Exclusive SALE Offer Today

CAS-003: CompTIA Advanced Security Practitioner (CASP) CAS-003

Best Seller 258 Lectures 11h 56m 6s
Prepare for your CompTIA examination with our training course. The CAS-003 course contains a complete batch of videos that will provide you with profound and thorough knowledge related to CompTIA certification exam. Pass the CompTIA CAS-003 test with flying colors.
$14.99$24.99
Curriculum For This Course

  • 1. Chapter Introdcution 2m 15s
  • 2. Topic A: Understanding Business and Industry Influences 10s
  • 3. Ongoing Risk Management 1m 17s
  • 4. New Products and User Behaviors 3m 43s
  • 5. Business Models and Strategies 3m 25s
  • 6. Cloud Technologies 4m 47s
  • 7. Acquisitions and Mergers 3m 8s
  • 8. Due Diligence Team 1m 5s
  • 9. Data Ownership 1m 30s
  • 10. Data Reclassification 1m
  • 11. Integrating Diverse Industries 5m 1s
  • 12. Common Regulations 5m 8s
  • 13. Geographic Differences 2m 25s
  • 14. Data Sovereignty 53s
  • 15. Internal and External Influences 5m 32s
  • 16. De-perimeterization 1m 7s
  • 17. Understand Changes in Network Boundaries 6m 53s
  • 18. Topic B: Policies and Procedures 22s
  • 19. Understanding Policies and Procedures 1m 34s
  • 20. Policy Life Cycle 1m 28s
  • 21. Process Life Cycle 1m 30s
  • 22. Reviewing Policies and Processes 3m 45s
  • 23. Common Business Documents 4m 44s
  • 24. Security for Contracts 1m 14s
  • 25. Contract Requirements 1m 54s
  • 26. General Privacy Principles 1m 13s
  • 27. Standard Security Practices 11m 28s
  • 28. Demo - Examining Security Policies 7m 11s
  • 29. Topic C: Risk Mitigation and Control 24s
  • 30. Introduction to Risk Mitigation 1m
  • 31. Categorizing Data 3m 48s
  • 32. Incorporating Stakeholder Input 1m 18s
  • 33. Aggregate CIA Scores 1m 37s
  • 34. Selecting and Implementing Controls 4m 11s
  • 35. Security Control Frameworks 51s
  • 36. Options for Frameworks 4m 40s
  • 37. Extreme Scenario Planning 2m 41s
  • 38. System-Specific Risk Analysis 1m 13s
  • 39. Qualitative Risk Analysis 1m 39s
  • 40. Quantitative Risk Analysis 1m 6s
  • 41. Risk Impact 3m 8s
  • 42. Likelihood of Threat 48s
  • 43. Return on Investment 1m 52s
  • 44. Understanding Payback 2m 5s
  • 45. Total Cost of Ownership 1m 24s
  • 46. TCO Guidelines 1m 23s
  • 47. Translate to Business Terms 1m 31s
  • 48. Risk Management Strategies 2m 9s
  • 49. Risk Management Processes 1m 6s
  • 50. Information and Asset Value and Costs 49s
  • 51. Vulnerabilities and Threat Identification 1m 6s
  • 52. Additional Factors 1m 34s
  • 53. Topic D: Business Continuity Planning 21s
  • 54. Continuity Planning 19s
  • 55. BCP Components 1m 51s
  • 56. BCP Steps 2m 38s
  • 57. Additional Plans 1m 48s
  • 58. Conducting Business Impact Analysis 4m 57s
  • 59. Chapter 01 Review 1m 3s
  • 1. Chapter Introdcution 34s
  • 2. Topic A: Physical and Virtual Network Security Devices 15s
  • 3. Unified Threat Management 1m 19s
  • 4. Analyzing UTM 1m 31s
  • 5. Intrusion Detection and Prevention 5m 13s
  • 6. In-Line Network Encryptor 1m 31s
  • 7. Network Access Control 3m 2s
  • 8. SIEM 1m 15s
  • 9. Firewalls 7m 5s
  • 10. Firewall Architecture 5m 16s
  • 11. Wireless Controller 1m 49s
  • 12. Routers and Switches 2m 9s
  • 13. Proxy Servers 1m 30s
  • 14. Topic B: Application and Protocol Level Security 29s
  • 15. Web Application Firewalls 1m 46s
  • 16. Hardware Security Modules 1m 50s
  • 17. Vulnerability Scanners 2m 11s
  • 18. Topic C: Advanced Network Design 31s
  • 19. Virtual Private Networks 2m 51s
  • 20. VPN Protocols 1m 58s
