SlideShare a Scribd company logo
• Enterprise Security
• Risk Management and Incident Response
•	Research and Analysis
•	Integration of Computing, Communications and Business Disciplines
•	Technical Integration of Enterprise Components
CASP is an advanced-level certification covering enterprise security;
risk management; incident response; research and analysis;
integration of computing, communications and business disciplines;
and technical integration of enterprise components.
CASP certifies critical thinking and judgment across a broad spectrum of security disciplines and requires
candidates to implement clear solutions in complex environments. It assesses IT pros who work in advanced
technical positions.
CASP addresses the increased diversity of knowledge, skills and abilities (KSAs) required of today’s enterprise
cybersecurity pros and validates what is currently necessary to perform effectively on the job.
The current version of CASP reflects the skills needed to manage modern IT environments, including:
Closing the Gap for Advanced
Enterprise Cybersecurity Skills
with CompTIA Advanced Security Practitioner (CASP)
In this
document:
• Closing the Gap for
Advanced Enterprise
Cybersecurity Skills
with CASP
• Measuring CASP
Difficulty
• Why Hybrid Testing
Approaches Work
Best
• Mapping the NICE
Cybersecurity Work-
force Framework
of the exam
objectives require
application or
analysis of
domain
knowledge
82%
Measuring CASP Difficulty
Using Bloom’s Taxonomy as an organizing principle to discuss the difficulty level of
the exam illustrates the emphasis on the application of KSAs, rather than the simple
recall of information. Looking at the exam objectives, 82 percent require candidates to
demonstrate their knowledge at Bloom’s level 3 (apply) and level 4 (analyze).
The CASP exam is at a high taxonomy level because we carefully track job roles and skills in the IT
industry. We strive to make sure that the exams directly reflect industry standards and best practices.
The following table summarizes the percentage of certification
exam objectives that fall into each of Bloom’s level.
1
Bloom’s Level and Description
Level of
Complexity
Percentage of Objectives
(Objective Numbers)
Level 1: Remembering/Recalling Information
The candidate is able to recall, restate and remember learned information.
Basic 0%
Level 2: Understanding/Explaining Ideas or Concepts
The learner grasps the meaning of information by
interpreting and translating what has been learned.
Low 17%
Level 3: Applying Knowledge and Skills
The learner makes use of information in a new situation
from the one in which it was learned.
Moderate 30%
Level 4: Analyzing
The learner breaks learned information into parts to best understand
that information in an attempt to identify evidence for a conclusion.
High 53%
Level 5: Evaluating
The learner makes decisions based on in depth
reflection, criticism and assessment.
High 0%
Level 6: Creating
The learner creates new ideas and information
using what has been previously learned.
High 0%
CASP Executive Summary
Why Hybrid Testing Approaches Work Best
Over the past several years, cybersecurity practitioners and educators have debated as to which of the following is more
important to validate:
1. An individual’s conceptual knowledge, as validated by “linear” multiple choice items, or
2. Performance associated with a particular job or responsibility, as validated by performance-based items.
Advocates for each of these two aspects of validation often hold one of the approaches as superior over the other, with most
individuals favoring only performance-based items.
CompTIA regards this rift in opinion as a false dilemma. Both domain knowledge expertise and practical skills are absolutely vital
and should be a part of any serious competency training and validation process. Both knowledge- and performance-based
aspects are necessary for training, and nothing can substitute for hands-on learning. The same principle applies to assessment.
This is why CompTIA adopted performance-based items into its certification exams starting in 2011.
The following CompTIA exams contain roughly 10 percent performance-based items:
On average, it takes a test taker roughly one-third of the time to complete these performance-based items. Performance-based items include
simulations of technology solutions and story-based items that require advanced cognitive thinking on the part of the successful test taker.
A+ | Network+ | Security+ | Cybersecurity Analyst (CSA+) | CompTIA Advanced Security Practitioner (CASP)
2
Work Role Description Matching CompTIA CASP Objectives (Samples)
Enterprise Architect
SP-ARC-001
Develops and maintains business, systems
and information processes to support
enterprise mission needs; develops information
technology (IT) rules and requirements that
describe baseline and target architectures.
2.3 — Compare and contrast security, privacy policies
and procedures based on organizational requirements
3.2 — Analyze scenarios to secure the enterprise
5.1 — Given a scenario, integrate hosts,
storage, networks and applications into
a secure enterprise architecture
Security Architect
SP-ARC-002
Designs enterprise and systems security throughout
the development life cycle; translates technology
and environmental conditions (e.g., law and
regulation) into security designs and processes.
1.3 — Given a scenario, analyze network and security
components, concepts and architectures
4.3 — Implement security activities
across the technology life cycle
5.1 — Given a scenario, integrate hosts,
storage, networks and applications into
a secure enterprise architecture
Systems
Requirements
Planner
SP-RP-001
Consults with customers to evaluate functional
requirements and translate functional
requirements into technical solutions.
2.1 — Interpret business and industry influences
and explain associated security risks
