CompTIA CASP+ (CAS-004)
CompTIA Advanced Security26 H 18 M
Just you? Training a whole team? There's an ITProTV plan that fits.
Start Training TodayThis course has a practice test
Episodes
Episodes
- Security Architecture
- Overview
- Services - Discussion
- Segmentation - Discussion
- Services & Segmentation - Scenarios
- Deperimeterization/Zero Trust
- Merging of Networks
- Software-defined Networking (SDN)
- Infrastructure Design - Discussion
- Infrastructure Design - Scenarios
- Baselines & Templates & Software Assurance
- Integrating Enterprise Applications
- Security in the Development Lifecycle
- Securing Enterprise Architecture
- Authentication & Authorization - Discussion
- Authentication & Authorization - Scenarios
- Secure Cloud & Virtualization
- Cryptography & PKI
- Impact of Emerging Technologies
- Security Architecture - Key Points
- Security Operations
- Perform Threat Management
- Indicators of Compromise & Response
- Vulnerability Management Activities
- Vulnerability Assessment - Methods & Tools
- Analyze Vulnerabilities - Vulnerabilities
- Analyze Vulnerabilities - Vulnerable Systems
- Analyze Vulnerabilities - Attacks
- Use Processes to Reduce Risk
- Triage & Incident Response
- Forensic Concepts
- File Carving & Binary Analysis
- Analysis Tools
- Live Collection Tools
- Security Operations - Key Points
- Security Engineering and Cryptography
- Managed Configurations
- Deployment Scenarios
- Security Considerations
- Hardening Techniques
- Processes
- Mandatory Access Control
- Trustworthy Computing
- Compensating Controls
- Security Considerations - Embedded
- Security Considerations - ICS-SCADA
- Security Considerations - Protocols
- Security Considerations - Sectors
- Cloud Technology - Basics
- Cloud Technology - Advanced
- PKI - Basics
- PKI - Advanced
- Hashing & Symmetric Algorithms
- Asymmetric Algorithms & Protocols
- Troubleshoot Cryptography - Keys
- Security Engineering & Cryptography - Key Points
- Troubleshoot Cryptography - Misconfigurations
- Governance, Risk, and Compliance
- Risk Assessment
- Risk Handling Techniques
- Risk Types
- Risk Management Life Cycle
- Risk Tracking
- Policies and Security Practices
- Shared Responsibility Model - Cloud
- Performing Vendor Assessments
- Technical Considerations
- Data Considerations
- Regulations Accreditations & Standards
- Legal Considerations
- Contract and Agreement Types
- Business Impact Analysis (BIA)
- Privacy Impact Assessment
- Disaster Recovery & Business Continuity Planning
- Incident Response Plan
- Testing Plans
- Governance, Risk & Compliance - Key Points
Overview
4 M



- Episode Description
- Transcript