  • 21. IP Security (IPSec) 3m 1s
  • 22. IPSec Modes 1m 2s
  • 23. Demo - Examining IPSec Policies 9m 28s
  • 24. Secure Sockets Layer (SSL) 1m 44s
  • 25. Transport Layer Security (TLS 1m
  • 26. Additional Security Protocols 3m 26s
  • 27. Authentication Protocols 4m 45s
  • 28. Topic D: Network Solutions for Data Flow 36s
  • 29. Data Loss Prevention 2m 48s
  • 30. Data Flow Enforcement 2m
  • 31. Network Flow 1m 32s
  • 32. Topic E: Secure Baselines of Networking and Security Components 31s
  • 33. Securing Device Configurations 25s
  • 34. Access Control Lists (ACLs) 43s
  • 35. ACL Rule Sets 2m 4s
  • 36. Change Monitoring 1m 30s
  • 37. Configuration Lockdown 51s
  • 38. Availability Controls 3m 29s
  • 39. Disk Availability 3m 56s
  • 40. Key Availability Terms 1m 25s
  • 41. Topic F: Advanced Configuration of Network Devices 16s
  • 42. Additional Configurations 49s
  • 43. Transport Security 1m 44s
  • 44. Trunking Security 3m 47s
  • 45. Port Security 2m 20s
  • 46. Ports and Sockets 3m 37s
  • 47. Security Zones 1m 29s
  • 48. Network Segmentation 1m 24s
  • 49. NAC Concepts 2m 53s
  • 50. Network Enabled Devices 2m 21s
  • 51. Automation Systems 1m 23s
  • 52. Physical Security 2m 17s
  • 53. Chapter 02 Review 1m 16s
  • 1. Chapter Introdcution 56s
  • 2. Topic A: Understanding Authentication and Authorization Concepts 20s
  • 3. Authentication 4m 42s
  • 4. The Importance of Identity 7m 43s
  • 5. Additional Password Options 54s
  • 6. Demo - Enforcing Strong Passwords 10m 4s
  • 7. Biometric Authentication 2m 50s
  • 8. Biometric Considerations 1m 35s
  • 9. Beyond Single Factor 1m 38s
  • 10. Certificate Authentication 3m 1s
  • 11. Authorization 7m 42s
  • 12. Open Authorization 1m 7s
  • 13. XACML 1m 55s
  • 14. SPML 1m 6s
  • 15. Authorization Concepts 4m 2s
  • 16. Trust Models 1m 53s
  • 17. Topic B: Cryptographic Techniques 27s
  • 18. Introduction to Cryptography 1m 19s
  • 19. Cryptographic Techniques 51s
  • 20. Key Stretching 58s
  • 21. Hashing 3m 14s
  • 22. Message Digest (MD) Algorithms 1m 36s
  • 23. Secure Hash Algorithm (SHA) 1m 30s
  • 24. Digital Signatures 2m
  • 25. Message Authentication 1m 17s
  • 26. Code Signing 45s
  • 27. Additional Concepts 2m 12s
  • 28. Protecting Data in Transit 2m 2s
  • 29. Protecting Data in Memory 1m 13s
  • 30. Protecting Data at Rest 3m 44s
  • 31. Symmetric Algorithms 4m 8s
  • 32. Asymmetric Algorithms 3m
  • 33. Encryption Methods 3m 22s
  • 34. Topic C: Cryptographic Implementations 27s
  • 35. Crypto Options 2m 9s
  • 36. Additional Crypto Options 2m 42s
  • 37. Cryptographic Applications 1m 5s
  • 38. Crypto Considerations 1m 27s
  • 39. Stream vs 1m 47s
  • 40. Block Cipher Modes 25s
  • 41. Public Key Infrastructure 5m 41s
  • 42. Primary PKI Functions 2m 9s
  • 43. Additional PKI Concepts 1m 42s
  • 44. Chapter 03 Review 1m 5s
  • 1. Chapter Introdcution 56s
  • 2. Topic A: Security for Host Devices 25s
  • 3. Trusted OS 2m 14s
  • 4. Trusted OS Options 3m 11s
  • 5. Security Software 6m 6s
  • 6. Additional Host-Based Software Options 2m 24s
  • 7. Demo - Configuring a Host-Based Firewall 7m 42s
  • 8. Auditing 2m 8s
  • 9. Demo - Configuring Audit Policies 8m 14s
  • 10. Endpoint Detection Response 1m
  • 11. Host Hardening 4m
  • 12. Group Policy 2m 20s
  • 13. Demo - Configuring Group Policy Security 4m 44s
  • 14. Command Shell Restrictions 2m 17s
  • 15. Out-of-Band Management 2m 11s
  • 16. Dedicated Interfaces 2m 34s
  • 17. External I/O Restrictions 1m 54s
  • 18. Wireless Technologies 5m 3s
  • 19. Wi-Fi Components 1m 59s