4.1 — Given a scenario, facilitate collaboration across
diverse business units to achieve security goals
4.2 — Given a scenario, select the appropriate control to
secure communications and collaboration solutions
Research and
Development
Specialist
SP-RD-001
Conducts software and systems engineering
and software systems research in order to
develop new capabilities, ensuring cybersecurity
is fully integrated. Conducts comprehensive
technology research to evaluate potential
vulnerabilities in cyberspace systems.
3.1 — Apply research methods to determine
industry trends and impact to the enterprise
3.2 — Analyze scenarios to secure the enterprise
3.3 — Given a scenario, select methods
or tools appropriate to conduct an
assessment and analyze results
Information Systems
Security Developer
SP-SYS-001
Designs, develops, tests and evaluates
information system security throughout
the systems development life cycle.
1.1 — Given a scenario, select appropriate
cryptographic concepts and techniques
2.2 — Given a scenario, execute risk mitigation
planning, strategies and controls
4.3 — Implement security activities
across the technology life cycle
Mapping the NICE Cybersecurity Workforce Framework
CASP aligns with the following 11 work roles of the National Initiative for Cybersecurity Education
(NICE) Cybersecurity Workforce Framework (NCWF), draft NIST special publication 800-181:
This mapping is a sample of how CompTIA’s certification standards map to key elements of the NICE framework.
CASP Executive Summary
• Enterprise Architect, SP-ARC-001
• Security Architect, SP-ARC-002
• Systems Requirements Planner, SP-RP-001
• Research and Development Specialist, SP-RD-001
• Information Systems Security Developer, SP-SYS-001
• Security Control Assessor, SP-RM-002
• Cyber Defense Analyst, PR-DA-001
• Cyber Defense Incident Responder, PR-IR-001
• Vulnerability Assessment Analyst, PR-VA-001
• Warning Analyst, AN-TA-001
• Cyber Crime Investigator, IN-CI-001
3
Work Role Description Matching CompTIA CASP Objectives (Samples)
Security Control
Assessor
SP-RM-002
Conducts independent comprehensive assessments
of the management, operational and technical
security controls and control enhancements employed
within or inherited by an information technology
(IT) system to determine the overall effectiveness
of the controls (as defined in NIST SP 800-37).
1.4 — Given a scenario, select and troubleshoot
security controls for hosts
1.5 — Differentiate application vulnerabilities
and select appropriate security controls
3.3 — Given a scenario, select methods
or tools appropriate to conduct an
assessment and analyze results
Cyber Defense
Analyst PR-DA-001
Uses data collected from a variety of cyber-
defense tools (e.g., intrusion detection system (IDS)
alerts, firewalls, network traffic logs) to analyze
events that occur within their environments
for the purposes of mitigating threats.
1.3 — Given a scenario, analyze network and security
components, concepts and architectures
2.2 — Given a scenario, execute risk mitigation
planning, strategies and controls
3.2 — Analyze scenarios to secure the enterprise
Cyber Defense
Incident Responder
PR-IR-001
Investigates, analyzes and responds to cyber-incidents
within the network environment or enclave.
2.4 — Given a scenario, conduct incident
response and recovery procedures
3.1 — Apply research methods to determine
industry trends and impact to the enterprise
3.3 — Given a scenario, select methods
or tools appropriate to conduct an
assessment and analyze results
Vulnerability
Assessment
Analyst PR-VA-001
Performs assessments of systems and networks
within the network environment or enclave and
identifies where those systems/networks deviate
from acceptable configurations, enclave policy or
local policy. Measures effectiveness of defense-in-
depth architecture against known vulnerabilities.
1.3 — Given a scenario, analyze network and security
components, concepts and architectures
1.5 — Differentiate application vulnerabilities
and select appropriate security controls
3.3 — Given a scenario, select methods
or tools appropriate to conduct an
assessment and analyze results
Warning Analyst
AN-TA-001
Develops unique cyber indicators to maintain constant
awareness of the status of the highly dynamic
operating environment. Collects, processes, analyzes
and disseminates cyber-warning assessments.
1.3 — Given a scenario, analyze network and security
components, concepts and architectures
3.1 — Apply research methods to determine
industry trends and impact to the enterprise
3.2 — Analyze scenarios to secure the enterprise
3.3 — Given a scenario, select methods
or tools appropriate to conduct an
assessment and analyze results
Cyber Crime
Investigator
IN-CI-001
Identifies, collects, examines and preserves
evidence using controlled and documented
analytical and investigative techniques.
2.3 — Compare and contrast security, privacy policies
and procedures based on organizational requirements
2.4 — Given a scenario, conduct incident
response and recovery procedures
3.3 — Given a scenario, select methods
or tools appropriate to conduct an
assessment and analyze results
LEARN MORE
For government inquiries contact: GovernmentSales@CompTIA.org.
For corporate inquiries contact: Jennifer Herroon at jherroon@CompTIA.org
© 2017 CompTIA Properties, LLC, used under license by CompTIA Certifications, LLC. All rights reserved. All certification programs and
education related to such programs are operated exclusively by CompTIA Certifications, LLC. CompTIA is a registered trademark of
CompTIA Properties, LLC in the U.S. and internationally. Other brands and company names mentioned herein may be trademarks or
service marks of CompTIA Properties, LLC or of their respective owners. Reproduction or dissemination prohibited without written
consent of CompTIA Properties, LLC. Printed in the U.S. 03724-Apr2017
CASP Executive Summary
4

