SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
• Enterprise Security
• Risk Management and Incident Response
•	Research and Analysis
•	Integration of Computing, Communications and Business Disciplines
•	Technical Integration of Enterprise Components
CASP is an advanced-level certification covering enterprise security;
risk management; incident response; research and analysis;
integration of computing, communications and business disciplines;
and technical integration of enterprise components.
CASP certifies critical thinking and judgment across a broad spectrum of security disciplines and requires
candidates to implement clear solutions in complex environments. It assesses IT pros who work in advanced
technical positions.
CASP addresses the increased diversity of knowledge, skills and abilities (KSAs) required of today’s enterprise
cybersecurity pros and validates what is currently necessary to perform effectively on the job.
The current version of CASP reflects the skills needed to manage modern IT environments, including:
Closing the Gap for Advanced
Enterprise Cybersecurity Skills
with CompTIA Advanced Security Practitioner (CASP)
In this
document:
• Closing the Gap for
Advanced Enterprise
Cybersecurity Skills
with CASP
• Measuring CASP
Difficulty
• Why Hybrid Testing
Approaches Work
Best
• Mapping the NICE
Cybersecurity Work-
force Framework
of the exam
objectives require
application or
analysis of
domain
knowledge
82%
Measuring CASP Difficulty
Using Bloom’s Taxonomy as an organizing principle to discuss the difficulty level of
the exam illustrates the emphasis on the application of KSAs, rather than the simple
recall of information. Looking at the exam objectives, 82 percent require candidates to
demonstrate their knowledge at Bloom’s level 3 (apply) and level 4 (analyze).
The CASP exam is at a high taxonomy level because we carefully track job roles and skills in the IT
industry. We strive to make sure that the exams directly reflect industry standards and best practices.
The following table summarizes the percentage of certification
exam objectives that fall into each of Bloom’s level.
1
Bloom’s Level and Description
Level of
Complexity
Percentage of Objectives
(Objective Numbers)
Level 1: Remembering/Recalling Information
The candidate is able to recall, restate and remember learned information.
Basic 0%
Level 2: Understanding/Explaining Ideas or Concepts
The learner grasps the meaning of information by
interpreting and translating what has been learned.
Low 17%
Level 3: Applying Knowledge and Skills
The learner makes use of information in a new situation
from the one in which it was learned.
Moderate 30%
Level 4: Analyzing
The learner breaks learned information into parts to best understand
that information in an attempt to identify evidence for a conclusion.
High 53%
Level 5: Evaluating
The learner makes decisions based on in depth
reflection, criticism and assessment.
High 0%
Level 6: Creating
The learner creates new ideas and information
using what has been previously learned.
High 0%
CASP Executive Summary
Why Hybrid Testing Approaches Work Best
Over the past several years, cybersecurity practitioners and educators have debated as to which of the following is more
important to validate:
1. An individual’s conceptual knowledge, as validated by “linear” multiple choice items, or
2. Performance associated with a particular job or responsibility, as validated by performance-based items.
Advocates for each of these two aspects of validation often hold one of the approaches as superior over the other, with most
individuals favoring only performance-based items.
CompTIA regards this rift in opinion as a false dilemma. Both domain knowledge expertise and practical skills are absolutely vital
and should be a part of any serious competency training and validation process. Both knowledge- and performance-based
aspects are necessary for training, and nothing can substitute for hands-on learning. The same principle applies to assessment.
This is why CompTIA adopted performance-based items into its certification exams starting in 2011.
The following CompTIA exams contain roughly 10 percent performance-based items:
On average, it takes a test taker roughly one-third of the time to complete these performance-based items. Performance-based items include
simulations of technology solutions and story-based items that require advanced cognitive thinking on the part of the successful test taker.
A+ | Network+ | Security+ | Cybersecurity Analyst (CSA+) | CompTIA Advanced Security Practitioner (CASP)
2
Work Role Description Matching CompTIA CASP Objectives (Samples)
Enterprise Architect
SP-ARC-001
Develops and maintains business, systems
and information processes to support
enterprise mission needs; develops information
technology (IT) rules and requirements that
describe baseline and target architectures.
2.3 — Compare and contrast security, privacy policies
and procedures based on organizational requirements
3.2 — Analyze scenarios to secure the enterprise
5.1 — Given a scenario, integrate hosts,
storage, networks and applications into
a secure enterprise architecture
Security Architect
SP-ARC-002
Designs enterprise and systems security throughout
the development life cycle; translates technology
and environmental conditions (e.g., law and
regulation) into security designs and processes.
1.3 — Given a scenario, analyze network and security
components, concepts and architectures
4.3 — Implement security activities
across the technology life cycle
5.1 — Given a scenario, integrate hosts,
storage, networks and applications into
a secure enterprise architecture
Systems
Requirements
Planner
SP-RP-001
Consults with customers to evaluate functional
requirements and translate functional
requirements into technical solutions.
2.1 — Interpret business and industry influences
and explain associated security risks
