CompTIA Advanced Security Practitioner CASP Exam CAS003
What you’ll learn
After successfully completing this course, the students will be able to pass the exam CompTIA Advanced Security Practitioner (CASP)
The CompTIA Advanced Security Practitioner certification is an international, vendor-neutral exam that proves competency in enterprise security; risk management; research and analysis; and integration of computing, communications, and business disciplines.
The exam covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers.
Requirements
There is no required prerequisite for this course however, the CASP certification is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus at the enterprise level.
We recommend that students have a minimum of ten years of experience in IT administration, including at least five years of hands-on technical security experience.
Description
The CompTIA Advanced Security Practitioner course is a preparatory course for the exam CAS-003 conducted by The Computing Technology Industry Association (CompTIA). It covers the exam topics in detail and prepares the students in the areas of risk management; enterprise security operations and architecture; research and collaboration; and integration of enterprise security.This certification course covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers, while managing risk.
Overview
Section 1: Course Introduction
Lecture 1 Course Introduction
Lecture 2 Instructor Introduction
Section 2: Chapter 01 – Understanding Risk Management
Lecture 3 Chapter Introdcution
Lecture 4 Topic A: Understanding Business and Industry Influences
Lecture 5 Ongoing Risk Management
Lecture 6 New Products and User Behaviors
Lecture 7 Business Models and Strategies
Lecture 8 Cloud Technologies
Lecture 9 Acquisitions and Mergers
Lecture 10 Due Diligence Team
Lecture 11 Data Ownership
Lecture 12 Data Reclassification
Lecture 13 Integrating Diverse Industries
Lecture 14 Common Regulations
Lecture 15 Geographic Differences
Lecture 16 Data Sovereignty
Lecture 17 Internal and External Influences
Lecture 18 De-perimeterization
Lecture 19 Understand Changes in Network Boundaries
Lecture 20 Topic B: Policies and Procedures
Lecture 21 Understanding Policies and Procedures
Lecture 22 Policy Life Cycle
Lecture 23 Process Life Cycle
Lecture 24 Reviewing Policies and Processes
Lecture 25 Common Business Documents
Lecture 26 Security for Contracts
Lecture 27 Contract Requirements
Lecture 28 General Privacy Principles
Lecture 29 Standard Security Practices
Lecture 30 Demo – Examining Security Policies
Lecture 31 Topic C: Risk Mitigation and Control
Lecture 32 Introduction to Risk Mitigation
Lecture 33 Categorizing Data
Lecture 34 Incorporating Stakeholder Input
Lecture 35 Aggregate CIA Scores
Lecture 36 Selecting and Implementing Controls
Lecture 37 Security Control Frameworks
Lecture 38 Options for Frameworks
Lecture 39 Extreme Scenario Planning
Lecture 40 System-Specific Risk Analysis
Lecture 41 Qualitative Risk Analysis
Lecture 42 Quantitative Risk Analysis
Lecture 43 Risk Impact
Lecture 44 Likelihood of Threat
Lecture 45 Return on Investment
Lecture 46 Understanding Payback
Lecture 47 Total Cost of Ownership
Lecture 48 TCO Guidelines
Lecture 49 Translate to Business Terms
Lecture 50 Risk Management Strategies
Lecture 51 Risk Management Processes
Lecture 52 Information and Asset Value and Costs
Lecture 53 Vulnerabilities and Threat Identification
Lecture 54 Additional Factors
Lecture 55 Topic D: Business Continuity Planning
Lecture 56 Continuity Planning
Lecture 57 BCP Components
Lecture 58 BCP Steps
Lecture 59 Additional Plans
Lecture 60 Conducting Business Impact Analysis
Lecture 61 Chapter 01 Review
Section 3: Chapter 02 – Network and Security Components and Architecture
Lecture 62 Chapter Introdcution
Lecture 63 Topic A: Physical and Virtual Network Security Devices
Lecture 64 Unified Threat Management
Lecture 65 Analyzing UTM