More Related Content

What's hot

Domain 6 - Security Assessment and Testing
Domain 6 - Security Assessment and TestingDomain 6 - Security Assessment and Testing
Domain 6 - Security Assessment and Testing
Maganathin Veeraragaloo
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEW
cscpconf
 
SAFECode’s latest “Software Security Guidance for Agile Practitioners” White...
SAFECode’s latest “Software Security Guidance for Agile Practitioners”  White...SAFECode’s latest “Software Security Guidance for Agile Practitioners”  White...
SAFECode’s latest “Software Security Guidance for Agile Practitioners” White...EMC
 
Cyber security technologist occupational brief
Cyber security technologist occupational briefCyber security technologist occupational brief
Cyber security technologist occupational brief
Enda Crossan
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guideSergey Erohin
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniYaser Alrefai
 
Security Maturity Assessment
Security Maturity AssessmentSecurity Maturity Assessment
Security Maturity AssessmentClaude Baudoin
 
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGESSTATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
IJCSES Journal
 
Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...
Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...
Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...
Editor IJCATR
 
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
 CMGT 582 STUDY Inspiring Innovation--cmgt582study.com CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
KeatonJennings98
 
A Survey of Software Reliability factor
A Survey of Software Reliability factorA Survey of Software Reliability factor
A Survey of Software Reliability factor
IOSR Journals
 
A project approach to HIPAA
A project approach to HIPAAA project approach to HIPAA
A project approach to HIPAADaniel P Wallace
 
Providing a model for selecting information security control objectives using...
Providing a model for selecting information security control objectives using...Providing a model for selecting information security control objectives using...
Providing a model for selecting information security control objectives using...
ijfcstjournal
 
Chapter 07 risk_management_controlling_risk
Chapter 07 risk_management_controlling_riskChapter 07 risk_management_controlling_risk
Chapter 07 risk_management_controlling_risk
husseinalshomali
 
Security Maturity Models.
Security Maturity Models.Security Maturity Models.
Security Maturity Models.
Priyanka Aash
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ InfrastructurePriyank Hada
 
Secured cloud support for global software
Secured cloud support for global softwareSecured cloud support for global software
Secured cloud support for global software
ijseajournal
 
Understanding the security_organization
Understanding the security_organizationUnderstanding the security_organization
Understanding the security_organization
Dan Morrill
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offering
eeaches
 

What's hot (19)

Domain 6 - Security Assessment and Testing
Domain 6 - Security Assessment and TestingDomain 6 - Security Assessment and Testing
Domain 6 - Security Assessment and Testing
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEW
 
SAFECode’s latest “Software Security Guidance for Agile Practitioners” White...
SAFECode’s latest “Software Security Guidance for Agile Practitioners”  White...SAFECode’s latest “Software Security Guidance for Agile Practitioners”  White...
SAFECode’s latest “Software Security Guidance for Agile Practitioners” White...
 
Cyber security technologist occupational brief
Cyber security technologist occupational briefCyber security technologist occupational brief
Cyber security technologist occupational brief
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
 
Security Maturity Assessment
Security Maturity AssessmentSecurity Maturity Assessment
Security Maturity Assessment
 
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGESSTATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
 
Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...
Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...
Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...
 
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
 CMGT 582 STUDY Inspiring Innovation--cmgt582study.com CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
 
A Survey of Software Reliability factor
A Survey of Software Reliability factorA Survey of Software Reliability factor
A Survey of Software Reliability factor
 
A project approach to HIPAA
A project approach to HIPAAA project approach to HIPAA
A project approach to HIPAA
 
Providing a model for selecting information security control objectives using...
Providing a model for selecting information security control objectives using...Providing a model for selecting information security control objectives using...
Providing a model for selecting information security control objectives using...
 
Chapter 07 risk_management_controlling_risk
Chapter 07 risk_management_controlling_riskChapter 07 risk_management_controlling_risk
Chapter 07 risk_management_controlling_risk
 
Security Maturity Models.
Security Maturity Models.Security Maturity Models.
Security Maturity Models.
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ Infrastructure
 
Secured cloud support for global software
Secured cloud support for global softwareSecured cloud support for global software
Secured cloud support for global software
 
Understanding the security_organization
Understanding the security_organizationUnderstanding the security_organization
Understanding the security_organization
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offering
 

Similar to Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Advanced Security Practitioner (CASP)

PPT-Security-for-Management.pptx
PPT-Security-for-Management.pptxPPT-Security-for-Management.pptx
PPT-Security-for-Management.pptx
RSAArcher
 
Managing an enterprise cyber security program
Managing an enterprise cyber security programManaging an enterprise cyber security program
Managing an enterprise cyber security program
abdulkhalid murady
 
Secure Software Development Models and Methods integrated with CMMI.ppt
Secure Software Development Models and Methods integrated with CMMI.pptSecure Software Development Models and Methods integrated with CMMI.ppt
Secure Software Development Models and Methods integrated with CMMI.ppt
Neha Sharma
 
Project 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This cheProject 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This che
davieec5f
 
CMGT 400 Effective Communication/tutorialrank.com
 CMGT 400 Effective Communication/tutorialrank.com CMGT 400 Effective Communication/tutorialrank.com
CMGT 400 Effective Communication/tutorialrank.com
jonhson268
 
CompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new examCompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new exam
Infosec
 
Audit Practice at CipherTechs
Audit Practice at CipherTechsAudit Practice at CipherTechs
Audit Practice at CipherTechsMordecai Kraushar
 
Cissp exam-outline
Cissp exam-outlineCissp exam-outline
Cissp exam-outline
Ahmet E
 
CMMC Breakdown
CMMC BreakdownCMMC Breakdown
Happiest Minds NIST CSF compliance Brochure
Happiest Minds NIST  CSF compliance BrochureHappiest Minds NIST  CSF compliance Brochure
Happiest Minds NIST CSF compliance Brochure
Suresh Kanniappan
 
Process Maturity Assessment
Process Maturity AssessmentProcess Maturity Assessment
Process Maturity Assessment
pchronis
 
Cmgt 582 Education Specialist -snaptutorial.com
Cmgt 582  Education Specialist -snaptutorial.comCmgt 582  Education Specialist -snaptutorial.com
Cmgt 582 Education Specialist -snaptutorial.com
DavisMurphyC37
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
Andrew Byers
 
