CompTIA Advanced Security Practitioner (CASP) CAS-003

Pearson presents CompTIA Advanced Security Practitioner (CASP) CAS-003.

CompTIA Advanced Security Practitioner (CASP) CAS-003

Course Description

The CompTIA Advanced Security Practitioner (CASP) CAS-003 Complete Video Course from Pearson is an engaging, self-paced video training solution that provides learners with 18 hours of personal, visual instruction from expert trainer Michael J. Shannon. Through the use of topic-focused instructional videos, you will gain an in-depth understanding of each objective in the CompTIA CASP CAS-300 exam as well as a deeper understanding of advanced security principles. This title from Pearson covers every key topic in the exam, including risk management, enterprise security architecture, enterprise security operations, technical integration of enterprise security, research, development, and collaboration. Michael Shannon also includes demos throughout the training so you can see first hand how to approach real-world security problems. T... Read More »

The CompTIA Advanced Security Practitioner (CASP) CAS-003 Complete Video Course from Pearson is an engaging, self-paced video training solution that provides learners with 18 hours of personal, visual instruction from expert trainer Michael J. Shannon. Through the use of topic-focused instructional videos, you will gain an in-depth understanding of each objective in the CompTIA CASP CAS-300 exam as well as a deeper understanding of advanced security principles.

This title from Pearson covers every key topic in the exam, including risk management, enterprise security architecture, enterprise security operations, technical integration of enterprise security, research, development, and collaboration. Michael Shannon also includes demos throughout the training so you can see first hand how to approach real-world security problems. This is the perfect training solution to learn all of the advanced security topics that appear on the test and real security knowledge and skills to help you do your work as a security practitioner. Full of live trainer discussions, hands-on demos, lightboard elaborations, and deep-dive discussions, this course covers security in a way that is easy to access and even fun.

In addition to covering every objective in the CompTIA CASP CAS-003 exam this title includes a full practice exam, module quizzes so you can test yourself throughout your training, and hands-on performance-based exercises so you have everything you need.

You will learn how to:

  • Integrate network and security components, concepts, and architectures
  • Integrate security controls for host devices
  • Integrate controls for mobile and small form factor devices
  • Select software security controls
  • Conduct security assessments
  • Select the proper security assessment tools
  • Implement incident response and recovery
  • Integrate hosts, storage, and applications in the enterprise
  • Integrate cloud and virtualization technologies in the enterprise
  • Integrate and troubleshoot advanced AAA technologies
  • Implement cryptographic techniques
  • Secure communication and collaboration solutions
  • Apply research methods for trend and impact analysis
  • Implement security activities across the technology lifecycle
  • Interact across diverse business units
Read Less
Course Details:

Target Audience

  • IT security professionals who have a minimum of 10 years of experience in IT administration, including at least 5 years of hands-on technical security experience
  • Systems/network/application security professionals who are preparing for the CASP exam
  • Any IT professional who wants to gain an advanced understanding of how to secure modern enterprises beyond the Security+ or SSCP certifications

Prerequisites

  • Recommended prerequisites: CompTIA Network+, Security+, CSA+, or equivalent experience
Certificate Info:

Type of Certification

Certificate of Completion

Format of Certification

Digital and Print

Professional Association/Affiliation

This certificate is issued by Pearson LearnIT

Method of Obtaining Certification

Upon successful completion of the course, participants will receive a certificate of completion.