4.1 — Given a scenario, facilitate collaboration across
diverse business units to achieve security goals
4.2 — Given a scenario, select the appropriate control to
secure communications and collaboration solutions
Research and
Development
Specialist
SP-RD-001
Conducts software and systems engineering
and software systems research in order to
develop new capabilities, ensuring cybersecurity
is fully integrated. Conducts comprehensive
technology research to evaluate potential
vulnerabilities in cyberspace systems.
3.1 — Apply research methods to determine
industry trends and impact to the enterprise
3.2 — Analyze scenarios to secure the enterprise
3.3 — Given a scenario, select methods
or tools appropriate to conduct an
assessment and analyze results
Information Systems
Security Developer
SP-SYS-001
Designs, develops, tests and evaluates
information system security throughout
the systems development life cycle.
1.1 — Given a scenario, select appropriate
cryptographic concepts and techniques
2.2 — Given a scenario, execute risk mitigation
planning, strategies and controls
4.3 — Implement security activities
across the technology life cycle
Mapping the NICE Cybersecurity Workforce Framework
CASP aligns with the following 11 work roles of the National Initiative for Cybersecurity Education
(NICE) Cybersecurity Workforce Framework (NCWF), draft NIST special publication 800-181:
This mapping is a sample of how CompTIA’s certification standards map to key elements of the NICE framework.
CASP Executive Summary
• Enterprise Architect, SP-ARC-001
• Security Architect, SP-ARC-002
• Systems Requirements Planner, SP-RP-001
• Research and Development Specialist, SP-RD-001
• Information Systems Security Developer, SP-SYS-001
• Security Control Assessor, SP-RM-002
• Cyber Defense Analyst, PR-DA-001
• Cyber Defense Incident Responder, PR-IR-001
• Vulnerability Assessment Analyst, PR-VA-001
• Warning Analyst, AN-TA-001
• Cyber Crime Investigator, IN-CI-001
3
Work Role Description Matching CompTIA CASP Objectives (Samples)
Security Control
Assessor
SP-RM-002
Conducts independent comprehensive assessments
of the management, operational and technical
security controls and control enhancements employed
within or inherited by an information technology
(IT) system to determine the overall effectiveness
of the controls (as defined in NIST SP 800-37).
1.4 — Given a scenario, select and troubleshoot
security controls for hosts
1.5 — Differentiate application vulnerabilities
and select appropriate security controls
3.3 — Given a scenario, select methods
or tools appropriate to conduct an
assessment and analyze results
Cyber Defense
Analyst PR-DA-001
Uses data collected from a variety of cyber-
defense tools (e.g., intrusion detection system (IDS)
alerts, firewalls, network traffic logs) to analyze
events that occur within their environments
for the purposes of mitigating threats.
1.3 — Given a scenario, analyze network and security
components, concepts and architectures
2.2 — Given a scenario, execute risk mitigation
planning, strategies and controls
3.2 — Analyze scenarios to secure the enterprise
Cyber Defense
Incident Responder
PR-IR-001
Investigates, analyzes and responds to cyber-incidents
within the network environment or enclave.
2.4 — Given a scenario, conduct incident
response and recovery procedures
3.1 — Apply research methods to determine
industry trends and impact to the enterprise
3.3 — Given a scenario, select methods
or tools appropriate to conduct an
assessment and analyze results
Vulnerability
Assessment
Analyst PR-VA-001
Performs assessments of systems and networks
within the network environment or enclave and
identifies where those systems/networks deviate
from acceptable configurations, enclave policy or
local policy. Measures effectiveness of defense-in-
depth architecture against known vulnerabilities.
1.3 — Given a scenario, analyze network and security
components, concepts and architectures
1.5 — Differentiate application vulnerabilities
and select appropriate security controls
3.3 — Given a scenario, select methods
or tools appropriate to conduct an
assessment and analyze results
Warning Analyst
AN-TA-001
Develops unique cyber indicators to maintain constant
awareness of the status of the highly dynamic
operating environment. Collects, processes, analyzes
and disseminates cyber-warning assessments.
1.3 — Given a scenario, analyze network and security
components, concepts and architectures
3.1 — Apply research methods to determine
industry trends and impact to the enterprise
3.2 — Analyze scenarios to secure the enterprise
3.3 — Given a scenario, select methods
or tools appropriate to conduct an
assessment and analyze results
Cyber Crime
Investigator
IN-CI-001
Identifies, collects, examines and preserves
evidence using controlled and documented
analytical and investigative techniques.
2.3 — Compare and contrast security, privacy policies
and procedures based on organizational requirements
2.4 — Given a scenario, conduct incident
response and recovery procedures
3.3 — Given a scenario, select methods
or tools appropriate to conduct an
assessment and analyze results
LEARN MORE
For government inquiries contact: GovernmentSales@CompTIA.org.
For corporate inquiries contact: Jennifer Herroon at jherroon@CompTIA.org
© 2017 CompTIA Properties, LLC, used under license by CompTIA Certifications, LLC. All rights reserved. All certification programs and
education related to such programs are operated exclusively by CompTIA Certifications, LLC. CompTIA is a registered trademark of
CompTIA Properties, LLC in the U.S. and internationally. Other brands and company names mentioned herein may be trademarks or
service marks of CompTIA Properties, LLC or of their respective owners. Reproduction or dissemination prohibited without written
consent of CompTIA Properties, LLC. Printed in the U.S. 03724-Apr2017
CASP Executive Summary
4

