CompTIA SecurityX (CAS-005) - Exam Objectives Core Blog Series - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

CompTIA SecurityX (CAS-005) - Exam Objectives

The CompTIA SecurityX certification (exam number: CAS-005), formerly known as CASP+, is crafted for IT professionals looking to validate their skills in designing, implementing, and managing sophisticated security solutions within complex enterprise environments. This is an expert level certification and the newest cert that is part of the CompTIA Xpert series to be released by CompTIA in late 2024. Our comprehensive blog series is your source to get a deep view into this new and covented certification.

This certification demonstrates expertise in architecting secure, resilient systems and leveraging automation, monitoring, and incident response for proactive security management. Candidates will gain proficiency in applying tailored security practices across cloud, on-premises, and hybrid infrastructures, using advanced cryptographic techniques, and understanding the impact of emerging technologies like artificial intelligence on information security. 

CompTIA SecurityX also emphasizes governance, compliance, and risk management strategies to protect enterprise systems from evolving threats, preparing professionals to lead impactful security initiatives in today’s dynamic digital landscape.

Expore Each of the CompTIA SecurityX Core Objectives

1.0 Governance, Risk, and Compliance

20% of the Exam


This objective centers on establishing effective governance, managing risk, and ensuring compliance across an organization, especially in light of new technologies like artificial intelligence (AI). It addresses key components of security program documentation, risk assessment, and privacy regulations to maintain a secure and compliant infrastructure.

27% of the Exam

This objective focuses on designing resilient and secure systems, considering the placement and configuration of critical components like firewalls, VPNs, and load balancers. It emphasizes integrating security throughout the systems life cycle, from defining requirements to incorporating controls like attack surface management, data classification, and continuous monitoring.

31% of the Exam

This objective emphasizes troubleshooting complex security challenges in identity and access management (IAM), network infrastructure, and hardware security for resilient enterprise environments. It includes securing specialized and legacy systems against misconfigurations, network threats, cryptographic vulnerabilities, and physical hardware risks. It also addresses enhancing endpoint security through detection, privilege management, and monitoring.

22% of the Exam

This objective focuses on identifying, analyzing, and responding to security threats using both internal and external threat intelligence sources, such as honeypots, OSINT, and dark web monitoring. It emphasizes proactive threat-hunting techniques, like adversary emulation and behavior analytics, to detect indicators of compromise (IoCs) and attack patterns.