Cmgt 400 Entire Course NEW
Cmgt 400 Entire Course NEWCmgt 400 Entire Course NEW
Cmgt 400 Entire Course NEW
shyamuop
 
CMGT 400 Entire Course NEW
CMGT 400 Entire Course NEWCMGT 400 Entire Course NEW
CMGT 400 Entire Course NEW
shyamuopfive
 
Se project-methodology-for-security-project-web
Se project-methodology-for-security-project-webSe project-methodology-for-security-project-web
Se project-methodology-for-security-project-web
Sandeep Sharma IIMK Smart City,IoT,Bigdata,Cloud,BI,DW
 
Applying Lean for information security operations centre
Applying Lean for information security operations centreApplying Lean for information security operations centre
Applying Lean for information security operations centre
Naushad Rajani. - CISA, CISSP, CCSP, PMP, DCPP (Privacy)
 
Cmgt 582 Effective Communication / snaptutorial.com
Cmgt 582  Effective Communication / snaptutorial.comCmgt 582  Effective Communication / snaptutorial.com
Cmgt 582 Effective Communication / snaptutorial.com
HarrisGeorg12
 
Meeting Today’s IT Support Challenges with CompTIA A+
Meeting Today’s IT Support Challenges with CompTIA A+Meeting Today’s IT Support Challenges with CompTIA A+
Meeting Today’s IT Support Challenges with CompTIA A+
CompTIA
 

Similar to Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Advanced Security Practitioner (CASP) (20)

PPT-Security-for-Management.pptx
PPT-Security-for-Management.pptxPPT-Security-for-Management.pptx
PPT-Security-for-Management.pptx
 
Managing an enterprise cyber security program
Managing an enterprise cyber security programManaging an enterprise cyber security program
Managing an enterprise cyber security program
 
Secure Software Development Models and Methods integrated with CMMI.ppt
Secure Software Development Models and Methods integrated with CMMI.pptSecure Software Development Models and Methods integrated with CMMI.ppt
Secure Software Development Models and Methods integrated with CMMI.ppt
 
Project 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This cheProject 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This che
 
CMGT 400 Effective Communication/tutorialrank.com
 CMGT 400 Effective Communication/tutorialrank.com CMGT 400 Effective Communication/tutorialrank.com
CMGT 400 Effective Communication/tutorialrank.com
 
CompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new examCompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new exam
 
Audit Practice at CipherTechs
Audit Practice at CipherTechsAudit Practice at CipherTechs
Audit Practice at CipherTechs
 
Cissp exam-outline
Cissp exam-outlineCissp exam-outline
Cissp exam-outline
 
CMMC Breakdown
CMMC BreakdownCMMC Breakdown
CMMC Breakdown
 
Happiest Minds NIST CSF compliance Brochure
Happiest Minds NIST  CSF compliance BrochureHappiest Minds NIST  CSF compliance Brochure
Happiest Minds NIST CSF compliance Brochure
 
Process Maturity Assessment
Process Maturity AssessmentProcess Maturity Assessment
Process Maturity Assessment
 
Cmgt 582 Education Specialist -snaptutorial.com
Cmgt 582  Education Specialist -snaptutorial.comCmgt 582  Education Specialist -snaptutorial.com
Cmgt 582 Education Specialist -snaptutorial.com
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
Cmgt 400 Entire Course NEW
Cmgt 400 Entire Course NEWCmgt 400 Entire Course NEW
Cmgt 400 Entire Course NEW
 
CMGT 400 Entire Course NEW
CMGT 400 Entire Course NEWCMGT 400 Entire Course NEW
CMGT 400 Entire Course NEW
 
Se project-methodology-for-security-project-web
Se project-methodology-for-security-project-webSe project-methodology-for-security-project-web
Se project-methodology-for-security-project-web
 
Applying Lean for information security operations centre
Applying Lean for information security operations centreApplying Lean for information security operations centre
Applying Lean for information security operations centre
 
Unit Iii
Unit IiiUnit Iii
Unit Iii
 
Cmgt 582 Effective Communication / snaptutorial.com
Cmgt 582  Effective Communication / snaptutorial.comCmgt 582  Effective Communication / snaptutorial.com
Cmgt 582 Effective Communication / snaptutorial.com
 
Meeting Today’s IT Support Challenges with CompTIA A+
Meeting Today’s IT Support Challenges with CompTIA A+Meeting Today’s IT Support Challenges with CompTIA A+
Meeting Today’s IT Support Challenges with CompTIA A+
 

More from CompTIA

CompTIA IT Employment Tracker – December 2021
CompTIA IT Employment Tracker –  December 2021CompTIA IT Employment Tracker –  December 2021
CompTIA IT Employment Tracker – December 2021
CompTIA
 
CompTIA IT Employment Tracker – November 2021
CompTIA IT Employment Tracker –  November 2021CompTIA IT Employment Tracker –  November 2021
CompTIA IT Employment Tracker – November 2021
CompTIA
 
CompTIA IT Employment Tracker – October 2021
CompTIA IT Employment Tracker –  October 2021CompTIA IT Employment Tracker –  October 2021
CompTIA IT Employment Tracker – October 2021
CompTIA
 
CompTIA IT Employment Tracker – September 2021
CompTIA IT Employment Tracker –  September 2021CompTIA IT Employment Tracker –  September 2021
CompTIA IT Employment Tracker – September 2021
CompTIA
 
CompTIA IT Employment Tracker – July 2021
CompTIA IT Employment Tracker –  July 2021CompTIA IT Employment Tracker –  July 2021
CompTIA IT Employment Tracker – July 2021
CompTIA
 
