CASP+: overview of domains [2019 update]


Whether you are an IT security professional or a security analyst who wants to advance their career in cybersecurity, the CompTIA Advanced Security Practitioner (CASP+) certification provides a way to work in one of the fastest-growing fields in the U.S. The master-level CASP+ sets the benchmark for what a cybersecurity analyst needs to know and can validate a professional’s advanced IT security behavioral analytics skills, which can clearly be of great value to an employer looking to hire the right resource.

With today’s talent shortage, professionals who are CASP+-certified can benefit from competitive salaries throughout their career. Those who are interested in this credential, however, will need to prepare themselves for a certification exam that has been recently updated.

About the CASP+ credential

The CASP+ is a perfect certification for any IT security practitioners and ideal for professionals who still want to keep immersed in all technical aspects of their profession despite reaching a senior level. The CASP exam is internationally regarded as a validation of advanced-level security skills and practical knowledge and will certify that the successful candidate has the abilities “to conceptualize, engineer, integrate and implement secure solutions across complex environments to support a resilient enterprise,” according to CompTIA.

This vendor-neutral credential, then, is aimed at pros who have the essential skill sets acquired through hands-on experience and working knowledge tied to implementing solutions with analytics tools. Credential holders will need to be familiar with analyzing risk impact and responding to security events, within cybersecurity policies and frameworks.

Accredited by ANSI and compliant with the ISO 17024 standard, the credential also meets the requirements for DoD directive 8140/8570.01-M; in fact, it is listed as possible choices for IAT Level III, IAM Level II, as well as IASAE I and II. To maintain its status, the (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Daniel Brecht. Read the original post at: