CompTIA Advanced Security Practitioner CASP Exam CAS003

Preparatory course for the exam CAS-003
CompTIA Advanced Security Practitioner CASP Exam CAS003
File Size :
2.33 GB
Total length :
12h 1m



Stone River eLearning


Last update




CompTIA Advanced Security Practitioner CASP Exam CAS003

What you’ll learn

After successfully completing this course, the students will be able to pass the exam CompTIA Advanced Security Practitioner (CASP)
The CompTIA Advanced Security Practitioner certification is an international, vendor-neutral exam that proves competency in enterprise security; risk management; research and analysis; and integration of computing, communications, and business disciplines.
The exam covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers.

CompTIA Advanced Security Practitioner CASP Exam CAS003


There is no required prerequisite for this course however, the CASP certification is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus at the enterprise level.
We recommend that students have a minimum of ten years of experience in IT administration, including at least five years of hands-on technical security experience.


The CompTIA Advanced Security Practitioner course is a preparatory course for the exam CAS-003 conducted by The Computing Technology Industry Association (CompTIA). It covers the exam topics in detail and prepares the students in the areas of risk management; enterprise security operations and architecture; research and collaboration; and integration of enterprise security.This certification course covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers, while managing risk.


Section 1: Course Introduction

Lecture 1 Course Introduction

Lecture 2 Instructor Introduction

Section 2: Chapter 01 – Understanding Risk Management

Lecture 3 Chapter Introdcution

Lecture 4 Topic A: Understanding Business and Industry Influences

Lecture 5 Ongoing Risk Management

Lecture 6 New Products and User Behaviors

Lecture 7 Business Models and Strategies

Lecture 8 Cloud Technologies

Lecture 9 Acquisitions and Mergers

Lecture 10 Due Diligence Team

Lecture 11 Data Ownership

Lecture 12 Data Reclassification

Lecture 13 Integrating Diverse Industries

Lecture 14 Common Regulations

Lecture 15 Geographic Differences

Lecture 16 Data Sovereignty

Lecture 17 Internal and External Influences

Lecture 18 De-perimeterization

Lecture 19 Understand Changes in Network Boundaries

Lecture 20 Topic B: Policies and Procedures

Lecture 21 Understanding Policies and Procedures

Lecture 22 Policy Life Cycle

Lecture 23 Process Life Cycle

Lecture 24 Reviewing Policies and Processes

Lecture 25 Common Business Documents

Lecture 26 Security for Contracts

Lecture 27 Contract Requirements

Lecture 28 General Privacy Principles

Lecture 29 Standard Security Practices

Lecture 30 Demo – Examining Security Policies

Lecture 31 Topic C: Risk Mitigation and Control

Lecture 32 Introduction to Risk Mitigation

Lecture 33 Categorizing Data

Lecture 34 Incorporating Stakeholder Input

Lecture 35 Aggregate CIA Scores

Lecture 36 Selecting and Implementing Controls

Lecture 37 Security Control Frameworks

Lecture 38 Options for Frameworks

Lecture 39 Extreme Scenario Planning

Lecture 40 System-Specific Risk Analysis

Lecture 41 Qualitative Risk Analysis

Lecture 42 Quantitative Risk Analysis

Lecture 43 Risk Impact

Lecture 44 Likelihood of Threat

Lecture 45 Return on Investment

Lecture 46 Understanding Payback

Lecture 47 Total Cost of Ownership

Lecture 48 TCO Guidelines

Lecture 49 Translate to Business Terms

Lecture 50 Risk Management Strategies

Lecture 51 Risk Management Processes

Lecture 52 Information and Asset Value and Costs

Lecture 53 Vulnerabilities and Threat Identification

Lecture 54 Additional Factors

Lecture 55 Topic D: Business Continuity Planning

Lecture 56 Continuity Planning

Lecture 57 BCP Components

Lecture 58 BCP Steps

Lecture 59 Additional Plans

Lecture 60 Conducting Business Impact Analysis

Lecture 61 Chapter 01 Review

Section 3: Chapter 02 – Network and Security Components and Architecture

Lecture 62 Chapter Introdcution

Lecture 63 Topic A: Physical and Virtual Network Security Devices

Lecture 64 Unified Threat Management

Lecture 65 Analyzing UTM

Lecture 66 Intrusion Detection and Prevention

Lecture 67 In-Line Network Encryptor

Lecture 68 Network Access Control

Lecture 69 SIEM

Lecture 70 Firewalls

Lecture 71 Firewall Architecture

Lecture 72 Wireless Controller

Lecture 73 Routers and Switches

Lecture 74 Proxy Servers

Lecture 75 Topic B: Application and Protocol Level Security

Lecture 76 Web Application Firewalls

Lecture 77 Hardware Security Modules

Lecture 78 Vulnerability Scanners

Lecture 79 Topic C: Advanced Network Design

Lecture 80 Virtual Private Networks

Lecture 81 VPN Protocols

Lecture 82 IP Security (IPSec)

Lecture 83 IPSec Modes

Lecture 84 Demo – Examining IPSec Policies

Lecture 85 Secure Sockets Layer (SSL)

Lecture 86 Transport Layer Security (TLS

Lecture 87 Additional Security Protocols

Lecture 88 Authentication Protocols

Lecture 89 Topic D: Network Solutions for Data Flow

Lecture 90 Data Loss Prevention

Lecture 91 Data Flow Enforcement

Lecture 92 Network Flow

Lecture 93 Topic E: Secure Baselines of Networking and Security Components

Lecture 94 Securing Device Configurations

Lecture 95 Access Control Lists (ACLs)

Lecture 96 ACL Rule Sets

Lecture 97 Change Monitoring

Lecture 98 Configuration Lockdown

Lecture 99 Availability Controls

Lecture 100 Disk Availability

Lecture 101 Key Availability Terms

Lecture 102 Topic F: Advanced Configuration of Network Devices

Lecture 103 Additional Configurations

Lecture 104 Transport Security

Lecture 105 Trunking Security

Lecture 106 Port Security

Lecture 107 Ports and Sockets

Lecture 108 Security Zones

Lecture 109 Network Segmentation

Lecture 110 Network Access Control

Lecture 111 NAC Concepts

Lecture 112 Network Enabled Devices

Lecture 113 Automation Systems

Lecture 114 Physical Security

Lecture 115 Chapter 02 Review

Section 4: Chapter 03 – Implementing Advanced Authentication and Cryptographic Techniques

Lecture 116 Chapter Introdcution

Lecture 117 Topic A: Understanding Authentication and Authorization Concepts

Lecture 118 Authentication

Lecture 119 The Importance of Identity

Lecture 120 Additional Password Options

Lecture 121 Demo – Enforcing Strong Passwords

Lecture 122 Biometric Authentication

Lecture 123 Biometric Considerations

Lecture 124 Beyond Single Factor

Lecture 125 Certificate Authentication

Lecture 126 Authorization

Lecture 127 Open Authorization

Lecture 128 XACML

Lecture 129 SPML

Lecture 130 Authorization Concepts

Lecture 131 Trust Models

Lecture 132 Topic B: Cryptographic Techniques

Lecture 133 Introduction to Cryptography

Lecture 134 Cryptographic Techniques

Lecture 135 Key Stretching

Lecture 136 Hashing

Lecture 137 Message Digest (MD) Algorithms

Lecture 138 Secure Hash Algorithm (SHA)

Lecture 139 Digital Signatures

Lecture 140 Message Authentication

Lecture 141 Code Signing

Lecture 142 Additional Concepts

Lecture 143 Protecting Data in Transit

Lecture 144 Protecting Data in Memory

Lecture 145 Protecting Data at Rest

Lecture 146 Symmetric Algorithms

Lecture 147 Asymmetric Algorithms

Lecture 148 Encryption Methods

Lecture 149 Topic C: Cryptographic Implementations

Lecture 150 Crypto Options

Lecture 151 Additional Crypto Options

Lecture 152 Cryptographic Applications

Lecture 153 Crypto Considerations

Lecture 154 Stream vs. Block Ciphers

Lecture 155 Block Cipher Modes

Lecture 156 Public Key Infrastructure

Lecture 157 Primary PKI Functions

Lecture 158 Additional PKI Concepts

Lecture 159 Chapter 03 Review

Section 5: Chapter 04 – Implementing Security for Systems, Applications, and Storage

Lecture 160 Chapter Introdcution

Lecture 161 Topic A: Security for Host Devices

Lecture 162 Trusted OS

Lecture 163 Trusted OS Options

Lecture 164 Security Software

Lecture 165 Additional Host-Based Software Options

Lecture 166 Demo – Configuring a Host-Based Firewall

Lecture 167 Auditing

Lecture 168 Demo – Configuring Audit Policies

Lecture 169 Endpoint Detection Response

Lecture 170 Host Hardening

Lecture 171 Group Policy

Lecture 172 Demo – Configuring Group Policy Security

Lecture 173 Command Shell Restrictions

Lecture 174 Out-of-Band Management

Lecture 175 Dedicated Interfaces

Lecture 176 External I/O Restrictions

Lecture 177 Wireless Technologies

Lecture 178 Wi-Fi Components

Lecture 179 802.11 Standards

Lecture 180 Wireless Security

Lecture 181 Securing Other Host Devices

Lecture 182 Boot Security

Lecture 183 Additional Boot Security Options

Lecture 184 Topic B: Mobile Device Security

Lecture 185 Enterprise Mobility Management

Lecture 186 MDM Concepts

Lecture 187 Management Options

Lecture 188 Context Aware Management

Lecture 189 Security and Privacy

Lecture 190 Physical Security Options

Lecture 191 Additional Mobile Device Concepts

Lecture 192 Authentication Options

Lecture 193 Mobile Devices

Lecture 194 Wearable Security Implications

Lecture 195 Topic C: Software Security Controls

Lecture 196 Application Security Design Considerations

Lecture 197 Application Issues

Lecture 198 Application Issues conti…

Lecture 199 Data Remnants

Lecture 200 Securing Applications

Lecture 201 Using JSON and REST

Lecture 202 Browser Extensions

Lecture 203 Application Vulnerabilities

Lecture 204 Chapter 04 Review

Section 6: Chapter 05 – Implementing Security for Cloud and Virtualization Technologies

Lecture 205 Chapter Introduction

Lecture 206 Topic A: Cloud and Virtualization Technology

Lecture 207 Cloud Computing and Virtualization

Lecture 208 Cloud Options

Lecture 209 Security Considerations

Lecture 210 Cloud Service Models

Lecture 211 Demo – Examining Cloud Service Models

Lecture 212 Security and Virtualization

Lecture 213 Cloud-Augmented Security Services

Lecture 214 Security as a Service

Lecture 215 Virtualization Vulnerabilities

Lecture 216 Topic B: Securing Remote Access and Collaboration

Lecture 217 Remote Access

Lecture 218 Dial-Up Access

Lecture 219 Virtual Private Networks

Lecture 220 Remote Access Purposes

Lecture 221 Security Considerations

Lecture 222 Unified Collaboration Tools

Lecture 223 Web Conferencing

Lecture 224 Video Conferencing

Lecture 225 Storage and Document Collaboration

Lecture 226 Unified Communication

Lecture 227 Instant Messaging

Lecture 228 Presence

Lecture 229 E-Mail

Lecture 230 Chapter 05 Review

Section 7: Chapter 06 – Utilizing Security Assessments and Incident Response

Lecture 231 Chapter Introduction

Lecture 232 Topic A: Security Assessments

Lecture 233 Importance of Security Assessments

Lecture 234 Malware Sandboxing

Lecture 235 Memory Dumping

Lecture 236 Runtime Debugging

Lecture 237 Reconnaissance

Lecture 238 Fingerprinting

Lecture 239 Code Review

Lecture 240 Social Engineering

Lecture 241 Public Information

Lecture 242 Demo – Accessing Public Information

Lecture 243 Penetration Test

Lecture 244 Vulnerability Assessment

Lecture 245 Assessment Styles

Lecture 246 Topic B: Security Assessment Tools

Lecture 247 Network Tool Types

Lecture 248 Security Content Automation Protocol (SCAP)

Lecture 249 Common Vulnerability Scoring System (CVSS)

Lecture 250 Fuzzing

Lecture 251 Exploit Kits

Lecture 252 Host Tools

Lecture 253 Additional Host Tools

Lecture 254 Physical Security Tools

Lecture 255 Topic C: Incident Response and Recovery

Lecture 256 E-discovery

Lecture 257 Data Breach

Lecture 258 Incident Response Process

Lecture 259 Chapter 06 Review

Lecture 260 Course Closure

An IT security professional who has a minimum of 10 years of experience in IT administration including at least 5 years of hands-on technical security experience.,IT professionals aiming to move into a specialist security position such as a risk manager or analyst, security architect, or penetration tester/ethical Hacker.,Cyber Security / IS Professional, Information Security Analyst, Security Architect, IT Specialist INFOSEC, IT Specialist, Cybersecurity, Cybersecurity Risk Manager, Cybersecurity Risk Analyst.

Course Information:

Udemy | English | 12h 1m | 2.33 GB
Created by: Stone River eLearning

You Can See More Courses in the IT & Software >> Greetings from

New Courses

Scroll to Top