Revision Advanced CompTIA / Certification / Exam Prep

CompTIA SecurityX CAS-005

A revision reference for the SecurityX CAS-005 exam � CompTIA's most advanced security certification. Covers all four domains, advanced concepts, and what separates SecurityX from Security+. Based on official CompTIA exam objectives.

90 questions / 165 mins Pass mark: 750 / 900 CompTIA Expert-level

// Exam Overview

DetailValue
Exam codeCAS-005
Number of questionsUp to 90 (multiple choice + performance-based)
Duration165 minutes
Passing score750 out of 900
Recommended experience10+ years in IT, 5+ years in security � Security+ and CySA+ recommended first
LevelExpert � highest level CompTIA security certification
RenewalEvery 3 years via CEs or retake

Domain 1

Security Architecture � ~25%

Domain 2

Security Operations � ~33%

Domain 3

Security Engineering � ~30%

Domain 4

Governance, Risk & Compliance � ~12%

Domain percentages for CAS-005 are approximate � CompTIA does not publish exact weightings for SecurityX. Spend the most time on Domains 2 and 3 as they cover the broadest operational and technical ground.

// SecurityX vs Security+

SecurityX is not just a harder version of Security+. The exam style, scope, and expected depth are fundamentally different.

Security+ SY0-701SecurityX CAS-005
LevelIntermediateExpert
Duration90 minutes165 minutes
FocusWhat security concepts are and how they workHow to architect, implement, and justify security decisions
Question styleSelect the correct answerSelect the BEST answer given constraints � business context matters
Expected roleJunior/mid security analyst, sysadminSenior security engineer, architect, manager
Business contextMinimalHeavy � budget, risk appetite, competing priorities
Depth requiredKnow conceptsKnow the WHY � trade-offs, limitations, alternatives

// Domain 1 � Security Architecture (~25%)

Enterprise architecture frameworks

FrameworkPurpose
TOGAFEnterprise architecture framework � business, data, application, technology layers
SABSASecurity architecture framework aligned to business risk
NIST SP 800-53Security and privacy controls catalogue for US federal systems � widely adopted
NIST SP 800-37Risk Management Framework (RMF) � categorise, select, implement, assess, authorise, monitor
Zero Trust Architecture (NIST SP 800-207)Formal definition of ZTA � no implicit trust based on network location

Security architecture patterns

PatternConcept
Defence in depthMultiple layers of controls � compromise of one layer doesn't lead to full compromise
Least privilegeMinimum permissions required to perform a function � limit blast radius of compromise
Separation of dutiesNo single person can complete a critical process alone � prevents fraud and error
Fail secureDefault to a secure state on failure � a firewall that fails should block, not allow all
Secure by designSecurity built into architecture from the start � not bolted on afterwards
Resilience by designSystems designed to continue operating through partial failure � redundancy, failover

Hybrid and cloud architecture

TopicKey points
Shared responsibility modelKnow exactly what the CSP secures vs what you must secure for IaaS/PaaS/SaaS � exam will test the boundaries
CASBProxy between users and cloud services � visibility, DLP, access control for SaaS
CSPMCloud Security Posture Management � continuous compliance monitoring for misconfigurations in cloud environments
CWPPCloud Workload Protection Platform � runtime security for VMs, containers, serverless
Container securityImage scanning, runtime protection, pod security policies (Kubernetes), least privilege for container runtimes

// Domain 2 � Security Operations (~33%)

Threat intelligence

ConceptDefinition
Strategic intelligenceHigh-level, long-term � nation-state actors, industry trends, geopolitical risk. For executives.
Operational intelligenceSpecific campaigns and attacker tooling in use now. For security managers planning defences.
Tactical intelligenceTTPs � how attackers operate. For detection engineers and SOC.
Technical intelligenceIOCs � IPs, hashes, domains. For immediate blocking. Short shelf life.
STIX / TAXIISTIX = structured format for sharing threat intelligence. TAXII = transport protocol for sharing STIX.
ISACsInformation Sharing and Analysis Centres � sector-specific (FS-ISAC, MS-ISAC) threat sharing communities

Advanced threat hunting

ConceptDefinition
Hypothesis-driven huntingStart with an assumption ("I believe attacker X is using living-off-the-land binaries") and hunt for evidence
IOC-based huntingStart with known bad (IP, hash, domain) and search logs for matching activity
TTP-based huntingHunt based on adversary behaviour (MITRE ATT&CK technique) � more robust than IOC as TTPs change slowly
Pyramid of PainHash ? IP ? Domain ? Network/Host artefacts ? TTPs � higher up the pyramid, more costly for attacker to change
Living off the Land (LotL)Attackers use built-in OS tools (PowerShell, WMI, certutil) to avoid detection � harder to detect than custom malware

Vulnerability research and pen testing

TermDefinition
Black boxNo prior knowledge of the target � simulates external attacker
White boxFull knowledge � source code, architecture diagrams, credentials. Most thorough.
Grey boxPartial knowledge � simulates an attacker who has done some recon or has stolen credentials
Red teamFull adversary simulation over extended period � tests detection and response, not just technical controls
Purple teamRed and blue team work together � attackers share TTPs so defenders can tune detection in real time
Bug bountyCrowdsourced vulnerability disclosure programme � researchers paid for valid findings

