Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Comptia Advanced Security Practitioner (Casp)

    Posted By: ELK1nG
    Comptia Advanced Security Practitioner (Casp)

    Comptia Advanced Security Practitioner (Casp)
    Last updated 12/2016
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 1.72 GB | Duration: 7h 58m

    Gain the CyberSecurity Skills

    What you'll learn
    This course will prepare you to pass the exam CompTIA Advanced Security Practitioner (CASP)
    The CompTIA Advanced Security Practitioner certification is an international, vendor-neutral exam that proves competency in enterprise security; risk management; research and analysis; and integration of computing, communications, and business disciplines.
    The exam covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers.
    Requirements
    Ten years of IT administration experience, including at least five years of hands-on technical security experience
    CompTIA Security + Certification or equivalent experience
    Description
    CompTIA's CASP - CompTIA Advanced Security Practitioner , is a vendor-neutral certification that validates IT professionals with advanced-level security skills and knowledge. This certification course covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers, while managing risk.
    There is no required prerequisite for this course however, the CASP certification is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus at the enterprise level.
    This CASP training course follows the CompTIA authorized objectives, ensuring you receive the training and knowledge needed to succeed.

    Overview

    Section 1: Introduction

    Lecture 1 Course Introduction

    Section 2: Business Influences and Associated Security Risks

    Lecture 2 Introduction

    Lecture 3 Risk Management

    Lecture 4 Business Model Strategies

    Lecture 5 Integrating Diverse Industries

    Lecture 6 Third Party Information Security and Providers

    Lecture 7 Internal and External Influences

    Lecture 8 Impact of De-Perimeterization

    Section 3: Risk Mitigation Planning - Strategies and Controls

    Lecture 9 Introduction

    Lecture 10 CIA Triad

    Lecture 11 Business Classifications

    Lecture 12 Information Life Cycle and Steak-Holder Input

    Lecture 13 Implementing Technical Controls

    Lecture 14 Determine Aggregate CIA Score

    Lecture 15 Worst Case Scenario Planning

    Lecture 16 Calculation Tools and Attacker Motivation

    Lecture 17 Return Of Investment

    Lecture 18 Total Cost of Ownership and Risk Strategies

    Lecture 19 Risk Management Process

    Lecture 20 Identifying Vulnerabilities and Threats

    Lecture 21 Security Architecture Frameworks

    Lecture 22 Business Continuity Planning

    Lecture 23 IT Governance

    Lecture 24 Security Policies

    Section 4: Security-Privacy Policies and Procedures

    Lecture 25 Introduction

    Lecture 26 Security-Privacy Policies and Procedures

    Lecture 27 Policy Development Updates

    Lecture 28 Developing Processes and Procedures

    Lecture 29 Legal Compliance Part1

    Lecture 30 Legal Compliance Part2

    Lecture 31 Security Policy Business Documents

    Lecture 32 Outage Impact and Estimating Downtime Terms

