CompTIA Advanced Security Practitioner (CASP+) w/Cert Prep

CompTIA Advanced Security Practitioner (CASP+) w/Cert Prep
30 Bird Media
Infosec Learning INC

Welcome to CompTIA Advanced Security Practitioner CAS-004. This course provides the knowledge needed to implement security solutions within an enterprise policy framework, using a vendor-neutral format. This includes GRC and vulnerability management programs, applied cryptography, system and network security, identity management, secure development, and incident response. This course maps to the CompTIA CASP+ certification exam. Objective coverage is marked throughout the course. You can download an objective map for the course from http://www.30bird.com.

You will benefit most from this course if you intend to take a CompTIA CASP+ CAS-004 exam.

This course assumes that you have some applied knowledge of computers, TCP/IP networks, and cybersecurity principles. Knowledge equivalent to the CompTIA Security+ or CySA+ certification is helpful but not necessary.

Product Code: 4E388P6VD8
Days of Training: 5
Price: 105.00
Format:
E-Book

Introduction

  • Course setup

Chapter 1: Governance and compliance

  • Module A: Security governance
  • Module B: Regulatory compliance
  • Module C: Standards and frameworks

Chapter 2: Security policies

  • Module A: Policy design
  • Module B: Controls and procedures
  • Module C: Training and coordination

Chapter 3: Risk management

  • Module A: Risk assessment
  • Module B: Risk management strategies

Chapter 4: Enterprise resilience

  • Module A: BCDR planning
  • Module B: Resilient architecture

Chapter 5: Threat management

  • Module A: Threats and vulnerabilities
  • Module B: Threat intelligence sources
  • Module C: Applied intelligence

Chapter 6: Cryptographic techniques

  • Module A: Cryptographic principles
  • Module B: Ciphers and hashes

Chapter 7: Applied cryptography

  • Module A: Public key infrastructure
  • Module B: Cryptographic protocols

Chapter 8: Authentication and authorization

  • Module A: Access control components
  • Module B: Authentication technologies

Chapter 9: Network security architecture

  • Module A: Network vulnerabilities
  • Module B: Network security infrastructure
  • Module C: Secure network configuration

Chapter 10: Protecting hosts and data

  • Module A: Host security
  • Module B: Data security

Chapter 11: Threat detection and response

  • Module A: Threat detection systems
  • Module B: Network sensors
  • Module C: Data analysis

Chapter 12: Specialized system security

  • Module A: Mobile device security
  • Module B: Operational technologies

Chapter 13: Virtual and cloud infrastructure

  • Module A: Virtual and cloud systems
  • Module B: Secure cloud infrastructure

Chapter 14: Secure applications

  • Module A: Software assurance
  • Module B: Application vulnerabilities

Chapter 15: Security assessment and testing

  • Module A: Security testing programs
  • Module B: Vulnerability assessments
  • Module C: Vulnerability and patch management

Chapter 16: Incident response

  • Module A: Incident response planning
  • Module B: Incident response procedures
  • Module C: Digital forensics

Appendix A: Glossary

Index

30 Bird - Creating a Fault-Tolerant Network (CASP)30 Bird - Creating a Shell Script30 Bird - Creating a Cron Job30 Bird - Researching Security Threats30 Bird - Examining MITRE ATT&CK (CASP)30 Bird - Creating Asymmetric Key Pairs (CASP)30 Bird - Creating File Hashes (CASP)30 Bird - Examining PKI Certificates (CASP)30 Bird - Requesting a PKI Certificate (CASP)30 Bird - Creating an IPsec Tunnel (CASP)30 Bird - Cracking Passwords (CASP)30 Bird - Using Anti-Phishing Tools (CASP)30 Bird - Enforcing Password Policies (CASP)30 Bird - Configuring Lockout Policies (CASP)30 Bird - Configuring Key-Based SSH Login30 Bird - Installing a RADIUS Server (CASP)30 Bird - Launching a DoS Attack (CASP)30 Bird - Capturing Credentials via Packet Sniffing30 Bird - Enforcing a Security Template (CASP)30 Bird - Reviewing an Application Control Policy30 Bird - Enforcing Audit Policies30 Bird - Creating Redundant Storage30 Bird - Checking File Integrity30 Bird - Configuring NTFS Access Auditing (CASP)30 Bird - Using an IDS (CASP)30 Bird - Deploying a Honeypot (CASP)30 Bird - Viewing Linux Security Logs30 Bird - Configuring Windows Event Forwarding30 Bird - Configuring a SPAN Port30 Bird - Monitoring Network Performance (CASP)30 Bird - Configuring Syslog (CASP)30 Bird - Using a SIEM (CASP)30 Bird - Querying Event Logs in PowerShell30 Bird - Reviewing Network Appliance Logs30 Bird - Using a Backdoor (CASP)30 Bird - Performing a Web Vulnerability Scan30 Bird - Examining Website Vulnerabilities30 Bird - Performing Command Injection30 Bird - Performing a Client-Side Attack30 Bird - Brute Forcing a Service (CASP)30 Bird - Service Enumeration (CASP)30 Bird - Scanning a Host for Vulnerabilities (CASP)30 Bird - Exploiting a Linux System (CASP)30 Bird - Evaluating Scan Results (CASP)30 Bird - Updating Kali30 Bird - Collecting Forensic Data30 Bird - Analyzing a Forensic Image