CompTIA IT Employment Tracker – June 2021
CompTIA IT Employment Tracker –  June 2021CompTIA IT Employment Tracker –  June 2021
CompTIA IT Employment Tracker – June 2021
CompTIA
 
Trends in Automation 2021
Trends in Automation 2021Trends in Automation 2021
Trends in Automation 2021
CompTIA
 
CompTIA IT Employment Tracker – May 2021
CompTIA IT Employment Tracker –  May 2021CompTIA IT Employment Tracker –  May 2021
CompTIA IT Employment Tracker – May 2021
CompTIA
 
CompTIA IT Employment Tracker – April 2021
CompTIA IT Employment Tracker –  April 2021CompTIA IT Employment Tracker –  April 2021
CompTIA IT Employment Tracker – April 2021
CompTIA
 
IT Operations and Emerging Technology
IT Operations and Emerging TechnologyIT Operations and Emerging Technology
IT Operations and Emerging Technology
CompTIA
 
CompTIA IT Employment Tracker – March 2021
CompTIA IT Employment Tracker – March 2021CompTIA IT Employment Tracker – March 2021
CompTIA IT Employment Tracker – March 2021
CompTIA
 
Help Desk Trends
Help Desk TrendsHelp Desk Trends
Help Desk Trends
CompTIA
 
CompTIA IT Employment Tracker – February 2021
CompTIA IT Employment Tracker –  February 2021CompTIA IT Employment Tracker –  February 2021
CompTIA IT Employment Tracker – February 2021
CompTIA
 
CompTIA 2021 IT Industry Outlook
CompTIA 2021 IT Industry OutlookCompTIA 2021 IT Industry Outlook
CompTIA 2021 IT Industry Outlook
CompTIA
 
CompTIA IT Employment Tracker - January 2021
CompTIA IT Employment Tracker - January 2021CompTIA IT Employment Tracker - January 2021
CompTIA IT Employment Tracker - January 2021
CompTIA
 
CompTIA IT Employment Tracker – November 2020
CompTIA IT Employment Tracker –  November 2020CompTIA IT Employment Tracker –  November 2020
CompTIA IT Employment Tracker – November 2020
CompTIA
 
CompTIA IT Employment Tracker – October 2020
CompTIA IT Employment Tracker – October 2020CompTIA IT Employment Tracker – October 2020
CompTIA IT Employment Tracker – October 2020
CompTIA
 
CompTIA IT Employment Tracker – September 2020
CompTIA IT Employment Tracker –  September 2020CompTIA IT Employment Tracker –  September 2020
CompTIA IT Employment Tracker – September 2020
CompTIA
 
CompTIA IT Employment Tracker – August 2020
CompTIA IT Employment Tracker –  August 2020CompTIA IT Employment Tracker –  August 2020
CompTIA IT Employment Tracker – August 2020
CompTIA
 
CompTIA IT Employment Tracker – July 2020
CompTIA IT Employment Tracker –  July 2020CompTIA IT Employment Tracker –  July 2020
CompTIA IT Employment Tracker – July 2020
CompTIA
 

More from CompTIA (20)

CompTIA IT Employment Tracker – December 2021
CompTIA IT Employment Tracker –  December 2021CompTIA IT Employment Tracker –  December 2021
CompTIA IT Employment Tracker – December 2021
 
CompTIA IT Employment Tracker – November 2021
CompTIA IT Employment Tracker –  November 2021CompTIA IT Employment Tracker –  November 2021
CompTIA IT Employment Tracker – November 2021
 
CompTIA IT Employment Tracker – October 2021
CompTIA IT Employment Tracker –  October 2021CompTIA IT Employment Tracker –  October 2021
CompTIA IT Employment Tracker – October 2021
 
CompTIA IT Employment Tracker – September 2021
CompTIA IT Employment Tracker –  September 2021CompTIA IT Employment Tracker –  September 2021
CompTIA IT Employment Tracker – September 2021
 
CompTIA IT Employment Tracker – July 2021
CompTIA IT Employment Tracker –  July 2021CompTIA IT Employment Tracker –  July 2021
CompTIA IT Employment Tracker – July 2021
 
CompTIA IT Employment Tracker – June 2021
CompTIA IT Employment Tracker –  June 2021CompTIA IT Employment Tracker –  June 2021
CompTIA IT Employment Tracker – June 2021
 
Trends in Automation 2021
Trends in Automation 2021Trends in Automation 2021
Trends in Automation 2021
 
CompTIA IT Employment Tracker – May 2021
CompTIA IT Employment Tracker –  May 2021CompTIA IT Employment Tracker –  May 2021
CompTIA IT Employment Tracker – May 2021
 
CompTIA IT Employment Tracker – April 2021
CompTIA IT Employment Tracker –  April 2021CompTIA IT Employment Tracker –  April 2021
CompTIA IT Employment Tracker – April 2021
 
IT Operations and Emerging Technology
IT Operations and Emerging TechnologyIT Operations and Emerging Technology
IT Operations and Emerging Technology
 
CompTIA IT Employment Tracker – March 2021
CompTIA IT Employment Tracker – March 2021CompTIA IT Employment Tracker – March 2021
CompTIA IT Employment Tracker – March 2021
 
Help Desk Trends
Help Desk TrendsHelp Desk Trends
Help Desk Trends
 
CompTIA IT Employment Tracker – February 2021
CompTIA IT Employment Tracker –  February 2021CompTIA IT Employment Tracker –  February 2021
CompTIA IT Employment Tracker – February 2021
 
CompTIA 2021 IT Industry Outlook
CompTIA 2021 IT Industry OutlookCompTIA 2021 IT Industry Outlook
CompTIA 2021 IT Industry Outlook
 
