanced Cryptographic Concepts
  • Cryptographic Use Cases
  • Cryptographic Techniques
  • Summary
11

Incident Response and Threat Intelligence

  • Security Information and Event Management (SIEM)
  • Data Aggregation & Baselines
  • Alerting, Reporting, and Metrics
  • Attacks and Vulnerabilities
  • Mitigation Techniques
  • Threat Hunting 
  • Threat Intelligence Sources
  • Malware Analysis
  • Artifact Analysis
  • Summary

1

Security Governance

  • Using an Anti-Phishing Tool
2

Threat Actors and Security Challenges

  • Examining MITRE ATT&CK
  • Using the Social Engineering Toolkit
  • Understanding Prompt Injection
3

Security Architecture

  • Cracking Passwords Using Cain and Abel
  • Configuring a VPN
  • Cracking Linux Passwords Using John the Ripper
  • Configuring a Standard ACL
  • Configuring a Linux Firewall Using iptables
  • Tracking Vulnerabilities in Software
  • Performing Nmap Port Scanning
  • Conducting Vulnerability Scanning Using Nessus
  • Configuring a Windows Firewall
4

Access Controls and Identity Management

  • Examining PKI Certificates
  • Creating Linux Users and Groups
  • Creating a Windows Domain User
  • Examining Kerberos Settings
  • Implementing MFA on Mobile Devices
5

Enterprise Security Engineering

  • Simulating a DoS Attack
  • Attempting a Zone Transfer
  • Performing Vulnerability Scanning Using OpenVAS
  • Bypassing Command Shell Restrictions
  • Securing a Wi-Fi Hotspot
6

Cryptography in Practice

  • Creating Asymmetric Key Pairs
  • Performing Symmetric Encryption
  • Observing an MD5-Generated Hash Value
  • Using the SHA Series Algorithm
  • Creating File Hashes
7

Incident Response and Threat Intelligence

  • Viewing Linux Event Logs
  • Attacking a Website Using XSS Injection
  • Conducting a CSRF Attack
  • Exploiting a TOCTOU Vulnerability
  • Exploiting an Overflow Vulnerability
  • Exploiting a Website Using SQL Injection
  • Using WinDump
  • Viewing Windows Event Logs
  • Performing Passive Reconnaissance
  • Using Maltego to Gather Information
  • Configuring Networks with PuTTY

Any questions?
Check out the FAQs

  Want to Learn More?

Contact Us Now

CompTIA SecurityX is an advanced cybersecurity certification focused on designing and implementing secure solutions in enterprise environments.

This course is for experienced cybersecurity professionals who want to move into senior roles like security architect or lead engineer.

SecurityX is the official new name for CASP+. The CAS-005 exam objectives are an updated version of the previous exam, with an increased emphasis on governance, risk & compliance, and security engineering.

The course aligns with official exam objectives and includes labs, practice questions, and real-world scenarios to build both knowledge and application skills.

While both SecurityX & CISSP are advanced, they have different focuses. The CompTIA SecurityX certification focuses on hands-on, technical skills for implementing security solutions. Meanwhile, CISSP is way more focused on the managerial & strategic aspects of the organization’s security program.

However, the CompTIA SecurityX exam cost is way lower than the CISSP, and it also does not have the same strict experience requirements for sitting in the exam. 

No. This is an advanced-level course. It is best suited for professionals with prior cybersecurity experience.

Related Courses

All Courses
scroll to top