    Lecture 33 Sensitive Information-Internal Security Policies

    Lecture 34 Incident Response Process

    Lecture 35 Forensic Tasks

    Lecture 36 Employment and Termination Procedures

    Lecture 37 Network Auditing

    Section 5: Incident Response and Recovery Procedures

    Lecture 38 Introduction

    Lecture 39 E-Discovery and Data Retention Policies

    Lecture 40 Data Recovery-Storage and Backup Schemes

    Lecture 41 Data Owner and Data Handling

    Lecture 42 Disposal Terms and Concepts

    Lecture 43 Data Breach and Data Analysis

    Lecture 44 Incident Response Guidelines

    Lecture 45 Incident and Emergency Response

    Lecture 46 Media-Software and Network Analysis

    Lecture 47 Order of Volatility

    Section 6: Industry Trends

    Lecture 48 Introduction

    Lecture 49 Performing Ongoing Research

    Lecture 50 Security Practices

    Lecture 51 Evolution of Technology

    Lecture 52 Situational Awareness and Vulnerability Assessments

    Lecture 53 Researching Security Implications

    Lecture 54 Global Industry Security Response

    Lecture 55 Threat Actors

    Lecture 56 Contract Security Requirements

    Lecture 57 Contract Documents

    Section 7: Securing the Enterprise

    Lecture 58 Introduction

    Lecture 59 Benchmarks and Baselines

    Lecture 60 Prototyping and Testing Multiple Solutions

    Lecture 61 Cost/Benefit Analysis

    Lecture 62 Metrics Collection and Trend Data

    Lecture 63 Security Controls-Reverse Engineering and Deconstructing

    Lecture 64 Security Solutions Business Needs

    Lecture 65 Lesson Learned- After Action Report

    Section 8: Assessment Tools and Methods

    Lecture 66 Introduction

    Lecture 67 Port Scanners and Vulnerability Scanners

    Lecture 68 Protocol Analyzer- Network Enumerator-Password Cracker

    Lecture 69 Fuzzers and HTTP Interceptors

    Lecture 70 Exploitation Tools

    Lecture 71 Passive Reconnaissance Tools

    Lecture 72 Vulnerability Assessments and Malware Sandboxing

    Lecture 73 Memory Dumping and Penetration Testing

    Lecture 74 Reconnaissance and Fingerprinting

    Lecture 75 Code Review

    Lecture 76 Social Engineering

    Section 9: Social Cryptographic Concepts and Techniques

    Lecture 77 Introduction

    Lecture 78 Cryptographic Benefits and Techniques

    Lecture 79 Hashing Algorithms

    Lecture 80 Message Authentication Code

    Lecture 81 Cryptographic Concepts

    Lecture 82 Transport Encryption Protocol

    Lecture 83 Symmetric Algorithms

    Lecture 84 Asymmetric Algorithms

    Lecture 85 Hybrid Encryption and Digital Signatures

    Lecture 86 Public Key Infrastructure

    Lecture 87 Digital Certificate Classes and Cypher Types

    Lecture 88 Des Modes

    Lecture 89 Cryptographic Attacks

    Lecture 90 Strength vs Performance and Cryptographic Implementations

    Section 10: Enterprise Storage

    Lecture 91 Introduction

    Lecture 92 Virtual Storage Types and Challenges

    Lecture 93 Cloud Storage

    Lecture 94 Data Warehousing

    Lecture 95 Data Archiving

    Lecture 96 Storage Area Networks (SANs) and (VSANs)

    Lecture 97 Network Attached Storage (NAS)

    Lecture 98 Storage Protocols and Fiber Channel over Ethernet (FCoE)