Más contenido relacionado

La actualidad más candente

SAFECode’s latest “Software Security Guidance for Agile Practitioners” White...
SAFECode’s latest “Software Security Guidance for Agile Practitioners”  White...SAFECode’s latest “Software Security Guidance for Agile Practitioners”  White...
SAFECode’s latest “Software Security Guidance for Agile Practitioners” White...
EMC
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
Sergey Erohin
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
Yaser Alrefai
 
Security Maturity Assessment
Security Maturity AssessmentSecurity Maturity Assessment
Security Maturity Assessment
Claude Baudoin
 
A project approach to HIPAA
A project approach to HIPAAA project approach to HIPAA
A project approach to HIPAA
Daniel P Wallace
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ Infrastructure
Priyank Hada
 

La actualidad más candente (19)

Domain 6 - Security Assessment and Testing
Domain 6 - Security Assessment and TestingDomain 6 - Security Assessment and Testing
Domain 6 - Security Assessment and Testing
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEW
 
SAFECode’s latest “Software Security Guidance for Agile Practitioners” White...
SAFECode’s latest “Software Security Guidance for Agile Practitioners”  White...SAFECode’s latest “Software Security Guidance for Agile Practitioners”  White...
SAFECode’s latest “Software Security Guidance for Agile Practitioners” White...
 
Cyber security technologist occupational brief
Cyber security technologist occupational briefCyber security technologist occupational brief
Cyber security technologist occupational brief
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
 
Security Maturity Assessment
Security Maturity AssessmentSecurity Maturity Assessment
Security Maturity Assessment
 
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGESSTATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
 
Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...
Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...
Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...
 
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
 CMGT 582 STUDY Inspiring Innovation--cmgt582study.com CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
 
A Survey of Software Reliability factor
A Survey of Software Reliability factorA Survey of Software Reliability factor
A Survey of Software Reliability factor
 
A project approach to HIPAA
A project approach to HIPAAA project approach to HIPAA
A project approach to HIPAA
 
Providing a model for selecting information security control objectives using...
Providing a model for selecting information security control objectives using...Providing a model for selecting information security control objectives using...
Providing a model for selecting information security control objectives using...
 
Chapter 07 risk_management_controlling_risk
Chapter 07 risk_management_controlling_riskChapter 07 risk_management_controlling_risk
Chapter 07 risk_management_controlling_risk
 
Security Maturity Models.
Security Maturity Models.Security Maturity Models.
Security Maturity Models.
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ Infrastructure
 
Secured cloud support for global software
Secured cloud support for global softwareSecured cloud support for global software
Secured cloud support for global software
 
Understanding the security_organization
Understanding the security_organizationUnderstanding the security_organization
Understanding the security_organization
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offering
 

Similar a Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Advanced Security Practitioner (CASP)

Project 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This cheProject 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This che
davieec5f
 
Audit Practice at CipherTechs
Audit Practice at CipherTechsAudit Practice at CipherTechs
Audit Practice at CipherTechs
Mordecai Kraushar
 

Similar a Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Advanced Security Practitioner (CASP) (20)

PPT-Security-for-Management.pptx
PPT-Security-for-Management.pptxPPT-Security-for-Management.pptx
PPT-Security-for-Management.pptx
 
Managing an enterprise cyber security program
Managing an enterprise cyber security programManaging an enterprise cyber security program
Managing an enterprise cyber security program
 
Secure Software Development Models and Methods integrated with CMMI.ppt
Secure Software Development Models and Methods integrated with CMMI.pptSecure Software Development Models and Methods integrated with CMMI.ppt
Secure Software Development Models and Methods integrated with CMMI.ppt
 
Project 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This cheProject 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This che
 
CMGT 400 Effective Communication/tutorialrank.com
 CMGT 400 Effective Communication/tutorialrank.com CMGT 400 Effective Communication/tutorialrank.com
CMGT 400 Effective Communication/tutorialrank.com
 
CompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new examCompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new exam
 
Audit Practice at CipherTechs
Audit Practice at CipherTechsAudit Practice at CipherTechs
Audit Practice at CipherTechs
 
Cissp exam-outline
Cissp exam-outlineCissp exam-outline
Cissp exam-outline
 
CMMC Breakdown
CMMC BreakdownCMMC Breakdown
CMMC Breakdown
 
Happiest Minds NIST CSF compliance Brochure
Happiest Minds NIST  CSF compliance BrochureHappiest Minds NIST  CSF compliance Brochure
Happiest Minds NIST CSF compliance Brochure
 
Process Maturity Assessment
Process Maturity AssessmentProcess Maturity Assessment
Process Maturity Assessment
 
Cmgt 582 Education Specialist -snaptutorial.com
Cmgt 582  Education Specialist -snaptutorial.comCmgt 582  Education Specialist -snaptutorial.com
Cmgt 582 Education Specialist -snaptutorial.com
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
Cmgt 400 Entire Course NEW
Cmgt 400 Entire Course NEWCmgt 400 Entire Course NEW
Cmgt 400 Entire Course NEW
 
CMGT 400 Entire Course NEW
CMGT 400 Entire Course NEWCMGT 400 Entire Course NEW
CMGT 400 Entire Course NEW
 
Se project-methodology-for-security-project-web
Se project-methodology-for-security-project-webSe project-methodology-for-security-project-web
Se project-methodology-for-security-project-web
 
Applying Lean for information security operations centre
Applying Lean for information security operations centreApplying Lean for information security operations centre
Applying Lean for information security operations centre
 
Unit Iii
Unit IiiUnit Iii
Unit Iii
 
Cmgt 582 Effective Communication / snaptutorial.com
Cmgt 582  Effective Communication / snaptutorial.comCmgt 582  Effective Communication / snaptutorial.com
Cmgt 582 Effective Communication / snaptutorial.com
 
Meeting Today’s IT Support Challenges with CompTIA A+
Meeting Today’s IT Support Challenges with CompTIA A+Meeting Today’s IT Support Challenges with CompTIA A+
Meeting Today’s IT Support Challenges with CompTIA A+
 

Más de CompTIA

Más de CompTIA (20)

CompTIA IT Employment Tracker – December 2021
CompTIA IT Employment Tracker –  December 2021CompTIA IT Employment Tracker –  December 2021
CompTIA IT Employment Tracker – December 2021
 
CompTIA IT Employment Tracker – November 2021
CompTIA IT Employment Tracker –  November 2021CompTIA IT Employment Tracker –  November 2021
CompTIA IT Employment Tracker – November 2021
 
CompTIA IT Employment Tracker – October 2021
CompTIA IT Employment Tracker –  October 2021CompTIA IT Employment Tracker –  October 2021
CompTIA IT Employment Tracker – October 2021
 
CompTIA IT Employment Tracker – September 2021
CompTIA IT Employment Tracker –  September 2021CompTIA IT Employment Tracker –  September 2021
CompTIA IT Employment Tracker – September 2021
 
CompTIA IT Employment Tracker – July 2021
CompTIA IT Employment Tracker –  July 2021CompTIA IT Employment Tracker –  July 2021
CompTIA IT Employment Tracker – July 2021
 
CompTIA IT Employment Tracker – June 2021
CompTIA IT Employment Tracker –  June 2021CompTIA IT Employment Tracker –  June 2021
CompTIA IT Employment Tracker – June 2021
 
Trends in Automation 2021
Trends in Automation 2021Trends in Automation 2021
Trends in Automation 2021
 
CompTIA IT Employment Tracker – May 2021
CompTIA IT Employment Tracker –  May 2021CompTIA IT Employment Tracker –  May 2021
CompTIA IT Employment Tracker – May 2021
 
CompTIA IT Employment Tracker – April 2021
CompTIA IT Employment Tracker –  April 2021CompTIA IT Employment Tracker –  April 2021
CompTIA IT Employment Tracker – April 2021
 
IT Operations and Emerging Technology
IT Operations and Emerging TechnologyIT Operations and Emerging Technology
IT Operations and Emerging Technology
 
CompTIA IT Employment Tracker – March 2021
CompTIA IT Employment Tracker – March 2021CompTIA IT Employment Tracker – March 2021
CompTIA IT Employment Tracker – March 2021
 
Help Desk Trends
Help Desk TrendsHelp Desk Trends
Help Desk Trends
 
CompTIA IT Employment Tracker – February 2021
CompTIA IT Employment Tracker –  February 2021CompTIA IT Employment Tracker –  February 2021
CompTIA IT Employment Tracker – February 2021
 
