This course is in active development. Preview the scope below and create a free account to be notified the moment it goes live.
SecurityX
The CompTIA SecurityX (CAS-005) course delivers expert-level instruction in security architecture, engineering, cryptography, governance, risk, compliance, and operations, equipping senior architects and engineers to design resilient enterprise defenses.
Who Should Take This
Senior security architects and engineers with ten or more years of IT experience, including at least five years leading enterprise-wide security design, implementation, and management, benefit most. They seek to deepen mastery of advanced architecture, cryptographic controls, governance frameworks, and operational resilience to protect complex, multi‑technology environments.
What's Included in AccelaStudy® AI
Course Outline
66 learning goals
1
Domain 1: Security Architecture
5 topics
Zero trust and network architecture
- Implement zero trust architecture components including policy decision points, policy enforcement points, continuous authentication, and device trust evaluation across enterprise environments.
- Deploy software-defined perimeter, SASE, and SSE architectures to replace VPN-based remote access with identity-aware, context-driven access control for distributed workforces.
- Configure network micro-segmentation using SDN, host-based firewalls, service mesh policies, and identity-based access to enforce least privilege workload communication.
- Evaluate zero trust maturity by assessing identity verification coverage, device trust enforcement, segmentation granularity, and data access control effectiveness.
- Architect an enterprise zero trust migration strategy including phased implementation, legacy accommodation, identity prerequisites, and success metrics per maturity stage.
Cloud security architecture
- Implement multi-cloud security architectures with cloud-native controls, CSPM, CWPP, and CNAPP platforms across AWS, Azure, and GCP with unified policy enforcement.
- Configure cloud workload protection including RASP, cloud-native firewalls, container network policies, and serverless function security across heterogeneous deployments.
- Analyze cloud security posture across multi-cloud environments to identify misconfiguration risks, IAM over-permissioning, network exposure, and data residency violations.
- Design a multi-cloud security strategy normalizing controls across providers with consistent identity, encryption standards, and compliance requirements.
IoT, OT, and embedded systems security
- Implement IoT and OT security controls including network segmentation, protocol-aware firewalls, device identity management, firmware integrity verification, and secure boot chains.
- Assess SCADA/ICS security by evaluating Purdue Model segmentation, protocol vulnerabilities in Modbus and OPC UA, safety system integrity, and IT/OT convergence risks.
- Architect IoT/OT security programs balancing operational safety with cybersecurity, incorporating device lifecycle management and convergence governance frameworks.
Secure SDLC and application architecture
- Implement secure SDLC practices including threat modeling, security requirements, secure code review, SAST/DAST/IAST pipeline integration, and CI/CD security gates.
- Evaluate application security patterns including API gateway security, OAuth 2.0/OIDC flows, service mesh mTLS, secrets management, and supply chain integrity verification.
- Design enterprise application security programs integrating DevSecOps, security champion networks, vulnerability management SLAs, and secure development maturity measurement.
Data protection architecture
- Implement enterprise data protection architectures including classification-driven encryption, DLP policy frameworks, tokenization services, and rights management across hybrid environments.
- Assess data protection effectiveness by evaluating classification accuracy, DLP false positive rates, encryption coverage completeness, and data residency compliance gaps.
- Design enterprise data governance strategies that align classification schemas, retention policies, and protection controls with regulatory requirements and business data flows.
2
Domain 2: Security Engineering and Cryptography
4 topics
Advanced cryptographic implementations
- Implement enterprise PKI architectures including multi-tier CA hierarchies, certificate lifecycle management, automated enrollment via SCEP/EST/ACME, and cross-certification trust.
- Deploy HSMs for key management, code signing, TLS offloading, and cryptographic operations with FIPS 140-2/3 compliance and multi-party key ceremony procedures.
- Evaluate cryptographic implementations for weaknesses including deprecated algorithms, insufficient key lengths, improper nonce handling, timing side channels, and validation failures.
- Plan cryptographic migration strategies including quantum-resistant algorithm adoption, crypto-agility architecture, and hybrid classical/post-quantum transitional deployments.