Lecture 66 Intrusion Detection and Prevention
Lecture 67 In-Line Network Encryptor
Lecture 68 Network Access Control
Lecture 69 SIEM
Lecture 70 Firewalls
Lecture 71 Firewall Architecture
Lecture 72 Wireless Controller
Lecture 73 Routers and Switches
Lecture 74 Proxy Servers
Lecture 75 Topic B: Application and Protocol Level Security
Lecture 76 Web Application Firewalls
Lecture 77 Hardware Security Modules
Lecture 78 Vulnerability Scanners
Lecture 79 Topic C: Advanced Network Design
Lecture 80 Virtual Private Networks
Lecture 81 VPN Protocols
Lecture 82 IP Security (IPSec)
Lecture 83 IPSec Modes
Lecture 84 Demo – Examining IPSec Policies
Lecture 85 Secure Sockets Layer (SSL)
Lecture 86 Transport Layer Security (TLS
Lecture 87 Additional Security Protocols
Lecture 88 Authentication Protocols
Lecture 89 Topic D: Network Solutions for Data Flow
Lecture 90 Data Loss Prevention
Lecture 91 Data Flow Enforcement
Lecture 92 Network Flow
Lecture 93 Topic E: Secure Baselines of Networking and Security Components
Lecture 94 Securing Device Configurations
Lecture 95 Access Control Lists (ACLs)
Lecture 96 ACL Rule Sets
Lecture 97 Change Monitoring
Lecture 98 Configuration Lockdown
Lecture 99 Availability Controls
Lecture 100 Disk Availability
Lecture 101 Key Availability Terms
Lecture 102 Topic F: Advanced Configuration of Network Devices
Lecture 103 Additional Configurations
Lecture 104 Transport Security
Lecture 105 Trunking Security
Lecture 106 Port Security
Lecture 107 Ports and Sockets
Lecture 108 Security Zones
Lecture 109 Network Segmentation
Lecture 110 Network Access Control
Lecture 111 NAC Concepts
Lecture 112 Network Enabled Devices
Lecture 113 Automation Systems
Lecture 114 Physical Security
Lecture 115 Chapter 02 Review
Section 4: Chapter 03 – Implementing Advanced Authentication and Cryptographic Techniques
Lecture 116 Chapter Introdcution
Lecture 117 Topic A: Understanding Authentication and Authorization Concepts
Lecture 118 Authentication
Lecture 119 The Importance of Identity
Lecture 120 Additional Password Options
Lecture 121 Demo – Enforcing Strong Passwords
Lecture 122 Biometric Authentication
Lecture 123 Biometric Considerations
Lecture 124 Beyond Single Factor
Lecture 125 Certificate Authentication
Lecture 126 Authorization
Lecture 127 Open Authorization
Lecture 128 XACML
Lecture 129 SPML
Lecture 130 Authorization Concepts
Lecture 131 Trust Models
Lecture 132 Topic B: Cryptographic Techniques
Lecture 133 Introduction to Cryptography
Lecture 134 Cryptographic Techniques
Lecture 135 Key Stretching
Lecture 136 Hashing
Lecture 137 Message Digest (MD) Algorithms
Lecture 138 Secure Hash Algorithm (SHA)
Lecture 139 Digital Signatures
Lecture 140 Message Authentication
Lecture 141 Code Signing
Lecture 142 Additional Concepts
Lecture 143 Protecting Data in Transit
Lecture 144 Protecting Data in Memory
Lecture 145 Protecting Data at Rest
Lecture 146 Symmetric Algorithms
Lecture 147 Asymmetric Algorithms
Lecture 148 Encryption Methods
Lecture 149 Topic C: Cryptographic Implementations
Lecture 150 Crypto Options
Lecture 151 Additional Crypto Options
Lecture 152 Cryptographic Applications
Lecture 153 Crypto Considerations
Lecture 154 Stream vs. Block Ciphers
Lecture 155 Block Cipher Modes
Lecture 156 Public Key Infrastructure
Lecture 157 Primary PKI Functions
Lecture 158 Additional PKI Concepts
Lecture 159 Chapter 03 Review
Section 5: Chapter 04 – Implementing Security for Systems, Applications, and Storage
Lecture 160 Chapter Introdcution
Lecture 161 Topic A: Security for Host Devices
Lecture 162 Trusted OS
Lecture 163 Trusted OS Options
Lecture 164 Security Software
Lecture 165 Additional Host-Based Software Options
Lecture 166 Demo – Configuring a Host-Based Firewall
Lecture 167 Auditing
Lecture 168 Demo – Configuring Audit Policies
Lecture 169 Endpoint Detection Response
Lecture 170 Host Hardening
Lecture 171 Group Policy
Lecture 172 Demo – Configuring Group Policy Security