CompTIA IT Employment Tracker - January 2021
CompTIA IT Employment Tracker - January 2021CompTIA IT Employment Tracker - January 2021
CompTIA IT Employment Tracker - January 2021
 
CompTIA IT Employment Tracker – November 2020
CompTIA IT Employment Tracker –  November 2020CompTIA IT Employment Tracker –  November 2020
CompTIA IT Employment Tracker – November 2020
 
CompTIA IT Employment Tracker – October 2020
CompTIA IT Employment Tracker – October 2020CompTIA IT Employment Tracker – October 2020
CompTIA IT Employment Tracker – October 2020
 
CompTIA IT Employment Tracker – September 2020
CompTIA IT Employment Tracker –  September 2020CompTIA IT Employment Tracker –  September 2020
CompTIA IT Employment Tracker – September 2020
 
CompTIA IT Employment Tracker – August 2020
CompTIA IT Employment Tracker –  August 2020CompTIA IT Employment Tracker –  August 2020
CompTIA IT Employment Tracker – August 2020
 
CompTIA IT Employment Tracker – July 2020
CompTIA IT Employment Tracker –  July 2020CompTIA IT Employment Tracker –  July 2020
CompTIA IT Employment Tracker – July 2020
 

Recently uploaded

一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
yuhofha
 
Personal Brand exploration KE.pdf for assignment
Personal Brand exploration KE.pdf for assignmentPersonal Brand exploration KE.pdf for assignment
Personal Brand exploration KE.pdf for assignment
ragingokie
 
New Explore Careers and College Majors 2024.pdf
New Explore Careers and College Majors 2024.pdfNew Explore Careers and College Majors 2024.pdf
New Explore Careers and College Majors 2024.pdf
Dr. Mary Askew
 
Luke Royak's Personal Brand Exploration!
Luke Royak's Personal Brand Exploration!Luke Royak's Personal Brand Exploration!
Luke Royak's Personal Brand Exploration!
LukeRoyak
 
134. Reviewer Certificate in Computer Science
134. Reviewer Certificate in Computer Science134. Reviewer Certificate in Computer Science
134. Reviewer Certificate in Computer Science
Manu Mitra
 
Full Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptxFull Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptx
mmorales2173
 
DIGITAL MARKETING COURSE IN CHENNAI.pptx
DIGITAL MARKETING COURSE IN CHENNAI.pptxDIGITAL MARKETING COURSE IN CHENNAI.pptx
DIGITAL MARKETING COURSE IN CHENNAI.pptx
FarzanaRbcomcs
 
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
larisashrestha558
 
RECOGNITION AWARD 13 - TO ALESSANDRO MARTINS.pdf
RECOGNITION AWARD 13 - TO ALESSANDRO MARTINS.pdfRECOGNITION AWARD 13 - TO ALESSANDRO MARTINS.pdf
RECOGNITION AWARD 13 - TO ALESSANDRO MARTINS.pdf
AlessandroMartins454470
 
Digital Marketing Training In Bangalore
Digital  Marketing Training In BangaloreDigital  Marketing Training In Bangalore
Digital Marketing Training In Bangalore
nidm599
 
一比一原版(YU毕业证)约克大学毕业证如何办理
一比一原版(YU毕业证)约克大学毕业证如何办理一比一原版(YU毕业证)约克大学毕业证如何办理
一比一原版(YU毕业证)约克大学毕业证如何办理
yuhofha
 
Operating system. short answes and Interview questions .pdf
Operating system. short answes and Interview questions .pdfOperating system. short answes and Interview questions .pdf
Operating system. short answes and Interview questions .pdf
harikrishnahari6276
 
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
foismail170
 
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
pxyhy
 
How to create an effective K-POC tutorial
How to create an effective K-POC tutorialHow to create an effective K-POC tutorial
How to create an effective K-POC tutorial
vencislavkaaa
 
原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样
原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样
原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样
atwvhyhm
 
Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.
alexthomas971
 
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
foismail170
 
Andrea Kate Portfolio Presentation.pdf
Andrea Kate  Portfolio  Presentation.pdfAndrea Kate  Portfolio  Presentation.pdf
Andrea Kate Portfolio Presentation.pdf
andreakaterasco
 
Midterm Contract Law and Adminstration.pptx
Midterm Contract Law and Adminstration.pptxMidterm Contract Law and Adminstration.pptx
Midterm Contract Law and Adminstration.pptx
Sheldon Byron
 

Recently uploaded (20)

一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
 
Personal Brand exploration KE.pdf for assignment
Personal Brand exploration KE.pdf for assignmentPersonal Brand exploration KE.pdf for assignment
Personal Brand exploration KE.pdf for assignment
 
New Explore Careers and College Majors 2024.pdf
New Explore Careers and College Majors 2024.pdfNew Explore Careers and College Majors 2024.pdf
New Explore Careers and College Majors 2024.pdf
 
Luke Royak's Personal Brand Exploration!
Luke Royak's Personal Brand Exploration!Luke Royak's Personal Brand Exploration!
Luke Royak's Personal Brand Exploration!
 