CompTIA 2021 IT Industry Outlook
CompTIA 2021 IT Industry OutlookCompTIA 2021 IT Industry Outlook
CompTIA 2021 IT Industry Outlook
 
CompTIA IT Employment Tracker - January 2021
CompTIA IT Employment Tracker - January 2021CompTIA IT Employment Tracker - January 2021
CompTIA IT Employment Tracker - January 2021
 
CompTIA IT Employment Tracker – November 2020
CompTIA IT Employment Tracker –  November 2020CompTIA IT Employment Tracker –  November 2020
CompTIA IT Employment Tracker – November 2020
 
CompTIA IT Employment Tracker – October 2020
CompTIA IT Employment Tracker – October 2020CompTIA IT Employment Tracker – October 2020
CompTIA IT Employment Tracker – October 2020
 
CompTIA IT Employment Tracker – September 2020
CompTIA IT Employment Tracker –  September 2020CompTIA IT Employment Tracker –  September 2020
CompTIA IT Employment Tracker – September 2020
 
CompTIA IT Employment Tracker – August 2020
CompTIA IT Employment Tracker –  August 2020CompTIA IT Employment Tracker –  August 2020
CompTIA IT Employment Tracker – August 2020
 
CompTIA IT Employment Tracker – July 2020
CompTIA IT Employment Tracker –  July 2020CompTIA IT Employment Tracker –  July 2020
CompTIA IT Employment Tracker – July 2020
 

Último

Call Girls Bommanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Bommanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service ...Call Girls Bommanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Bommanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
amitlee9823
 
Call Girls Bidadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Bidadi Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Bidadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Bidadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 
➥🔝 7737669865 🔝▻ Nandyal Call-girls in Women Seeking Men 🔝Nandyal🔝 Escorts...
➥🔝 7737669865 🔝▻ Nandyal Call-girls in Women Seeking Men  🔝Nandyal🔝   Escorts...➥🔝 7737669865 🔝▻ Nandyal Call-girls in Women Seeking Men  🔝Nandyal🔝   Escorts...
➥🔝 7737669865 🔝▻ Nandyal Call-girls in Women Seeking Men 🔝Nandyal🔝 Escorts...
amitlee9823
 
Call Girls In Sarjapur Road ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Sarjapur Road ☎ 7737669865 🥵 Book Your One night StandCall Girls In Sarjapur Road ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Sarjapur Road ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
➥🔝 7737669865 🔝▻ Tirupati Call-girls in Women Seeking Men 🔝Tirupati🔝 Escor...
➥🔝 7737669865 🔝▻ Tirupati Call-girls in Women Seeking Men  🔝Tirupati🔝   Escor...➥🔝 7737669865 🔝▻ Tirupati Call-girls in Women Seeking Men  🔝Tirupati🔝   Escor...
➥🔝 7737669865 🔝▻ Tirupati Call-girls in Women Seeking Men 🔝Tirupati🔝 Escor...
amitlee9823
 
Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)
amitlee9823
 
Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...
Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...
Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...
Pooja Nehwal
 
➥🔝 7737669865 🔝▻ Mirzapur Call-girls in Women Seeking Men 🔝Mirzapur🔝 Escor...
➥🔝 7737669865 🔝▻ Mirzapur Call-girls in Women Seeking Men  🔝Mirzapur🔝   Escor...➥🔝 7737669865 🔝▻ Mirzapur Call-girls in Women Seeking Men  🔝Mirzapur🔝   Escor...
➥🔝 7737669865 🔝▻ Mirzapur Call-girls in Women Seeking Men 🔝Mirzapur🔝 Escor...
amitlee9823
 
Nagavara Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...
Nagavara Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...Nagavara Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...
Nagavara Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...
amitlee9823
 
Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...
Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...
Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...
poojakaurpk09
 
➥🔝 7737669865 🔝▻ Pallavaram Call-girls in Women Seeking Men 🔝Pallavaram🔝 E...
➥🔝 7737669865 🔝▻ Pallavaram Call-girls in Women Seeking Men  🔝Pallavaram🔝   E...➥🔝 7737669865 🔝▻ Pallavaram Call-girls in Women Seeking Men  🔝Pallavaram🔝   E...
➥🔝 7737669865 🔝▻ Pallavaram Call-girls in Women Seeking Men 🔝Pallavaram🔝 E...
amitlee9823
 
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdf
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdfreStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdf
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdf
Ken Fuller
 

Último (20)

Call Girls Bommanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Bommanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service ...Call Girls Bommanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Bommanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
 
Call Girls Bidadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Bidadi Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Bidadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Bidadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
➥🔝 7737669865 🔝▻ Nandyal Call-girls in Women Seeking Men 🔝Nandyal🔝 Escorts...
➥🔝 7737669865 🔝▻ Nandyal Call-girls in Women Seeking Men  🔝Nandyal🔝   Escorts...➥🔝 7737669865 🔝▻ Nandyal Call-girls in Women Seeking Men  🔝Nandyal🔝   Escorts...
➥🔝 7737669865 🔝▻ Nandyal Call-girls in Women Seeking Men 🔝Nandyal🔝 Escorts...
 
