CompTIA SecurityX

Course code: COMPCA

SecurityX is an advanced cybersecurity certification for security architects and senior security engineers. It proves you have the skills to design, build, and implement secure solutions across complex environments. You’ll also show you can support a resilient enterprise while addressing governance, risk, and compliance needs.

Price of the certification exam is not included in the price of the course.

 

1 440 EUR

1 742 EUR including VAT

The earliest date from 01.12.2025

Selection of dates
onas
Do you have a question?
+420 731 175 867 edu@edutrainings.cz

Professional
and certified lecturers

Internationally
recognized certifications

Wide range of technical
and soft skills courses

Great customer
service

Making courses
exactly to measure your needs

Course dates

Starting date: 01.12.2025

Type: In-person/Virtual

Course duration: 5 days

Language: en/cz

Price without VAT: 1 440 EUR

Register

Starting date: 19.01.2026

Type: In-person/Virtual

Course duration: 5 days

Language: en/cz

Price without VAT: 1 440 EUR

Register

Starting date: 16.03.2026

Type: In-person/Virtual

Course duration: 5 days

Language: en/cz

Price without VAT: 1 440 EUR

Register

Starting date: 25.05.2026

Type: In-person/Virtual

Course duration: 5 days

Language: en/cz

Price without VAT: 1 440 EUR

Register

Starting date: 13.07.2026

Type: In-person/Virtual

Course duration: 5 days

Language: en/cz

Price without VAT: 1 440 EUR

Register

Starting date: 21.09.2026

Type: In-person/Virtual

Course duration: 5 days

Language: en/cz

Price without VAT: 1 440 EUR

Register

Starting date: 23.11.2026

Type: In-person/Virtual

Course duration: 5 days

Language: en/cz

Price without VAT: 1 440 EUR

Register

Starting date: Upon request

Type: In-person/Virtual

Course duration: 5 days

Language: en/cz

Price without VAT: 1 440 EUR

Register

Starting
date
Place
Type Course
duration
Language Price without VAT
01.12.2025 In-person/Virtual 5 days en/cz 1 440 EUR Register
19.01.2026 In-person/Virtual 5 days en/cz 1 440 EUR Register
16.03.2026 In-person/Virtual 5 days en/cz 1 440 EUR Register
25.05.2026 In-person/Virtual 5 days en/cz 1 440 EUR Register
13.07.2026 In-person/Virtual 5 days en/cz 1 440 EUR Register
21.09.2026 In-person/Virtual 5 days en/cz 1 440 EUR Register
23.11.2026 In-person/Virtual 5 days en/cz 1 440 EUR Register
Upon request In-person/Virtual 5 days en/cz 1 440 EUR Register
G Guaranteed course

Didn't find a suitable date?

Write to us about listing an alternative tailor-made date.

Contact

Course description

What’s new in the latest version of SecurityX?

  • Hands-on Labs
    Practical lab exercises allow you to develop and refine your cybersecurity skills through realistic simulations.
  • Incident Response
    This section prepares you to effectively handle incidents with the goal of minimizing damage and reducing recovery time.
  • Updated Governance and Compliance
    This part of the certification helps you stay up to date in the areas of governance and compliance, which are crucial in today’s regulated environment.
  • Cyber Readiness
    Focuses on assessing current protection levels and preparing to strengthen defenses against future threats.
  • Technical Leadership
    Empowers you to take on leadership roles where you guide teams toward excellence in cybersecurity operations.

Jobs That Use SecurityX

SecurityX is for IT cybersecurity professionals with a minimum of 10 years of experience in IT administration, including at least 5 years of hands-on technical security experience. SecurityX prepares candidates for the following job roles:

  • Security Architect
  • Security Engineer
  • Application security engineer

What Skills Will You Learn?