  • 20. 802.11 Standards 3m 21s
  • 21. Wireless Security 5m 39s
  • 22. Securing Other Host Devices 3m 18s
  • 23. Boot Security 2m 6s
  • 24. Additional Boot Security Options 4m 30s
  • 25. Topic B: Mobile Device Security 41s
  • 26. Enterprise Mobility Management 1m 18s
  • 27. MDM Concepts 2m 56s
  • 28. Management Options 3m 32s
  • 29. Context Aware Management 3m 57s
  • 30. Security and Privacy 4m 16s
  • 31. Physical Security Options 1m 27s
  • 32. Additional Mobile Device Concepts 6m 7s
  • 33. Authentication Options 2m 22s
  • 34. Mobile Devices 4m 46s
  • 35. Wearable Security Implications 1m 38s
  • 36. Topic C: Software Security Controls 26s
  • 37. Application Security Design Considerations 3m 3s
  • 38. Application Issues 6m 30s
  • 39. Application Issues conti... 8m 18s
  • 40. Data Remnants 1m 41s
  • 41. Securing Applications 2m 34s
  • 42. Using JSON and REST 1m 39s
  • 43. Browser Extensions 2m 39s
  • 44. Application Vulnerabilities 1m 57s
  • 45. Chapter 04 Review 1m 6s
  • 1. Chapter Introduction 2m 21s
  • 2. Topic A: Cloud and Virtualization Technology 1m 22s
  • 3. Cloud Computing and Virtualization 5m 48s
  • 4. Cloud Options 10m 37s
  • 5. Security Considerations 4m 35s
  • 6. Cloud Service Models 7m 39s
  • 7. Demo - Examining Cloud Service Models 9m 14s
  • 8. Security and Virtualization 5m 46s
  • 9. Cloud-Augmented Security Services 7m 25s
  • 10. Security as a Service 1m 54s
  • 11. Virtualization Vulnerabilities 3m 40s
  • 12. Topic B: Securing Remote Access and Collaboration 37s
  • 13. Remote Access 1m 9s
  • 14. Dial-Up Access 3m 9s
  • 15. Virtual Private Networks 1m 49s
  • 16. Remote Access Purposes 3m 5s
  • 17. Unified Collaboration Tools 1m 8s
  • 18. Web Conferencing 4m 43s
  • 19. Video Conferencing 3m 6s
  • 20. Storage and Document Collaboration 3m 12s
  • 21. Unified Communication 1m 44s
  • 22. Instant Messaging 3m 1s
  • 23. Presence 3m 13s
  • 24. E-Mail 11m 55s
  • 25. Chapter 05 Review 1m 4s
  • 1. Chapter Introduction 1m 9s
  • 2. Topic A: Security Assessments 20s
  • 3. Importance of Security Assessments 40s
  • 4. Malware Sandboxing 2m 29s
  • 5. Memory Dumping 1m 36s
  • 6. Runtime Debugging 1m 25s
  • 7. Reconnaissance 1m 20s
  • 8. Fingerprinting 2m 29s
  • 9. Code Review 2m 47s
  • 10. Social Engineering 12m 48s
  • 11. Public Information 11m 15s
  • 12. Demo - Accessing Public Information 6m 36s
  • 13. Penetration Test 5m 41s
  • 14. Vulnerability Assessment 2m 55s
  • 15. Assessment Styles 4m 30s
  • 16. Topic B: Security Assessment Tools 34s
  • 17. Network Tool Types 4m 39s
  • 18. Security Content Automation Protocol (SCAP) 2m 3s
  • 19. Common Vulnerability Scoring System (CVSS) 3m 16s
  • 20. Fuzzing 50s
  • 21. Exploit Kits 1m 6s
  • 22. Host Tools 7m 25s
  • 23. Additional Host Tools 3m 40s
  • 24. Physical Security Tools 3m 23s
  • 25. Topic C: Incident Response and Recovery 1m 2s
  • 26. E-discovery 5m 37s
  • 27. Data Breach 1m 23s
  • 28. Incident Response Process 4m 30s
  • 29. Chapter 06 Review 56s
  • 30. Course Closure 2m 36s

How to Open Test Engine .dumpsarena Files

Use FREE DumpsArena Test Engine player to open .dumpsarena files

DumpsArena Test Engine

Windows

Refund Policy
Refund Policy

DumpsArena.com has a remarkable success record. We're confident of our products and provide a no hassle refund policy.

How our refund policy works?

safe checkout

Your purchase with DumpsArena.com is safe and fast.

The DumpsArena.com website is protected by 256-bit SSL from Cloudflare, the leader in online security.

Need Help Assistance?