Personal Brand Exploration ppt.- Ronnie Jones
Personal Brand  Exploration ppt.- Ronnie JonesPersonal Brand  Exploration ppt.- Ronnie Jones
Personal Brand Exploration ppt.- Ronnie Jones
 
Call Girls In Sarjapur Road ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Sarjapur Road ☎ 7737669865 🥵 Book Your One night StandCall Girls In Sarjapur Road ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Sarjapur Road ☎ 7737669865 🥵 Book Your One night Stand
 
Miletti Gabriela_Vision Plan for artist Jahzel.pdf
Miletti Gabriela_Vision Plan for artist Jahzel.pdfMiletti Gabriela_Vision Plan for artist Jahzel.pdf
Miletti Gabriela_Vision Plan for artist Jahzel.pdf
 
➥🔝 7737669865 🔝▻ Tirupati Call-girls in Women Seeking Men 🔝Tirupati🔝 Escor...
➥🔝 7737669865 🔝▻ Tirupati Call-girls in Women Seeking Men  🔝Tirupati🔝   Escor...➥🔝 7737669865 🔝▻ Tirupati Call-girls in Women Seeking Men  🔝Tirupati🔝   Escor...
➥🔝 7737669865 🔝▻ Tirupati Call-girls in Women Seeking Men 🔝Tirupati🔝 Escor...
 
Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)
 
Toxicokinetics studies.. (toxicokinetics evaluation in preclinical studies)
Toxicokinetics studies.. (toxicokinetics evaluation in preclinical studies)Toxicokinetics studies.. (toxicokinetics evaluation in preclinical studies)
Toxicokinetics studies.. (toxicokinetics evaluation in preclinical studies)
 
Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...
Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...
Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...
 
➥🔝 7737669865 🔝▻ Mirzapur Call-girls in Women Seeking Men 🔝Mirzapur🔝 Escor...
➥🔝 7737669865 🔝▻ Mirzapur Call-girls in Women Seeking Men  🔝Mirzapur🔝   Escor...➥🔝 7737669865 🔝▻ Mirzapur Call-girls in Women Seeking Men  🔝Mirzapur🔝   Escor...
➥🔝 7737669865 🔝▻ Mirzapur Call-girls in Women Seeking Men 🔝Mirzapur🔝 Escor...
 
Nagavara Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...
Nagavara Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...Nagavara Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...
Nagavara Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...
 
Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...
Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...
Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...
 
Call Girls Alandi Road Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Alandi Road Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Alandi Road Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Alandi Road Call Me 7737669865 Budget Friendly No Advance Booking
 
➥🔝 7737669865 🔝▻ Pallavaram Call-girls in Women Seeking Men 🔝Pallavaram🔝 E...
➥🔝 7737669865 🔝▻ Pallavaram Call-girls in Women Seeking Men  🔝Pallavaram🔝   E...➥🔝 7737669865 🔝▻ Pallavaram Call-girls in Women Seeking Men  🔝Pallavaram🔝   E...
➥🔝 7737669865 🔝▻ Pallavaram Call-girls in Women Seeking Men 🔝Pallavaram🔝 E...
 
Presentation for the country presentation
Presentation for the country presentationPresentation for the country presentation
Presentation for the country presentation
 
Solution Manual for First Course in Abstract Algebra A, 8th Edition by John B...
Solution Manual for First Course in Abstract Algebra A, 8th Edition by John B...Solution Manual for First Course in Abstract Algebra A, 8th Edition by John B...
Solution Manual for First Course in Abstract Algebra A, 8th Edition by John B...
 
Résumé (2 pager - 12 ft standard syntax)
Résumé (2 pager -  12 ft standard syntax)Résumé (2 pager -  12 ft standard syntax)
Résumé (2 pager - 12 ft standard syntax)
 
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdf
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdfreStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdf
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdf
 
Booking open Available Pune Call Girls Ambegaon Khurd 6297143586 Call Hot In...
Booking open Available Pune Call Girls Ambegaon Khurd  6297143586 Call Hot In...Booking open Available Pune Call Girls Ambegaon Khurd  6297143586 Call Hot In...
Booking open Available Pune Call Girls Ambegaon Khurd 6297143586 Call Hot In...
 

Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Advanced Security Practitioner (CASP)

  • 1. • Enterprise Security • Risk Management and Incident Response • Research and Analysis • Integration of Computing, Communications and Business Disciplines • Technical Integration of Enterprise Components CASP is an advanced-level certification covering enterprise security; risk management; incident response; research and analysis; integration of computing, communications and business disciplines; and technical integration of enterprise components. CASP certifies critical thinking and judgment across a broad spectrum of security disciplines and requires candidates to implement clear solutions in complex environments. It assesses IT pros who work in advanced technical positions. CASP addresses the increased diversity of knowledge, skills and abilities (KSAs) required of today’s enterprise cybersecurity pros and validates what is currently necessary to perform effectively on the job. The current version of CASP reflects the skills needed to manage modern IT environments, including: Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Advanced Security Practitioner (CASP) In this document: • Closing the Gap for Advanced Enterprise Cybersecurity Skills with CASP • Measuring CASP Difficulty • Why Hybrid Testing Approaches Work Best • Mapping the NICE Cybersecurity Work- force Framework of the exam objectives require application or analysis of domain knowledge 82% Measuring CASP Difficulty Using Bloom’s Taxonomy as an organizing principle to discuss the difficulty level of the exam illustrates the emphasis on the application of KSAs, rather than the simple recall of information. Looking at the exam objectives, 82 percent require candidates to demonstrate their knowledge at Bloom’s level 3 (apply) and level 4 (analyze). The CASP exam is at a high taxonomy level because we carefully track job roles and skills in the IT industry. We strive to make sure that the exams directly reflect industry standards and best practices. The following table summarizes the percentage of certification exam objectives that fall into each of Bloom’s level. 1
  • 2. Bloom’s Level and Description Level of Complexity Percentage of Objectives (Objective Numbers) Level 1: Remembering/Recalling Information The candidate is able to recall, restate and remember learned information. Basic 0% Level 2: Understanding/Explaining Ideas or Concepts The learner grasps the meaning of information by interpreting and translating what has been learned. Low 17% Level 3: Applying Knowledge and Skills The learner makes use of information in a new situation from the one in which it was learned. Moderate 30% Level 4: Analyzing The learner breaks learned information into parts to best understand that information in an attempt to identify evidence for a conclusion. High 53% Level 5: Evaluating The learner makes decisions based on in depth reflection, criticism and assessment. High 0% Level 6: Creating The learner creates new ideas and information using what has been previously learned. High 0% CASP Executive Summary Why Hybrid Testing Approaches Work Best Over the past several years, cybersecurity practitioners and educators have debated as to which of the following is more important to validate: 1. An individual’s conceptual knowledge, as validated by “linear” multiple choice items, or 2. Performance associated with a particular job or responsibility, as validated by performance-based items. Advocates for each of these two aspects of validation often hold one of the approaches as superior over the other, with most individuals favoring only performance-based items. CompTIA regards this rift in opinion as a false dilemma. Both domain knowledge expertise and practical skills are absolutely vital and should be a part of any serious competency training and validation process. Both knowledge- and performance-based aspects are necessary for training, and nothing can substitute for hands-on learning. The same principle applies to assessment. This is why CompTIA adopted performance-based items into its certification exams starting in 2011. The following CompTIA exams contain roughly 10 percent performance-based items: On average, it takes a test taker roughly one-third of the time to complete these performance-based items. Performance-based items include simulations of technology solutions and story-based items that require advanced cognitive thinking on the part of the successful test taker. A+ | Network+ | Security+ | Cybersecurity Analyst (CSA+) | CompTIA Advanced Security Practitioner (CASP) 2
  • 3. Work Role Description Matching CompTIA CASP Objectives (Samples) Enterprise Architect SP-ARC-001 Develops and maintains business, systems and information processes to support enterprise mission needs; develops information technology (IT) rules and requirements that describe baseline and target architectures. 2.3 — Compare and contrast security, privacy policies and procedures based on organizational requirements 3.2 — Analyze scenarios to secure the enterprise 5.1 — Given a scenario, integrate hosts, storage, networks and applications into a secure enterprise architecture Security Architect SP-ARC-002 Designs enterprise and systems security throughout the development life cycle; translates technology and environmental conditions (e.g., law and regulation) into security designs and processes. 1.3 — Given a scenario, analyze network and security components, concepts and architectures 4.3 — Implement security activities across the technology life cycle 5.1 — Given a scenario, integrate hosts, storage, networks and applications into a secure enterprise architecture Systems Requirements Planner SP-RP-001 Consults with customers to evaluate functional requirements and translate functional requirements into technical solutions. 