CAS-003: CompTIA Advanced Security Practitioner (CASP) CAS-003
Best Seller
258 Lectures
11h 56m 6s
Prepare for your CompTIA examination with our training course. The CAS-003 course contains a complete batch of videos that will provide you with profound and thorough knowledge related to CompTIA certification exam. Pass the CompTIA CAS-003 test with flying colors.
$14.99$24.99
Curriculum For This Course
- 1. Course Introduction 3m 22s
- 2. Instructor Introduction 1m 35s
- 1. Chapter Introdcution 2m 15s
- 2. Topic A: Understanding Business and Industry Influences 10s
- 3. Ongoing Risk Management 1m 17s
- 4. New Products and User Behaviors 3m 43s
- 5. Business Models and Strategies 3m 25s
- 6. Cloud Technologies 4m 47s
- 7. Acquisitions and Mergers 3m 8s
- 8. Due Diligence Team 1m 5s
- 9. Data Ownership 1m 30s
- 10. Data Reclassification 1m
- 11. Integrating Diverse Industries 5m 1s
- 12. Common Regulations 5m 8s
- 13. Geographic Differences 2m 25s
- 14. Data Sovereignty 53s
- 15. Internal and External Influences 5m 32s
- 16. De-perimeterization 1m 7s
- 17. Understand Changes in Network Boundaries 6m 53s
- 18. Topic B: Policies and Procedures 22s
- 19. Understanding Policies and Procedures 1m 34s
- 20. Policy Life Cycle 1m 28s
- 21. Process Life Cycle 1m 30s
- 22. Reviewing Policies and Processes 3m 45s
- 23. Common Business Documents 4m 44s
- 24. Security for Contracts 1m 14s
- 25. Contract Requirements 1m 54s
- 26. General Privacy Principles 1m 13s
- 27. Standard Security Practices 11m 28s
- 28. Demo - Examining Security Policies 7m 11s
- 29. Topic C: Risk Mitigation and Control 24s
- 30. Introduction to Risk Mitigation 1m
- 31. Categorizing Data 3m 48s
- 32. Incorporating Stakeholder Input 1m 18s
- 33. Aggregate CIA Scores 1m 37s
- 34. Selecting and Implementing Controls 4m 11s
- 35. Security Control Frameworks 51s
- 36. Options for Frameworks 4m 40s
- 37. Extreme Scenario Planning 2m 41s
- 38. System-Specific Risk Analysis 1m 13s
- 39. Qualitative Risk Analysis 1m 39s
- 40. Quantitative Risk Analysis 1m 6s
- 41. Risk Impact 3m 8s
- 42. Likelihood of Threat 48s
- 43. Return on Investment 1m 52s
- 44. Understanding Payback 2m 5s
- 45. Total Cost of Ownership 1m 24s
- 46. TCO Guidelines 1m 23s
- 47. Translate to Business Terms 1m 31s
- 48. Risk Management Strategies 2m 9s
- 49. Risk Management Processes 1m 6s
- 50. Information and Asset Value and Costs 49s
- 51. Vulnerabilities and Threat Identification 1m 6s
- 52. Additional Factors 1m 34s
- 53. Topic D: Business Continuity Planning 21s
- 54. Continuity Planning 19s
- 55. BCP Components 1m 51s
- 56. BCP Steps 2m 38s
- 57. Additional Plans 1m 48s
- 58. Conducting Business Impact Analysis 4m 57s
- 59. Chapter 01 Review 1m 3s
- 1. Chapter Introdcution 34s
- 2. Topic A: Physical and Virtual Network Security Devices 15s
- 3. Unified Threat Management 1m 19s
- 4. Analyzing UTM 1m 31s
- 5. Intrusion Detection and Prevention 5m 13s
- 6. In-Line Network Encryptor 1m 31s
- 7. Network Access Control 3m 2s
- 8. SIEM 1m 15s
- 9. Firewalls 7m 5s
- 10. Firewall Architecture 5m 16s
- 11. Wireless Controller 1m 49s
- 12. Routers and Switches 2m 9s
- 13. Proxy Servers 1m 30s
- 14. Topic B: Application and Protocol Level Security 29s
- 15. Web Application Firewalls 1m 46s
- 16. Hardware Security Modules 1m 50s
- 17. Vulnerability Scanners 2m 11s
- 18. Topic C: Advanced Network Design 31s
- 19. Virtual Private Networks 2m 51s
- 20. VPN Protocols 1m 58s
- 21. IP Security (IPSec) 3m 1s
- 22. IPSec Modes 1m 2s
- 23. Demo - Examining IPSec Policies 9m 28s
- 24. Secure Sockets Layer (SSL) 1m 44s
- 25. Transport Layer Security (TLS 1m
- 26. Additional Security Protocols 3m 26s
- 27. Authentication Protocols 4m 45s
- 28. Topic D: Network Solutions for Data Flow 36s