Lecture 173 Command Shell Restrictions
Lecture 174 Out-of-Band Management
Lecture 175 Dedicated Interfaces
Lecture 176 External I/O Restrictions
Lecture 177 Wireless Technologies
Lecture 178 Wi-Fi Components
Lecture 179 802.11 Standards
Lecture 180 Wireless Security
Lecture 181 Securing Other Host Devices
Lecture 182 Boot Security
Lecture 183 Additional Boot Security Options
Lecture 184 Topic B: Mobile Device Security
Lecture 185 Enterprise Mobility Management
Lecture 186 MDM Concepts
Lecture 187 Management Options
Lecture 188 Context Aware Management
Lecture 189 Security and Privacy
Lecture 190 Physical Security Options
Lecture 191 Additional Mobile Device Concepts
Lecture 192 Authentication Options
Lecture 193 Mobile Devices
Lecture 194 Wearable Security Implications
Lecture 195 Topic C: Software Security Controls
Lecture 196 Application Security Design Considerations
Lecture 197 Application Issues
Lecture 198 Application Issues conti…
Lecture 199 Data Remnants
Lecture 200 Securing Applications
Lecture 201 Using JSON and REST
Lecture 202 Browser Extensions
Lecture 203 Application Vulnerabilities
Lecture 204 Chapter 04 Review
Section 6: Chapter 05 – Implementing Security for Cloud and Virtualization Technologies
Lecture 205 Chapter Introduction
Lecture 206 Topic A: Cloud and Virtualization Technology
Lecture 207 Cloud Computing and Virtualization
Lecture 208 Cloud Options
Lecture 209 Security Considerations
Lecture 210 Cloud Service Models
Lecture 211 Demo – Examining Cloud Service Models
Lecture 212 Security and Virtualization
Lecture 213 Cloud-Augmented Security Services
Lecture 214 Security as a Service
Lecture 215 Virtualization Vulnerabilities
Lecture 216 Topic B: Securing Remote Access and Collaboration
Lecture 217 Remote Access
Lecture 218 Dial-Up Access
Lecture 219 Virtual Private Networks
Lecture 220 Remote Access Purposes
Lecture 221 Security Considerations
Lecture 222 Unified Collaboration Tools
Lecture 223 Web Conferencing
Lecture 224 Video Conferencing
Lecture 225 Storage and Document Collaboration
Lecture 226 Unified Communication
Lecture 227 Instant Messaging
Lecture 228 Presence
Lecture 229 E-Mail
Lecture 230 Chapter 05 Review
Section 7: Chapter 06 – Utilizing Security Assessments and Incident Response
Lecture 231 Chapter Introduction
Lecture 232 Topic A: Security Assessments
Lecture 233 Importance of Security Assessments
Lecture 234 Malware Sandboxing
Lecture 235 Memory Dumping
Lecture 236 Runtime Debugging
Lecture 237 Reconnaissance
Lecture 238 Fingerprinting
Lecture 239 Code Review
Lecture 240 Social Engineering
Lecture 241 Public Information
Lecture 242 Demo – Accessing Public Information
Lecture 243 Penetration Test
Lecture 244 Vulnerability Assessment
Lecture 245 Assessment Styles
Lecture 246 Topic B: Security Assessment Tools
Lecture 247 Network Tool Types
Lecture 248 Security Content Automation Protocol (SCAP)
Lecture 249 Common Vulnerability Scoring System (CVSS)
Lecture 250 Fuzzing
Lecture 251 Exploit Kits
Lecture 252 Host Tools
Lecture 253 Additional Host Tools
Lecture 254 Physical Security Tools
Lecture 255 Topic C: Incident Response and Recovery
Lecture 256 E-discovery
Lecture 257 Data Breach
Lecture 258 Incident Response Process
Lecture 259 Chapter 06 Review
Lecture 260 Course Closure
An IT security professional who has a minimum of 10 years of experience in IT administration including at least 5 years of hands-on technical security experience.,IT professionals aiming to move into a specialist security position such as a risk manager or analyst, security architect, or penetration tester/ethical Hacker.,Cyber Security / IS Professional, Information Security Analyst, Security Architect, IT Specialist INFOSEC, IT Specialist, Cybersecurity, Cybersecurity Risk Manager, Cybersecurity Risk Analyst.
Course Information:
Udemy | English | 12h 1m | 2.33 GB
Created by: Stone River eLearning
You Can See More Courses in the IT & Software >> Greetings from CourseDown.com