Certified Security Principles (CSP)
The Certified Security Principles (CSP) course provides a solid foundation in information security.
You will learn essential concepts such as risk management, identity and access management, cryptography, data security, server and application security, and mobile/IoT security.
This broad-based course is designed to prepare you for more advanced security, management, and auditing career paths.
Prepares for this certification
This training prepares you for the official Mile2 CSP certification exam.
Description
The CSP course is a foundational information security course and is highly recommended before advancing into the 300-level courses in the Management, Response & Recovery, or Auditing career paths.
This course introduces students to core security principles such as the CIA Triad, governance, risk & compliance, cryptography, identity & access management, data security, server/host security, application security, and mobile/IoT security.
In addition, you will gain insight into daily security operations, incident response, business continuity basics, and the importance of compliance and auditing.
Objectives
Upon completing this course, you will be able to:
- Understand and explain the core principles of information security and the CIA Triad
- Identify risks, threats, and vulnerabilities within an organization
- Understand governance, risk, and compliance concepts
- Explain key cryptographic concepts including symmetric and asymmetric encryption, hashing, and PKI
- Apply basic identity and access management principles and authentication techniques
- Understand data protection, storage security, and encryption options
- Explain server and host security concepts including operating system hardening
- Recognize application security principles and common web vulnerabilities (OWASP Top 10)
- Understand mobile and IoT security risks and hardening techniques
- Support day-to-day security operations, incident response, and business continuity basics
- Explain the importance of compliance, assurance frameworks, and auditing
Target audience
This course is ideal for:
- IT Professionals
- Server Administrators
- Virtualization and Cloud Administrators
- Security Officers and IT Managers
- Entry-level security professionals
- Anyone seeking a strong foundation in information security
Course Modules
- Course Introduction
- Module 1 – Introduction to IT Security
- Understanding Security
- Responsibilities
- Building a Security Program
- CIA Triad
- Governance, Risk, Compliance
- State of Security Today
- Module 2 – Risk Management
- Risk Management
- Risk Assessment
- Types of Risk, Threats and Vulnerabilities
- Mitigating Attacks
- Discovering Vulnerabilities and Threats
- Responding to Risk
- Module 3 – Understanding of Cryptography
- Understanding Cryptography
- Symmetric Encryption
- Asymmetric Encryption
- Hashing
- PKI
- Cryptography in Use
- Module 4 – Understanding Identity and Access Management
- Identity Management
- Authentication Techniques
- Single Sign-on
- Access Control Monitoring
- Module 5 – Managing Data Security
- Virtualization Principles
- Key Components Mapped to Cloud Layer
- Key Security Concerns
- Other Technologies Used in the Cloud
- The Layers
- Relevant CCM Controls
- Module 6 – Data Security
- Different Types of Storage
- Encryption Options
- Data Management
- Module 7 – Managing Server/Host Security
- The Operating Systems
- Hardening the OS
- Physical Security
- Virtualization and Cloud Technologies
- Module 8 – Application Security for Non-Developers
- Application Security Principle
- Software Development Life Cycle
- OWASP Top 10
- Hardening Web Applications
- Patch/Update/Configuration Management
- Module 9 – Understanding Mobile Device Security (IoT)
- What Devices are we talking about?
- What is the risk?
- Hardening Mobile/IoT Devices
- Corporate Management
- Module 10 – Managing Day to Day Security
- Company Responsibilities
- Product Management
- Business Continuity Basics
- Incident Response
- Why Train?
- Module 11 – Understanding Compliance and Auditing
- Benefits of Compliance
- Assurance Frameworks
- What is Auditing
Prerequisites
No formal prerequisites are required, but one of the following is recommended:
- Approximately 12 months of server administration experience
- Previous Mile2 training such as CSA1, CSA2, CHT, COST, and/or CNP
- Equivalent knowledge through practical experience
Course Materials
You receive:
- Student Guide (digital course book)
- Hands-on lab workbook (when applicable)
- Practice questions with answers to prepare for the exam
- Reference materials and security overview charts
- Access to the Mile2 learning platform