Secure protocols and communications
- Configure secure protocols including TLS 1.3, IPsec IKEv2, WireGuard, DNSSEC, and MTA-STS with cipher suite selection and certificate management for enterprise use.
- Implement API security controls including OAuth 2.0 with PKCE, API key management, rate limiting, request signing, and mutual TLS for microservice architectures.
- Analyze protocol configurations to identify cipher suite weaknesses, certificate chain issues, downgrade vulnerabilities, and non-compliant implementations across the enterprise.
- Design enterprise-wide protocol standardization strategies that deprecate insecure protocols, enforce minimum cipher suites, and establish monitoring for compliance drift.
Container, orchestration, and serverless security
- Implement container security controls including image scanning, runtime protection, namespace isolation, seccomp profiles, and AppArmor/SELinux policies.
- Configure Kubernetes security including RBAC, pod security standards, network policies, secrets management, admission controllers, and supply chain verification.
- Assess container orchestration security by evaluating cluster hardening, workload isolation, secrets exposure, and CIS Kubernetes benchmark compliance.
- Design enterprise container security strategies encompassing image provenance, runtime monitoring, orchestration hardening, serverless security, and secure CI/CD integration.
Identity federation and advanced IAM
- Implement enterprise identity federation using SAML 2.0, OpenID Connect, and SCIM provisioning across multi-cloud and hybrid environments with centralized governance.
- Deploy PAM solutions including just-in-time access, session recording, credential vaulting, break-glass procedures, and privileged access workstations.
- Evaluate enterprise identity architecture for federation trust misconfigurations, token replay vulnerabilities, orphaned accounts, privilege accumulation, and MFA bypass risks.
- Design enterprise identity lifecycle strategies including automated provisioning, entitlement review cadences, identity analytics, and identity-first security perimeter models.
3
Domain 3: Governance, Risk, and Compliance
4 topics
Risk frameworks and quantification
- Apply enterprise risk management frameworks including NIST RMF, ISO 27005, FAIR, and OCTAVE to establish consistent risk assessment methodologies.
- Perform quantitative risk analysis using FAIR methodology to calculate loss event frequency, loss magnitude, and risk reduction ROI for security investments.
- Assess organizational risk posture by evaluating risk register completeness, treatment effectiveness, residual risk acceptability, and risk appetite alignment.
- Formulate enterprise risk strategies aligning security investments with business objectives, defining tolerance thresholds, and establishing governance committee structures.
Regulatory compliance and privacy
- Implement multi-framework compliance programs spanning GDPR, HIPAA, PCI-DSS, SOX, and CCPA/CPRA with unified control mapping and evidence management.
- Deploy privacy-by-design controls including data minimization, consent management, DSAR workflows, and cross-border transfer mechanisms such as SCCs and BCRs.
- Evaluate compliance gaps across jurisdictions by analyzing regulatory overlap, conflicting requirements, data sovereignty constraints, and emerging privacy legislation impact.
- Design global compliance architectures harmonizing controls across regulatory frameworks, automating evidence collection, and adapting to evolving regulations across jurisdictions.
Business impact and supply chain risk
- Perform business impact analysis including critical process identification, maximum tolerable downtime, RTO/RPO/MTPD calculations, and dependency mapping.
- Implement vendor and supply chain risk management including third-party assessments, continuous monitoring, contract security requirements, and software integrity verification.
- Assess supply chain risk by evaluating vendor security posture, fourth-party dependencies, concentration risk, geopolitical factors, and SBOM completeness.
- Recommend supply chain resilience strategies including vendor diversification, contractual security baselines, provenance verification, and incident coordination.
Security governance and metrics
- Implement security governance structures including CISO reporting lines, steering committees, policy lifecycle management, and awareness program governance.
- Determine appropriate security metrics by evaluating which measurements drive decisions, align with business objectives, and demonstrate program effectiveness.
- Design enterprise governance frameworks integrating NIST CSF, ISO 27001, and COBIT with organizational decision structures, budget processes, and improvement cycles.