- 29. Data Loss Prevention 2m 48s
- 30. Data Flow Enforcement 2m
- 31. Network Flow 1m 32s
- 32. Topic E: Secure Baselines of Networking and Security Components 31s
- 33. Securing Device Configurations 25s
- 34. Access Control Lists (ACLs) 43s
- 35. ACL Rule Sets 2m 4s
- 36. Change Monitoring 1m 30s
- 37. Configuration Lockdown 51s
- 38. Availability Controls 3m 29s
- 39. Disk Availability 3m 56s
- 40. Key Availability Terms 1m 25s
- 41. Topic F: Advanced Configuration of Network Devices 16s
- 42. Additional Configurations 49s
- 43. Transport Security 1m 44s
- 44. Trunking Security 3m 47s
- 45. Port Security 2m 20s
- 46. Ports and Sockets 3m 37s
- 47. Security Zones 1m 29s
- 48. Network Segmentation 1m 24s
- 49. NAC Concepts 2m 53s
- 50. Network Enabled Devices 2m 21s
- 51. Automation Systems 1m 23s
- 52. Physical Security 2m 17s
- 53. Chapter 02 Review 1m 16s
- 1. Chapter Introdcution 56s
- 2. Topic A: Understanding Authentication and Authorization Concepts 20s
- 3. Authentication 4m 42s
- 4. The Importance of Identity 7m 43s
- 5. Additional Password Options 54s
- 6. Demo - Enforcing Strong Passwords 10m 4s
- 7. Biometric Authentication 2m 50s
- 8. Biometric Considerations 1m 35s
- 9. Beyond Single Factor 1m 38s
- 10. Certificate Authentication 3m 1s
- 11. Authorization 7m 42s
- 12. Open Authorization 1m 7s
- 13. XACML 1m 55s
- 14. SPML 1m 6s
- 15. Authorization Concepts 4m 2s
- 16. Trust Models 1m 53s
- 17. Topic B: Cryptographic Techniques 27s
- 18. Introduction to Cryptography 1m 19s
- 19. Cryptographic Techniques 51s
- 20. Key Stretching 58s
- 21. Hashing 3m 14s
- 22. Message Digest (MD) Algorithms 1m 36s
- 23. Secure Hash Algorithm (SHA) 1m 30s
- 24. Digital Signatures 2m
- 25. Message Authentication 1m 17s
- 26. Code Signing 45s
- 27. Additional Concepts 2m 12s
- 28. Protecting Data in Transit 2m 2s
- 29. Protecting Data in Memory 1m 13s
- 30. Protecting Data at Rest 3m 44s
- 31. Symmetric Algorithms 4m 8s
- 32. Asymmetric Algorithms 3m
- 33. Encryption Methods 3m 22s
- 34. Topic C: Cryptographic Implementations 27s
- 35. Crypto Options 2m 9s
- 36. Additional Crypto Options 2m 42s
- 37. Cryptographic Applications 1m 5s
- 38. Crypto Considerations 1m 27s
- 39. Stream vs 1m 47s
- 40. Block Cipher Modes 25s
- 41. Public Key Infrastructure 5m 41s
- 42. Primary PKI Functions 2m 9s
- 43. Additional PKI Concepts 1m 42s
- 44. Chapter 03 Review 1m 5s
- 1. Chapter Introdcution 56s
- 2. Topic A: Security for Host Devices 25s
- 3. Trusted OS 2m 14s
- 4. Trusted OS Options 3m 11s
- 5. Security Software 6m 6s
- 6. Additional Host-Based Software Options 2m 24s
- 7. Demo - Configuring a Host-Based Firewall 7m 42s
- 8. Auditing 2m 8s
- 9. Demo - Configuring Audit Policies 8m 14s
- 10. Endpoint Detection Response 1m
- 11. Host Hardening 4m
- 12. Group Policy 2m 20s
- 13. Demo - Configuring Group Policy Security 4m 44s
- 14. Command Shell Restrictions 2m 17s
- 15. Out-of-Band Management 2m 11s
- 16. Dedicated Interfaces 2m 34s
- 17. External I/O Restrictions 1m 54s
- 18. Wireless Technologies 5m 3s
- 19. Wi-Fi Components 1m 59s
- 20. 802.11 Standards 3m 21s
- 21. Wireless Security 5m 39s
- 22. Securing Other Host Devices 3m 18s
- 23. Boot Security 2m 6s
- 24. Additional Boot Security Options 4m 30s
- 25. Topic B: Mobile Device Security 41s
- 26. Enterprise Mobility Management 1m 18s
- 27. MDM Concepts 2m 56s
- 28. Management Options 3m 32s
- 29. Context Aware Management 3m 57s
- 30. Security and Privacy 4m 16s
- 31. Physical Security Options 1m 27s
- 32. Additional Mobile Device Concepts 6m 7s
- 33. Authentication Options 2m 22s
- 34. Mobile Devices 4m 46s
- 35. Wearable Security Implications 1m 38s
- 36. Topic C: Software Security Controls 26s
- 37. Application Security Design Considerations 3m 3s