Governance, risk, and compliance (20%)

  • Security program documentationpolicies, procedures, standards, and guidelines.
  • Program managementtraining (phishing, security, privacy), communication, reporting, and RACI matrix.
  • FrameworksCOBIT, ITIL, etc.
  • Configuration managementasset life cycle, CMDB, and inventory.
  • GRC tools: mapping, automation, and compliance tracking.
  • Data governanceproduction, development, testing, and QA.
  • Risk managementimpact analysis, risk assessment (quantitative vs. qualitative), third-party risk, confidentiality, integrity, and availability.
  • Threat modelingactor characteristics, attack patterns, and frameworks (ATT&CK, CAPEC, STRIDE).
  • Attack surfacearchitecture reviews, data flows, and trust boundaries.
  • Compliance strategies: industry-specific standards (PCI DSS, ISO/IEC 27000).
  • Security frameworks: NIST, CSF, CSA, and others.

Security architecture (27%)

  • Cloud capabilitiesCASB (API-based, proxy-based), shadow IT detection, shared responsibility model, CI/CD pipeline, Terraform, Ansible, container security, orchestration, and serverless workloads.
  • Cloud data securitydata exposure, leakage, remanence, insecure storage, and encryption keys.
  • Cloud control strategiesproactive, detective, and preventative controls; customer-to-cloud connectivity, service integration, and continuous authorization.
  • Network architecturesegmentation, microsegmentation, VPN, always-on VPN, and API integration.
  • Security boundariesasset identification, management, attestation, data perimeters, and secure zones.
  • DeperimeterizationSASE, SD-WAN, and software-defined networking.
  • Zero trust conceptsdefining subject-object relationships.

Security engineering (31%)

  • Automationscripting (PowerShell, Bash, Python), event triggers, IaC, cloud APIs, generative AI, containerization, patching, SOAR, and workflow automation.
  • Vulnerability management: scanning, reporting, and SCAP (OVAL, XCCDF, CPE, CVE, CVSS).
  • Advanced cryptographyPQC, key stretching, homomorphic encryption, forward secrecy, and hardware acceleration.
  • Cryptographic use casesdata at rest, in transit, and in use; secure email, blockchain, privacy, compliance, and certificate-based authentication.
  • Cryptographic techniquestokenization, code signing, cryptographic erase, digital signatures, hashing, and symmetric/asymmetric cryptography.

Security operations (22%)

  • Monitoring and data analysisSIEM (event parsing, retention, false positives/negatives), aggregate analysis (correlation, prioritization, trends), and behavior baselines (network, systems, users).
  • Vulnerabilities and attack surface: injection, XSS, insecure configurations, outdated software, and weak ciphers; mitigations include input validation, patching, encryption, and defense-in-depth.
  • Threat hunting:  internal intelligence (honeypots, UBA), external intelligence (OSINT, dark web, ISACs), TIPs, IoC sharing (STIX, TAXII), and rule-based languages (Sigma, YARA, Snort).
  • Incident response: malware analysis (sandboxing, IoC extraction, code stylometry), reverse engineering, metadata analysis, data recovery, and root cause analysis.

Certification

Exam Codes CAS-005
Launch Date December 17, 2024
Exam Description SecurityX covers the technical knowledge and skills required to architect, engineer, integrate, and implement secure solutions across complex environments to support a resilient enterprise while considering the impact of governance, risk, and compliance requirements.
Number of Questions Maximum of 90
Type of Questions  Mix of multiple-choice and performance-based questions
Length of Test 165 Minutes
Passing Score This test has no scaled score; it’s pass/fail only.
Recommended Experience Minimum of 10 years of general hands-on IT experience, including 5 years of hands-on security, with Network+, Security+, CySA+, Cloud+, and PenTest+ or equivalent knowledge
Languages English, with other languages to be determined
Retirement Usually three years after launch

Renewal

Keep your certification up to date with CompTIA’s Continuing Education (CE) program. It’s designed to be a continued validation of your expertise and a tool to expand your skillset. It’s also the ace up your sleeve when you’re ready to take the next step in your career.

Get the most out of your certification
Information technology is an incredibly dynamic field, creating new opportunities and challenges every day. Participating in our Continuing Education program will enable you to stay current with new and evolving technologies, and remain a sought-after IT and security expert.

ComGate payment gateway MasterCard Logo Visa logo