    Lecture 99 Storage Network File Systems

    Lecture 100 Secure Storage Management Techniques

    Lecture 101 LUN Masking/Mapping and HBA Allocation

    Lecture 102 Replication and Encryption Methods

    Section 11: Network and Security Components-Concepts-Security Architectures

    Lecture 103 Introduction

    Lecture 104 Remote Access Protocols

    Lecture 105 IPv6 and Transport Encryption

    Lecture 106 Network Authentication Methods

    Lecture 107 802.1x and Mesh Networks

    Lecture 108 Security Devices

    Lecture 109 Network Devices

    Lecture 110 Firewalls

    Lecture 111 Wireless Controllers

    Lecture 112 Router Security and Port Numbers

    Lecture 113 Network Security Solutions

    Lecture 114 Availability Controls-Terms and Techniques

    Lecture 115 Advanced Router and Switch Configuration

    Lecture 116 Data Flow Enforcement of Applications and Networks

    Lecture 117 Network Device Accessibility and Security

    Section 12: Security Controls for Hosts

    Lecture 118 Introduction

    Lecture 119 Trusted Operation Systems

    Lecture 120 Endpoint Security Software and Data Loss Prevention

    Lecture 121 Network Authentication Protocols

    Lecture 122 Log Monitoring and Host Hardening

    Lecture 123 Standard Operating Environment and Group Policy Security

    Lecture 124 Command Shell Restrictions

    Lecture 125 Configuring and Managing Interface Security

    Lecture 126 USB-Bluetooth-Firewire Restrictions and Security

    Lecture 127 Full Disk Encryption

    Lecture 128 Virtualization Security

    Lecture 129 Cloud Security Services

    Lecture 130 Boot Loader Protections

    Lecture 131 Virtual Host Vulnerabilities

    Lecture 132 Virtual Desktop Infrastructure

    Lecture 133 Terminal Services

    Lecture 134 Virtual TPM

    Section 13: Application Vulnerabilities and Security Controls

    Lecture 135 Introduction

    Lecture 136 Web Application Security Design

    Lecture 137 Specific Application Issues

    Lecture 138 Session Management

    Lecture 139 Input Validation

    Lecture 140 Web Vulnerabilities and Input Mitigation Issues

    Lecture 141 Buffer Overflow and other Application Issues

    Lecture 142 Application Security Framework

    Lecture 143 Web Service Security and Secure Coding Standards

    Lecture 144 Software Development Methods

    Lecture 145 Monitoring Mechanisms and Client-Server Side Processing

    Lecture 146 Browser Extensions and Other Web Development Techniques

    Section 14: Host-Storage-Network and Application Integration

    Lecture 147 Introduction

    Lecture 148 Securing Data Flows

    Lecture 149 Standards Concepts

    Lecture 150 Interoperability Issues

    Lecture 151 In House Commercial and Customized Applications

    Lecture 152 Cloud and Virtualization Models

    Lecture 153 Logical and Physical Deployment Diagrams

    Lecture 154 Secure Infrastructure Design

    Lecture 155 Storage Integration Security

    Lecture 156 Enterprise Application Integration Enablers

    Section 15: Authentication and Authorization Technologies

    Lecture 157 Introduction

    Lecture 158 Authentication and Identity Management

    Lecture 159 Password Types-Management and Policies

    Lecture 160 Authentication Factors

    Lecture 161 Biometrics

    Lecture 162 Dual-Multi Factor and Certificate Authentication

    Lecture 163 Single Sign On Issues

    Lecture 164 Access Control Models and Open Authorization

    Lecture 165 Extensible Access Control Markup Language (XACML)

    Lecture 166 Service Provisioning Markup Language (SPML)

    Lecture 167 Attestation and Identity Propagation

    Lecture 168 Federation and Security Assertion Markup Language (SAML)

    Lecture 169 OpenID-Shibboleth and WAYF

    Lecture 170 Advanced Trust Models

    Section 16: Business Unit Collaboration

    Lecture 171 Introduction

    Lecture 172 Identifying and Communicating Security Requirements

    Lecture 173 Security Controls Recommendations

    Lecture 174 Secure Solutions Collaboration

    Section 17: Secure Communication and Collaboration

    Lecture 175 Introduction

    Lecture 176 Web-Video Conferencing-Instant Messaging

    Lecture 177 Desktop Sharing

    Lecture 178 Presence Guidelines

    Lecture 179 Email Messaging Protocol

    Lecture 180 Telephony-VoIP and Social Media

    Lecture 181 Cloud Based Collaboration

    Lecture 182 Remote Access and IPsec

    Lecture 183 Mobile and Personal Device Management

    Lecture 184 Over Air Technology Concerns

    Lecture 185 WLAN Concepts-Terms-Standards

    Lecture 186 WLAN Security and Attacks

    Section 18: Security Across the Technology Life Cycle

    Lecture 187 Introduction

    Lecture 188 End to End Solution Ownership

    Lecture 189 System Development Life Cycle

    Lecture 190 Security Implications of Software Development Methodologies

    Lecture 191 Course End

    Lecture 192 Asset Management

    An IT security professional who has a minimum of 10 years experience in IT administration including at least 5 years of hands-on technical security experience.,IT professionals aiming to move into a specialist security position such as a risk manager or analyst, security architect, or penetration tester/ethical Hacker.,Cyber Security / IS Professional,Information Security Analyst,Security Architect,IT Specialist INFOSEC,IT Specialist, Cybersecurity, Cybersecurity Risk Manager,Cybersecurity Risk Analyst