CompTIA: Advanced Security Practitioner (CASP)
$99.00
The CASP exam covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers, while managing risk.
Course Outline
Module 1- Underlying Security Models
- Course Guide
- Underlying Security Models Part 1
- Underlying Security Models Part 2
- Underlying Security Models Part 3
- Underlying Security Models Part 4
- Underlying Security Models Part 5
- Underlying Security Models Part 6
- Underlying Security Models Part 7
- General Security Part 1
- General Security Part 2
Module 2- Selecting Security
- Selecting Security Products Part 1
- Selecting Security Products Part 2
- Selecting Security Products Part 3
- Control Selection Process Part 1
- Control Selection Process Part 2
Module 3- Cryptography
- Cryptography Symmetric and Asymmetric Part 1
- Cryptography Symmetric and Asymmetric Part 2
- Cryptography Symmetric and Asymmetric Part 3
- Cryptography Symmetric and Asymmetric Part 4
- Cryptography Message Integrity Controls Part 1
- Cryptography Message Integrity Controls Part 2
- Cryptography Message Integrity Controls Part 3
- Cryptography Digital Signatures Part 1
- Cryptography Digital Signatures Part 2
- Cryptography PKI and PGP Part 1
- Cryptography PKI and PGP Part 2
- Cryptography PKI and PGP Part 3
- Cryptography PKI and PGP Part 4
Module 4- Storage
- Storage Part 1
- Storage Part 2
- Storage Part 3
- Storage Part 4
Module 5- Virtual Computing
- Virtual Computing
- Cloud Computing Part 1
- Cloud Computing Part 2
- Cloud Computing Part 3
- Cloud Computing Part 4
- Cloud Computing Part 5
Module 6- IPv6
- IPV6 Part 1
- IPV6 Part 2
Module 7- Remote Access Security
- Remote Access Security Part 1
- Remote Access Security Part 2
Module 8- Domain Name System
- Domain Name System Part 1
- Domain Name System Part 2
- Domain Name System Part 3
- Domain Name System Part 4
- Domain Name System Part 5
- Domain Name System Part 6
- Domain Name System Part 7
- Domain Name System Part 8
Module 9- Directory Services
- Directory Services
Module 10- Firewall and VPN
- Firewall and VPN Part 1
- Firewall and VPN Part 2
- Firewall and VPN Part 3
- Firewall and VPN Part 4
- Firewall Policy Part 1
- Firewall Policy Part 2
- Firewall Policy Part 3
- Firewall Policy Part 4
Module 11- Security Configuration Management
- Security Configuration Management Part 1
- Security Configuration Management Part 2
- Security Configuration Management Part 3
Module 12- Network Infrastructure Security
- Network Infrastructure Security Part 1
- Network Infrastructure Security Part 2
- Network Infrastructure Security Part 3
- Network Infrastructure Security Part 4
Module 13- Secure Web Services
- Secure Web Services Part 1
- Secure Web Services Part 2
- OWASP top Ten Part 1
- OWASP top Ten Part 2
- OWASP top Ten Part 3
- OWASP top Ten Part 4
- OWASP top Ten Part 5
Module 14- Buffer Overflows
- Buffer Overflows Part 1
- Buffer Overflows Part 2
Module 15- SQL Injection
- SQL Injection Part 1
- SQL Injection Part 2
Module 16- Access Control
- Access Control Part 1
- Access Control Part 2
Module 17- Single Sign-On
- Single Sign-On Part 1
- Single Sign-On Part 2
- Single Sign-On Part 3
Module 18- Risk Assessment
- Risk Assessment Part 1
- Risk Assessment Part 2
Module 19- Testing and Assessment
- Testing and Assessment Part 1
- Testing and Assessment Part 2
- Testing and Assessment Part 3
Module 20- Common Vulnerability
- Common Vulnerability Scoring System Part 1
- Common Vulnerability Scoring System Part 2
- Common Vulnerability Scoring System Part 3
- Common Vulnerability Scoring System Part 4
Module 21- Common Criteria
- Common Criteria Part 1
- Common Criteria Part 2
- Common Criteria Part 3
- Common Criteria Part 4
- Common Criteria Part 5
Module 22- Personally Identifiable Information
- Personally Identifiable Information Part 1
- Personally Identifiable Information Part 2
Module 23- Risk Management
- Risk Management Part 1
- Risk Management Part 2
- Risk Management Part 3
Module 24- Frameworks
- Frameworks Part 1
- Frameworks Part 2
- Frameworks Part 3
- Frameworks Part 4
Module 25- Interconnecting Systems
- Interconnecting Systems Part 1
- Interconnecting Systems Part 2
Module 26- Security Services
- Security Services Part 1
- Security Services Part 2
- Security Services Part 3
- Security Services Part 4
Module 27- Continuous Monitoring
- Continuous Monitoring Part 1
- Continuous Monitoring Part 2
- Continuous Monitoring Part 3
- Continuous Monitoring Part 4
Module 28-Incident Handling
- Incident Handling Part 1
- Incident Handling Part 2
- Incident Handling Part 3
- Incident Handling Part 4
Module 29- Forensic & Incident Response
- Forensic and Incident Response Part 1
- Forensic and Incident Response Part 2
- Forensic and Incident Response Part 3
Module 30- Requirements Processing
- Requirements Processing Part 1
- Requirements Processing Part 2
- Requirements Processing Part 3
Module 31- Standards Bodies
- Standards Bodies
Module 32- Secure System Life Cycle
- Secure System Life Cycle Part 1
- Secure System Life Cycle Part 2
- Secure System Life Cycle Part 3
Module 33- Email
Module 34- Mobile and BYOD
- Mobile and BYOD Part 1
- Mobile and BYOD Part 2
Module 35- Voiceover IP
- Voice over IP
Module 36- Physical Facilities Assessment Process
- Physical Facilities Assessment Process Part 1
- Physical Facilities Assessment Process Part 2
Module 37- Security Requirements Traceability Matrix
- Security Requirements Traceability Matrix