4
Domain 4: Security Operations
5 topics
Advanced threat analysis and detection
- Implement advanced threat detection including UEBA, NDR, deception technologies, and AI/ML-based anomaly detection platforms for enterprise environments.
- Perform APT analysis by correlating multi-source intelligence, identifying living-off-the-land techniques, mapping adversary infrastructure, and attributing threat groups.
- Investigate advanced techniques including fileless malware, supply chain compromises, firmware implants, covert C2 channels, and anti-forensic methods.
- Architect enterprise detection strategies combining multiple layers, intelligence-driven hunting, and automated response to address the full adversary TTP spectrum.
Threat hunting and proactive defense
- Execute enterprise-scale threat hunts using hypothesis-driven, intelligence-driven, and data-driven methodologies across network, endpoint, identity, and cloud telemetry.
- Analyze threat hunting findings to quantify detection gaps, assess adversary dwell time, and distinguish opportunistic compromise from targeted intrusion campaigns.
- Design enterprise threat hunting programs including team structure, skill pathways, tooling, data lake architecture, and maturity measurement frameworks.
SOAR and security automation at scale
- Implement SOAR with automated playbooks for phishing response, malware containment, compromised account remediation, and DDoS mitigation at enterprise scale.
- Evaluate SOAR effectiveness by measuring response time reduction, analyst workload impact, false positive handling, and integration coverage across security tools.
- Plan security automation roadmaps prioritizing high-volume use cases, defining human-in-the-loop decision points, and measuring automation ROI.
Digital forensics and malware analysis
- Perform enterprise forensics including memory, disk, network, cloud, and mobile forensics with chain of custody and evidence handling procedures.
- Perform malware analysis using static analysis, dynamic sandbox execution, API monitoring, and behavioral analysis to characterize malicious samples.
- Investigate complex incidents by correlating forensic artifacts across endpoints, network captures, cloud audit logs, and identity records to reconstruct attack narratives.
Enterprise incident management
- Implement enterprise incident management including severity classification, escalation procedures, cross-functional coordination, and regulatory notification workflows.
- Assess incident response maturity by evaluating response times, playbook coverage, tabletop exercise results, and improvement tracking against industry benchmarks.
- Integrate security tool ecosystems including SIEM, SOAR, EDR, NDR, TIP, and ITSM for unified operations with automated enrichment and coordinated response.
- Design enterprise incident response programs scaling across global operations with crisis management, external retainer relationships, and cross-jurisdictional compliance.
Scope
Included Topics
- All domains and objectives in the CompTIA SecurityX (CAS-005) exam: Domain 1 Security Architecture (29%), Domain 2 Security Engineering and Cryptography (25%), Domain 3 Governance, Risk, and Compliance (22%), and Domain 4 Security Operations (24%).
- Expert-level enterprise security knowledge including advanced zero trust architecture, multi-cloud security design, cryptographic engineering, identity federation at scale, governance framework implementation, risk quantification, and advanced threat analysis across complex organizational environments.
- Enterprise security technologies and concepts: micro-segmentation, software-defined perimeter, SASE/SSE, PKI at scale, HSMs, quantum-resistant cryptography, container orchestration security, service mesh, API gateway security, SOAR, deception technology, threat hunting platforms, UEBA, advanced malware analysis, and security data lakes.
- Scenario-driven enterprise decisions requiring architectural tradeoffs between security, performance, cost, compliance, and business enablement across multi-cloud, hybrid, and legacy environments with global regulatory considerations.
Not Covered
- Introductory security concepts and terminology at the foundational level (covered by Security+ SY0-701).
- Operational SOC analyst workflows at the practitioner level including daily alert triage and tier-1 response (covered by CySA+ CS0-003).
- Hands-on exploitation techniques and penetration testing tool usage at the operator level (covered by PenTest+ PT0-003).
- Vendor-specific product configuration details unless used to illustrate enterprise architectural patterns applicable across vendors.
- Academic research in post-quantum cryptography and theoretical computer science beyond practical enterprise implementation decisions.
SecurityX is coming soon
Adaptive learning that maps your knowledge and closes your gaps.
Create Free Account to Be Notified