134. Reviewer Certificate in Computer Science
134. Reviewer Certificate in Computer Science134. Reviewer Certificate in Computer Science
134. Reviewer Certificate in Computer Science
 
Full Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptxFull Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptx
 
DIGITAL MARKETING COURSE IN CHENNAI.pptx
DIGITAL MARKETING COURSE IN CHENNAI.pptxDIGITAL MARKETING COURSE IN CHENNAI.pptx
DIGITAL MARKETING COURSE IN CHENNAI.pptx
 
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
 
RECOGNITION AWARD 13 - TO ALESSANDRO MARTINS.pdf
RECOGNITION AWARD 13 - TO ALESSANDRO MARTINS.pdfRECOGNITION AWARD 13 - TO ALESSANDRO MARTINS.pdf
RECOGNITION AWARD 13 - TO ALESSANDRO MARTINS.pdf
 
Digital Marketing Training In Bangalore
Digital  Marketing Training In BangaloreDigital  Marketing Training In Bangalore
Digital Marketing Training In Bangalore
 
一比一原版(YU毕业证)约克大学毕业证如何办理
一比一原版(YU毕业证)约克大学毕业证如何办理一比一原版(YU毕业证)约克大学毕业证如何办理
一比一原版(YU毕业证)约克大学毕业证如何办理
 
Operating system. short answes and Interview questions .pdf
Operating system. short answes and Interview questions .pdfOperating system. short answes and Interview questions .pdf
Operating system. short answes and Interview questions .pdf
 
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
 
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
 
How to create an effective K-POC tutorial
How to create an effective K-POC tutorialHow to create an effective K-POC tutorial
How to create an effective K-POC tutorial
 
原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样
原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样
原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样
 
Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.
 
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
 
Andrea Kate Portfolio Presentation.pdf
Andrea Kate  Portfolio  Presentation.pdfAndrea Kate  Portfolio  Presentation.pdf
Andrea Kate Portfolio Presentation.pdf
 
Midterm Contract Law and Adminstration.pptx
Midterm Contract Law and Adminstration.pptxMidterm Contract Law and Adminstration.pptx
Midterm Contract Law and Adminstration.pptx
 

Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Advanced Security Practitioner (CASP)

  • 1. • Enterprise Security • Risk Management and Incident Response • Research and Analysis • Integration of Computing, Communications and Business Disciplines • Technical Integration of Enterprise Components CASP is an advanced-level certification covering enterprise security; risk management; incident response; research and analysis; integration of computing, communications and business disciplines; and technical integration of enterprise components. CASP certifies critical thinking and judgment across a broad spectrum of security disciplines and requires candidates to implement clear solutions in complex environments. It assesses IT pros who work in advanced technical positions. CASP addresses the increased diversity of knowledge, skills and abilities (KSAs) required of today’s enterprise cybersecurity pros and validates what is currently necessary to perform effectively on the job. The current version of CASP reflects the skills needed to manage modern IT environments, including: Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Advanced Security Practitioner (CASP) In this document: • Closing the Gap for Advanced Enterprise Cybersecurity Skills with CASP • Measuring CASP Difficulty • Why Hybrid Testing Approaches Work Best • Mapping the NICE Cybersecurity Work- force Framework of the exam objectives require application or analysis of domain knowledge 82% Measuring CASP Difficulty Using Bloom’s Taxonomy as an organizing principle to discuss the difficulty level of the exam illustrates the emphasis on the application of KSAs, rather than the simple recall of information. Looking at the exam objectives, 82 percent require candidates to demonstrate their knowledge at Bloom’s level 3 (apply) and level 4 (analyze). The CASP exam is at a high taxonomy level because we carefully track job roles and skills in the IT industry. We strive to make sure that the exams directly reflect industry standards and best practices. The following table summarizes the percentage of certification exam objectives that fall into each of Bloom’s level. 1
  • 2. Bloom’s Level and Description Level of Complexity Percentage of Objectives (Objective Numbers) Level 1: Remembering/Recalling Information The candidate is able to recall, restate and remember learned information. Basic 0% Level 2: Understanding/Explaining Ideas or Concepts The learner grasps the meaning of information by interpreting and translating what has been learned. Low 17% Level 3: Applying Knowledge and Skills The learner makes use of information in a new situation from the one in which it was learned. Moderate 30% Level 4: Analyzing The learner breaks learned information into parts to best understand that information in an attempt to identify evidence for a conclusion. High 53% Level 5: Evaluating The learner makes decisions based on in depth reflection, criticism and assessment. High 0% Level 6: Creating The learner creates new ideas and information using what has been previously learned. High 0% CASP Executive Summary Why Hybrid Testing Approaches Work Best Over the past several years, cybersecurity practitioners and educators have debated as to which of the following is more important to validate: 1. An individual’s conceptual knowledge, as validated by “linear” multiple choice items, or 2. Performance associated with a particular job or responsibility, as validated by performance-based items. Advocates for each of these two aspects of validation often hold one of the approaches as superior over the other, with most individuals favoring only performance-based items. CompTIA regards this rift in opinion as a false dilemma. Both domain knowledge expertise and practical skills are absolutely vital and should be a part of any serious competency training and validation process. Both knowledge- and performance-based aspects are necessary for training, and nothing can substitute for hands-on learning. The same principle applies to assessment. This is why CompTIA adopted performance-based items into its certification exams starting in 2011. The following CompTIA exams contain roughly 10 percent performance-based items: On average, it takes a test taker roughly one-third of the time to complete these performance-based items. Performance-based items include simulations of technology solutions and story-based items that require advanced cognitive thinking on the part of the successful test taker. A+ | Network+ | Security+ | Cybersecurity Analyst (CSA+) | CompTIA Advanced Security Practitioner (CASP) 2
  • 3. Work Role Description Matching CompTIA CASP Objectives (Samples) Enterprise Architect SP-ARC-001 Develops and maintains business, systems and information processes to support enterprise mission needs; develops information technology (IT) rules and requirements that describe baseline and target architectures. 2.3 — Compare and contrast security, privacy policies and procedures based on organizational requirements 3.2 — Analyze scenarios to secure the enterprise 5.1 — Given a scenario, integrate hosts, storage, networks and applications into a secure enterprise architecture Security Architect SP-ARC-002 Designs enterprise and systems security throughout the development life cycle; translates technology and environmental conditions (e.g., law and regulation) into security designs and processes. 1.3 — Given a scenario, analyze network and security components, concepts and architectures 4.3 — Implement security activities across the technology life cycle 5.1 — Given a scenario, integrate hosts, storage, networks and applications into a secure enterprise architecture Systems Requirements Planner SP-RP-001 Consults with customers to evaluate functional requirements and translate functional requirements into technical solutions. 2.1 — Interpret business and industry influences and explain associated security risks 4.1 — Given a scenario, facilitate collaboration across diverse business units to achieve security goals 4.2 — Given a scenario, select the appropriate control to secure communications and collaboration solutions Research and Development Specialist SP-RD-001 Conducts software and systems engineering and software systems research in order to develop new capabilities, ensuring cybersecurity is fully integrated. Conducts comprehensive technology research to evaluate potential vulnerabilities in cyberspace systems. 3.1 — Apply research methods to determine industry trends and impact to the enterprise 3.2 — Analyze scenarios to secure the enterprise 3.3 — Given a scenario, select methods or tools appropriate to conduct an assessment and analyze results Information Systems Security Developer SP-SYS-001 Designs, develops, tests and evaluates information system security throughout the systems development life cycle. 1.1 — Given a scenario, select appropriate cryptographic concepts and techniques 2.2 — Given a scenario, execute risk mitigation planning, strategies and controls 4.3 — Implement security activities across the technology life cycle Mapping the NICE Cybersecurity Workforce Framework CASP aligns with the following 11 work roles of the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (NCWF), draft NIST special publication 800-181: This mapping is a sample of how CompTIA’s certification standards map to key elements of the NICE framework. CASP Executive Summary • Enterprise Architect, SP-ARC-001 • Security Architect, SP-ARC-002 • Systems Requirements Planner, SP-RP-001 • Research and Development Specialist, SP-RD-001 • Information Systems Security Developer, SP-SYS-001 • Security Control Assessor, SP-RM-002 • Cyber Defense Analyst, PR-DA-001 • Cyber Defense Incident Responder, PR-IR-001 • Vulnerability Assessment Analyst, PR-VA-001 • Warning Analyst, AN-TA-001 • Cyber Crime Investigator, IN-CI-001 3
  • 4. Work Role Description Matching CompTIA CASP Objectives (Samples) Security Control Assessor SP-RM-002 Conducts independent comprehensive assessments of the management, operational and technical security controls and control enhancements employed within or inherited by an information technology (IT) system to determine the overall effectiveness of the controls (as defined in NIST SP 800-37). 1.4 — Given a scenario, select and troubleshoot security controls for hosts 1.5 — Differentiate application vulnerabilities and select appropriate security controls 3.3 — Given a scenario, select methods or tools appropriate to conduct an assessment and analyze results Cyber Defense Analyst PR-DA-001 Uses data collected from a variety of cyber- defense tools (e.g., intrusion detection system (IDS) alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats. 1.3 — Given a scenario, analyze network and security components, concepts and architectures 2.2 — Given a scenario, execute risk mitigation planning, strategies and controls 3.2 — Analyze scenarios to secure the enterprise Cyber Defense Incident Responder PR-IR-001 Investigates, analyzes and responds to cyber-incidents within the network environment or enclave. 2.4 — Given a scenario, conduct incident response and recovery procedures 3.1 — Apply research methods to determine industry trends and impact to the enterprise 3.3 — Given a scenario, select methods or tools appropriate to conduct an assessment and analyze results Vulnerability Assessment Analyst PR-VA-001 Performs assessments of systems and networks within the network environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy or local policy. Measures effectiveness of defense-in- depth architecture against known vulnerabilities. 1.3 — Given a scenario, analyze network and security components, concepts and architectures 1.5 — Differentiate application vulnerabilities and select appropriate security controls 3.3 — Given a scenario, select methods or tools appropriate to conduct an assessment and analyze results Warning Analyst AN-TA-001 Develops unique cyber indicators to maintain constant awareness of the status of the highly dynamic operating environment. Collects, processes, analyzes and disseminates cyber-warning assessments. 1.3 — Given a scenario, analyze network and security components, concepts and architectures 3.1 — Apply research methods to determine industry trends and impact to the enterprise 3.2 — Analyze scenarios to secure the enterprise 3.3 — Given a scenario, select methods or tools appropriate to conduct an assessment and analyze results Cyber Crime Investigator IN-CI-001 Identifies, collects, examines and preserves evidence using controlled and documented analytical and investigative techniques. 2.3 — Compare and contrast security, privacy policies and procedures based on organizational requirements 2.4 — Given a scenario, conduct incident response and recovery procedures 3.3 — Given a scenario, select methods or tools appropriate to conduct an assessment and analyze results LEARN MORE For government inquiries contact: GovernmentSales@CompTIA.org. For corporate inquiries contact: Jennifer Herroon at jherroon@CompTIA.org © 2017 CompTIA Properties, LLC, used under license by CompTIA Certifications, LLC. All rights reserved. All certification programs and education related to such programs are operated exclusively by CompTIA Certifications, LLC. CompTIA is a registered trademark of CompTIA Properties, LLC in the U.S. and internationally. Other brands and company names mentioned herein may be trademarks or service marks of CompTIA Properties, LLC or of their respective owners. Reproduction or dissemination prohibited without written consent of CompTIA Properties, LLC. Printed in the U.S. 03724-Apr2017 CASP Executive Summary 4