// Domain 3 � Security Engineering (~30%)

Cryptography � advanced

TopicKey points
PKIHierarchy of CAs. Root CA (offline), Intermediate CA, issuing CA. Certificate contains public key + identity. CRL and OCSP for revocation.
Perfect Forward Secrecy (PFS)Ephemeral keys per session � compromise of the server's long-term key doesn't decrypt past sessions. Requires ECDHE or DHE key exchange.
Homomorphic encryptionCompute on encrypted data without decrypting � enables privacy-preserving cloud analytics
Quantum computing threatShor's algorithm breaks RSA and ECC. Post-quantum cryptography (CRYSTALS-Kyber, CRYSTALS-Dilithium) being standardised by NIST.
Crypto agilityDesign systems to swap cryptographic algorithms without architectural redesign � essential as quantum threats mature
HSMHardware Security Module � tamper-resistant hardware for key generation and storage. Private keys never leave the HSM in plaintext.

Secure software development

TopicKey points
SSDLCSecure Software Development Lifecycle � security activities at every phase: requirements, design, implementation, testing, deployment
Threat modellingSTRIDE (Spoofing, Tampering, Repudiation, Information Disclosure, DoS, Elevation of Privilege) � identify threats during design phase
SASTStatic Application Security Testing � analysis of source code without execution. Finds code-level flaws early.
DASTDynamic Application Security Testing � testing running application from outside. Finds runtime and environment issues.
IASTInteractive AST � agent-based, monitors application behaviour during testing. Combines SAST and DAST benefits.
DevSecOpsSecurity integrated into CI/CD pipeline � automated scanning on every commit, security gates before deployment

// Domain 4 � Governance, Risk & Compliance (~12%)

Enterprise risk management

At SecurityX level, risk is evaluated in business terms � not just technical likelihood/impact. You must be able to justify security investment, communicate risk to executives, and make trade-off decisions.

ConceptDefinition
Risk appetiteThe amount of risk an organisation is willing to accept to achieve its objectives � set by the board
Risk toleranceThe acceptable deviation from the risk appetite � operational boundaries within which risk is managed
Residual riskRisk remaining after controls are applied � should be within risk appetite
Inherent riskRisk before any controls are applied
Third-party riskRisk introduced by suppliers, vendors, and partners � supply chain attacks exploit weak third-party security
BIABusiness Impact Analysis � identifies critical systems, RTOs, RPOs, and financial impact of downtime
RTORecovery Time Objective � maximum acceptable time to restore a system after failure
RPORecovery Point Objective � maximum acceptable data loss measured in time

Privacy and data governance

ConceptDefinition
Data classificationCategorising data by sensitivity (Public, Internal, Confidential, Restricted) to apply appropriate controls
Data sovereigntyData is subject to the laws of the country where it resides � relevant for cloud data placement decisions
Privacy by designPrivacy built into systems from the start � GDPR principle, data minimisation, purpose limitation
Data retentionPolicies defining how long data is kept and when it must be securely destroyed
DPOData Protection Officer � required by GDPR for certain organisations, oversees data protection compliance

// Advanced Concepts to Know

TopicWhat to know
Supply chain securitySolarWinds / XZ Utils-style attacks � software build pipeline compromise, signed malicious updates, vendor assessment
MITRE ATT&CKTactics (why) ? Techniques (how) ? Sub-techniques (specifics). Use for detection gap analysis and red team planning.
MITRE D3FENDDefensive counterpart to ATT&CK � maps defensive techniques to attacker techniques
SOARAutomates repetitive SOC tasks using playbooks � ticket enrichment, IOC lookups, auto-containment
Deception technologyHoneypots, honeytokens, honey credentials � detect attackers who reach internal systems by interacting with fake assets
UEBABaseline normal behaviour for users and entities � alert on statistical deviations (impossible travel, data exfiltration spikes)
Secure enclaves / TEETrusted Execution Environment � isolated secure area of processor for sensitive computation. Intel SGX, ARM TrustZone.

// Exam Tips

Business context changes the right answer. SecurityX questions often include budget constraints, regulatory requirements, or organisational politics. A technically perfect control may not be the right answer if it's too expensive, breaks compliance, or requires skills the team doesn't have. Factor in the constraints.

You have 165 minutes � use it. SecurityX scenarios are long and require careful reading. Don't rush. Eliminate clearly wrong answers, then reason through the remaining options based on the scenario context.

Read the Jason Dion or Mike Chapple study materials. The CompTIA SecurityX official study guide covers the objectives in depth. Practice questions are essential � the exam style is significantly different from Security+ and requires practice to get comfortable with.

Don't underestimate it. CAS-005 has a higher failure rate than Security+. If you haven't worked in a senior security role, the practical scenarios may be unfamiliar. Lab experience and real-world exposure matter more here than rote memorisation.