2.1 — Interpret business and industry influences and explain associated security risks 4.1 — Given a scenario, facilitate collaboration across diverse business units to achieve security goals 4.2 — Given a scenario, select the appropriate control to secure communications and collaboration solutions Research and Development Specialist SP-RD-001 Conducts software and systems engineering and software systems research in order to develop new capabilities, ensuring cybersecurity is fully integrated. Conducts comprehensive technology research to evaluate potential vulnerabilities in cyberspace systems. 3.1 — Apply research methods to determine industry trends and impact to the enterprise 3.2 — Analyze scenarios to secure the enterprise 3.3 — Given a scenario, select methods or tools appropriate to conduct an assessment and analyze results Information Systems Security Developer SP-SYS-001 Designs, develops, tests and evaluates information system security throughout the systems development life cycle. 1.1 — Given a scenario, select appropriate cryptographic concepts and techniques 2.2 — Given a scenario, execute risk mitigation planning, strategies and controls 4.3 — Implement security activities across the technology life cycle Mapping the NICE Cybersecurity Workforce Framework CASP aligns with the following 11 work roles of the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (NCWF), draft NIST special publication 800-181: This mapping is a sample of how CompTIA’s certification standards map to key elements of the NICE framework. CASP Executive Summary • Enterprise Architect, SP-ARC-001 • Security Architect, SP-ARC-002 • Systems Requirements Planner, SP-RP-001 • Research and Development Specialist, SP-RD-001 • Information Systems Security Developer, SP-SYS-001 • Security Control Assessor, SP-RM-002 • Cyber Defense Analyst, PR-DA-001 • Cyber Defense Incident Responder, PR-IR-001 • Vulnerability Assessment Analyst, PR-VA-001 • Warning Analyst, AN-TA-001 • Cyber Crime Investigator, IN-CI-001 3
  • 4. Work Role Description Matching CompTIA CASP Objectives (Samples) Security Control Assessor SP-RM-002 Conducts independent comprehensive assessments of the management, operational and technical security controls and control enhancements employed within or inherited by an information technology (IT) system to determine the overall effectiveness of the controls (as defined in NIST SP 800-37). 1.4 — Given a scenario, select and troubleshoot security controls for hosts 1.5 — Differentiate application vulnerabilities and select appropriate security controls 3.3 — Given a scenario, select methods or tools appropriate to conduct an assessment and analyze results Cyber Defense Analyst PR-DA-001 Uses data collected from a variety of cyber- defense tools (e.g., intrusion detection system (IDS) alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats. 1.3 — Given a scenario, analyze network and security components, concepts and architectures 2.2 — Given a scenario, execute risk mitigation planning, strategies and controls 3.2 — Analyze scenarios to secure the enterprise Cyber Defense Incident Responder PR-IR-001 Investigates, analyzes and responds to cyber-incidents within the network environment or enclave. 2.4 — Given a scenario, conduct incident response and recovery procedures 3.1 — Apply research methods to determine industry trends and impact to the enterprise 3.3 — Given a scenario, select methods or tools appropriate to conduct an assessment and analyze results Vulnerability Assessment Analyst PR-VA-001 Performs assessments of systems and networks within the network environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy or local policy. Measures effectiveness of defense-in- depth architecture against known vulnerabilities. 1.3 — Given a scenario, analyze network and security components, concepts and architectures 1.5 — Differentiate application vulnerabilities and select appropriate security controls 3.3 — Given a scenario, select methods or tools appropriate to conduct an assessment and analyze results Warning Analyst AN-TA-001 Develops unique cyber indicators to maintain constant awareness of the status of the highly dynamic operating environment. Collects, processes, analyzes and disseminates cyber-warning assessments. 1.3 — Given a scenario, analyze network and security components, concepts and architectures 3.1 — Apply research methods to determine industry trends and impact to the enterprise 3.2 — Analyze scenarios to secure the enterprise 3.3 — Given a scenario, select methods or tools appropriate to conduct an assessment and analyze results Cyber Crime Investigator IN-CI-001 Identifies, collects, examines and preserves evidence using controlled and documented analytical and investigative techniques. 2.3 — Compare and contrast security, privacy policies and procedures based on organizational requirements 2.4 — Given a scenario, conduct incident response and recovery procedures 3.3 — Given a scenario, select methods or tools appropriate to conduct an assessment and analyze results LEARN MORE For government inquiries contact: GovernmentSales@CompTIA.org. For corporate inquiries contact: Jennifer Herroon at jherroon@CompTIA.org © 2017 CompTIA Properties, LLC, used under license by CompTIA Certifications, LLC. All rights reserved. All certification programs and education related to such programs are operated exclusively by CompTIA Certifications, LLC. CompTIA is a registered trademark of CompTIA Properties, LLC in the U.S. and internationally. Other brands and company names mentioned herein may be trademarks or service marks of CompTIA Properties, LLC or of their respective owners. Reproduction or dissemination prohibited without written consent of CompTIA Properties, LLC. Printed in the U.S. 03724-Apr2017 CASP Executive Summary 4