Course Outline

  • CASP: Introduction
  • Learning objectives
  • 1.1 Risk Management of New Initiatives
  • 1.2 Business and Industry Policies
  • 1.3 Internal and External Infuencers
  • 1.4 Impacts of De-perimiterization
  • Learning objectives
  • 2.1 Policy and Process Life Cycle Management
  • 2.2 Partnering with HR, Legal and the C-Suite
  • 2.3 Common Business Documentation
  • 2.4 Security Requirements for Contracts
  • 2.5 General Principles for Sensitive Information
  • 2.6 Developing Standard Policies and Security Practices
  • Learning objectives
  • 3.1 CIA-based Decisions and Organisation
  • 3.2 System-specific Worst-case Analysis
  • 3.3 Risk Determination
  • 3.4 Translating Risk into Business Terms
  • 3.5 Risk Treatment
  • 3.6 Risk Management Process: Overview
  • 3.7 Risk Management Process: OCTAVE and ISO/IEC 31000:2009 Methodologies
  • 3.8 Risk Management Process: Key Terminology
  • 3.9 Business Continuity Planning
  • 3.10 IT Governance and Frameworks
  • 3.11 Enterprise and Resilience and Continual Improvements
  • Learning objectives
  • 4.1 Reviewing Control Effectiveness
  • 4.2 Reverse Engineering and Deconstruction
  • 4.3 Collecting and Analyzing Metrics
  • 4.4 Prototypes, Benchmarks, and Baselines
  • 4.5 Analyzing Cyber Defense Trends
  • 4.6 Analyzing Solution Metrics for Business Needs
  • 4.7 Analyzing Solution Metrics for Business Needs: Cisco and Palo Alto Solutions
  • Learning objectives
  • 5.1 Physical and Virtual Network and Security Devices: Switches, Routers, and Firewalls
  • 5.2 Physical and Virtual Network and Security Devices: Zone-based Policy Firewall Demo
  • 5.3 Application and Protocol-aware Technologies: PAN, WAF, DAM, NIDS/NIPS
  • 5.4 Application and Protocol-aware Technologies: WLAN Contorllers, UTM, NAP/NAC, SIEM, Load Balancers, HAIPE/INE Devices, HSMs
  • 5.5 Advanced Network Design: Cryptographic Solutions
  • 5.6 Advanced Network Design: Clientless SSL VPN Demo
  • 5.7 Advanced Network Design: Networking Solutions
  • 5.8 Complex Solutions for Data flow
  • 5.9 Secure Configuration and SDN
  • 5.10 Network Management and Monitoring Tools
  • 5.11 Advanced Configuration of Infrastructure Devices: Configuration and Zoning
  • 5.12 Advanced Configuration of Infrastructure Devices: Routing Protocol and Security Exercise
  • 5.13 Advanced Configuration of Infrastructure Devices: Network-enabled Service and System Security Concerns
  • Learning objectives
  • 6.1 Implementing Trusted O/S
  • 6.2 Endpoint Security Software
  • 6.3 Hardening Hosts: Administrative Controls
  • 6.4 Hardening Hosts: Peripheral Protection
  • 6.5 Boot Loader Protections
  • 6.6 Terminal Services and Application Delivery Services
  • Learning objectives
  • 7.1 Enterprise Mobility Management: MDM
  • 7.2 Enterprise Mobility Management: MAM
  • 7.3 Mobility Security and Privacy Concerns: Data Storage
  • 7.4 Mobility Security and Privacy Concerns: Peripherals
  • 7.5 Mobility Security and Privacy Concerns: Authentication
  • 7.6 Wearable Technology
  • Learning objectives
  • 8.1 Application Security Design Considerations
  • 8.2 Specific Application Issues: Attacks and Exploits
  • 8.3 Specific Application Issues: Common Vulnerabilities
  • 8.4 Specific Application Issues: Sandboxing and Firewalls
  • 8.5 Client-side Processing vs. Server-side Processing
  • 8.6 O/S and Firmware Vulnerabilities
  • Learning objectives
  • 9.1 Security Assessment Methods: Strategies
  • 9.2 Security Assessment Methods: Techniques
  • 9.3 Security Assessment Methods: Testing and Assessments
  • 9.4 Security Assessment Types: Exercises
  • 10.1 Scanners
  • 10.2 Additional Security Assessment Tools: Overview
  • 10.3 Additional Security Assessment Tools: Creating Phishing Campaign
  • 10.4 Types of Host Tools: Scanners and Crackers
  • 10.5 Types of Host Tools: Monitoring and Analysis
  • 10.6 Physicals Security Tools
  • Learning objectives
  • 11.1 E-discovery
  • 11.2 Data Breach Procedures
  • 11.3 Facilitating Incident Detection and Response
  • 11.4 Incident and Emergency Response
  • 11.5 Business Continuity and Disaster Recovery
  • 11.6 Incident Response Support Tools
  • 11.7 Incident or Breach Severity
  • 11.8 Post-incident Response
  • Learning objectives
  • 12.1 Adapting Data Flow Security
  • 12.2 Data Flow Security Standards
  • 12.3 Interoperability Issues
  • 12.4 Resilience Issues
  • 12.5 Data Security Considerations
  • 12.6 Resource Provisioning and De-provisioning
  • 12.7 Merger and Acquisition Design Considerations
  • 12.8 Logical Network Segmentation and Diagramming
  • 12.9 Security Issues with Enterprise Application Integration
  • Learning objectives
  • 13.1 Technical Deployment Models: Cloud/Virtualization Considerations and Hosting Options
  • 13.2 Technical Deployment Models: Cloud Service Models
  • 13.3 Pros and Cons of Virtualization
  • 13.4 Cloud Augmented Security Services
  • 13.5 Host Comingling Vulnerabilities
  • 13.6 Data Security Considerations
  • Learning objectives
  • 14.1 Authentication
  • 14.2 Authorization
  • 14.3 Attestation, Proofing and Preparation
  • 14.4 Federation Services
  • 14.5 Trust Models
  • Learning objectives
  • 15.1 Cryptographic Techniques: Hashing and Signing
  • 15.2 Cryptographic Techniques: Data Protection
  • 15.3 Cryptigraphic Techniques: Encryption in Action
  • 15.4 Implementing Cryptography: SSH and SSL/TLS
  • 15.5 Implementing Cryptography: Application and Implementation
  • 15.6 Implementing Cryptography: Certificate Services
  • Learning objectives
  • 16.1 Remote Access
  • 16.2 Unified Collaboration Tools
  • Learning objectives
  • 17.1 Ongoing Research and Threat Intelligence
  • 17.2 Emerging Tools and Global IA
  • Learning objectives
  • 18.1 Systems Development Life Cycle
  • 18.2 Software Development Life Cycle: Frameworks and Code Security
  • 18.3 Software Development Life Cycle:: Testing and Documentation
  • 18.4 Adapting Solutions for Emerging Disruptive Trends
  • 18.5 Asset Management and Inventory Control
  • Learning objectives
  • 19.1 Interpreting Data from Other Disciplines
  • 19.2 Forming Guidance, Collaboration, and Other Committees
  • CASP: Summary

DON'T HAVE TIME?

We can send you everything you need to know about this course through email.
We respect your privacy. Your information is safe and will never be shared.