- 38. Application Issues 6m 30s
- 39. Application Issues conti... 8m 18s
- 40. Data Remnants 1m 41s
- 41. Securing Applications 2m 34s
- 42. Using JSON and REST 1m 39s
- 43. Browser Extensions 2m 39s
- 44. Application Vulnerabilities 1m 57s
- 45. Chapter 04 Review 1m 6s
- 1. Chapter Introduction 2m 21s
- 2. Topic A: Cloud and Virtualization Technology 1m 22s
- 3. Cloud Computing and Virtualization 5m 48s
- 4. Cloud Options 10m 37s
- 5. Security Considerations 4m 35s
- 6. Cloud Service Models 7m 39s
- 7. Demo - Examining Cloud Service Models 9m 14s
- 8. Security and Virtualization 5m 46s
- 9. Cloud-Augmented Security Services 7m 25s
- 10. Security as a Service 1m 54s
- 11. Virtualization Vulnerabilities 3m 40s
- 12. Topic B: Securing Remote Access and Collaboration 37s
- 13. Remote Access 1m 9s
- 14. Dial-Up Access 3m 9s
- 15. Virtual Private Networks 1m 49s
- 16. Remote Access Purposes 3m 5s
- 17. Unified Collaboration Tools 1m 8s
- 18. Web Conferencing 4m 43s
- 19. Video Conferencing 3m 6s
- 20. Storage and Document Collaboration 3m 12s
- 21. Unified Communication 1m 44s
- 22. Instant Messaging 3m 1s
- 23. Presence 3m 13s
- 24. E-Mail 11m 55s
- 25. Chapter 05 Review 1m 4s
- 1. Chapter Introduction 1m 9s
- 2. Topic A: Security Assessments 20s
- 3. Importance of Security Assessments 40s
- 4. Malware Sandboxing 2m 29s
- 5. Memory Dumping 1m 36s
- 6. Runtime Debugging 1m 25s
- 7. Reconnaissance 1m 20s
- 8. Fingerprinting 2m 29s
- 9. Code Review 2m 47s
- 10. Social Engineering 12m 48s
- 11. Public Information 11m 15s
- 12. Demo - Accessing Public Information 6m 36s
- 13. Penetration Test 5m 41s
- 14. Vulnerability Assessment 2m 55s
- 15. Assessment Styles 4m 30s
- 16. Topic B: Security Assessment Tools 34s
- 17. Network Tool Types 4m 39s
- 18. Security Content Automation Protocol (SCAP) 2m 3s
- 19. Common Vulnerability Scoring System (CVSS) 3m 16s
- 20. Fuzzing 50s
- 21. Exploit Kits 1m 6s
- 22. Host Tools 7m 25s
- 23. Additional Host Tools 3m 40s
- 24. Physical Security Tools 3m 23s
- 25. Topic C: Incident Response and Recovery 1m 2s
- 26. E-discovery 5m 37s
- 27. Data Breach 1m 23s
- 28. Incident Response Process 4m 30s
- 29. Chapter 06 Review 56s
- 30. Course Closure 2m 36s
Hot Exams
Microsoft AZ-204 Exam Dumps
Microsoft AZ-104 Exam Dumps
ISC2 CISSP Exam Dumps
Amazon AWS SAP-C02 Exam Dumps
Nutanix NCS-Core Exam Dumps
Nutanix NCP-MCI-6.5 Exam Dumps
Isaca CRISC Exam Dumps
Nokia 4A0-112 Exam Dumps
Nutanix NCM-MCI Exam Dumps
Linux Foundation CKS Exam Dumps
Isaca CDPSE Exam Dumps
IIA IIA-CIA-Part3-3P Exam Dumps
IAPP CIPM Exam Dumps
AAFM GLO_CWM_LVL_1 Exam Dumps
Microsoft AI-900 Exam Dumps
Microsoft DP-300 Exam Dumps
Microsoft MO-201 Exam Dumps
Cisco 350-501 Exam Dumps
Cisco 350-401 Exam Dumps
Cisco 300-515 Exam Dumps
CompTIA 220-1101 Exam Dumps
ISC2 CISSP Exam Dumps
CompTIA SY0-701 Exam Dumps
Microsoft AZ-104 Exam Dumps
Amazon AWS SAP-C02 Exam Dumps
Amazon Web Services SCS-C02 Exam Dumps
ITIL ITILFND-V4 Exam Dumps
PMI PMP Exam Dumps
Cisco 350-501 Exam Dumps
Microsoft AZ-204 Exam Dumps
Okta Okta-Certified-Professional Exam Dumps
Amazon AWS SAA-C03 Exam Dumps
Nutanix NCS-Core Exam Dumps
PEOPLECERT ITIL-4-DITS Exam Dumps
Nutanix NCP-MCI-6.5 Exam Dumps
Amazon Web Services CLF-C02 Exam Dumps
IIA IIA-CIA-Part2 Exam Dumps
Cisco 300-410 Exam Dumps
Cisco 350-401 Exam Dumps
Microsoft DP-300 Exam Dumps
How to Open Test Engine .dumpsarena Files
Use FREE DumpsArena Test Engine player to open .dumpsarena files
Refund Policy
DumpsArena.com has a remarkable success record. We're confident of our products and provide a no hassle refund policy.
Your purchase with DumpsArena.com is safe and fast.
The DumpsArena.com website is protected by 256-bit SSL from Cloudflare, the leader in online security.