CourseInfo | SimpliTrain

CompTIA CASP+ (CAS-004) - ML

Learning plan iconE-Learning

Description

This course will prepare students for the CompTIA Advanced Security Practitioner CAS004 exam. In this course, students will learn about security architecture, security operations, security engineering and cryptography, and governance, risk, and compliance.

This course will prepare students for the CompTIA Advanced Security Practitioner CAS004 exam. In this course, students will learn about security architecture, security operations, security engineering and cryptography, and governance, risk, and compliance.

Lesson Id Title Description
1 Course Introduction Course Introduction
Introduction to CompTIA CASP+ CAS-004
Instructor Introduction
What is CASP+
New CASP+ CAS-004 Exam
CASP+ CAS-004 Exam Domains
CASP+ CAS-004 Exam Objectives
CASP+ CAS-004 Exam Objectives
CASP+ CAS-004 Exam Objectives
CASP+ CAS-004 Exam Objectives
References
2 Domain 1 - Security Architecture Security Architecture
Topic 1.1 - Securing Network Architecture Services
Services (Cont.)
Services (Cont.)
Services (Cont.)
Segmentation
Segmentation (Cont.)
Segmentation (Cont.)
Deperimeterization and Zero Trust
Merging of Networks from Various Organizations
Software-Defined Networking (SDN)
Topic 1.2 - Infrastructure Security Design
Scalability
Resiliency
Resiliency (Cont.)
Automation
Containerization
Virtualization
Content Delivery Network
Caching
Topic 1.3 - Applications Security and Integration
Baseline and Templates
Baseline and Templates (Cont.)
Baseline and Templates (Cont.)
Software Assurance
Software Assurance (Cont.)
Considerations of Integrating Enterprise Applications
Integrating Security into Development Life Cycle
Integrating Security into Development Life Cycle (Cont.)
Integrating Security into Development Life Cycle (Cont.)
Integrating Security into Development Life Cycle (Cont.)
Topic 1.4 - Data Security Techniques
Data Lifecycle
Data Classification and Management
Data Loss Prevention Data Loss Detection
Data Obfuscation and Masking Techniques
Topic 1.5 - Authentication and Authorization Controls
Credential and Password Management
Federated Trust Methods
Access Control Models
Authentication Protocols
Identity Proofing Mechanism
Topic 1.6 - Cloud and Virtualization Solutions
Virtualization
Containerization
Emulation
Cloud
Cloud (Cont.)
Cloud (Cont.)
Demo - Cloud
Topic 1.7 - Cryptography and Public Key Infrastructure (PKI)
Cryptographic Terms
Cryptographic Terms
Cryptographic Terms (Cont.)
Public Key Infrastructure (PKI)
Public Key Infrastructure (PKI) (Cont.)
Public Key Infrastructure (PKI) (Cont.)
Common PKI Use Cases
Common PKI Issues
Topic 1.8 - Impact of Emerging Technologies on Security and Privacy
Artificial Intelligence, Machine Learning, and Deep Learning
Virtual/Augmented Reality
Quantum Computing
Blockchain
Homomorphic Encryption
Secure Multi-Party Computation Distributed Consensus
Big Data 3D Printing
Domain 1 Review
Domain 1 Review
Domain 1 Review
Domain 1 Review
3 Domain 2 - Security Operations Security Operations
Topic 2.1 - Threat Management
Frameworks
Frameworks (Cont.)
Frameworks (Cont.)
Frameworks (Cont.)
Frameworks (Cont.)
Intelligence Types & Collection Methods
Intelligence Types & Collection Methods (Cont.)
Intelligence Types & Collection Methods (Cont.)
Intelligence Types & Collection Methods (Cont.)
Threat Actors
Demo - Threat Frameworks
Topic 2.2 - Indicators of Compromise and Responses
Indicators of Compromise
Indicators of Compromise (Cont.)
Indicators of Compromise (Cont.)
Indicators of Compromise (Cont.)
Indicators of Compromise (Cont.)
Safeguards and Responses
Topic 2.3 - Vulnerability Management
Vulnerability Scans
Vulnerability Scans (Cont.)
Security Content Automation Protocol (SCAP)
Security Content Automation Protocol (SCAP) (Cont.)
Vulnerability Assessment Types
Information Source Vulnerabilities
Patch Management
Topic 2.4 - Vulnerability Assessment, Penetration Testing, and Tools
Test Types
Test Types (Cont.)
Tools for Testing
Tools for Testing (Cont.)
Methods and Requirements
Methods and Requirements (Cont.)
Topic 2.5 - Vulnerabilities and Attacks
Vulnerabilities
Vulnerabilities (Cont.)
Vulnerabilities (Cont.)
Attacks
Attacks (Cont.)
Attacks (Cont.)
Attacks (Cont.)
Attacks (Cont.)
Attacks (Cont.)
Topic 2.6 - Processes for Risk Reduction
Types of Security Controls
Administrative Security Controls
Physical Security Controls
Logical Security Controls
Topic 2.7 - Incident Management
Classification
Classification (Cont.)
Triage Event
Incident Response
Incident Response
Communication
Stakeholders
Topic 2.8 - Digital Forensics Concepts
Forensic Process
Forensic Process (Cont.)
Chain of Custody
Chain of Custody (Cont.)
Data Acquisition and Preservation
Cryptanalysis and Steganalysis
Forensic Images and Clones
Forensic Workstation
Topic 2.9 - Forensic Analysis Tools
Forensic Analysis Tools
Forensic Analysis Tools (Cont.)
Domain 2 Review
Domain 2 Review
Domain 2 Review
Domain 2 Review
4 Domain 3 - Security Engineering and Cryptography Security Engineering and Cryptography
Topic 3.1 - Secure Configurations for Enterprise Mobility
Enterprise Mobility Management (EMM)
Enterprise Mobility Management (EMM) (Cont.)
Enterprise Mobility Management (EMM) (Cont.)
Managed Configurations
Managed Configurations (Cont.) Managed Configurations
Managed Configurations (Cont.) Managed Configurations (Cont.)
Managed Configurations (Cont.) Deployment Scenarios
Mobile Device Reconnaissance
Security Considerations
Topic 3.2 - Endpoint Security Hardening Techniques
Hardening Techniques Hardening Techniques (Cont.)
Hardening Techniques (Cont.) Hardening Techniques (Cont.)
Protection Processes Patching
Patching (Cont.)
Patching (Cont.)
Logging and Monitoring
Mandatory Access Control
Security-Enhanced Linux (SELinux)
Security-Enhanced Linux (SELinux) (Cont.)
Security-Enhanced Android (SEAndroid)
Trustworthy Computing
Trusted Platform Module (TPM)
UEFI and BIOS
Secure Boot
Measured Boot
Attestation Services
Hardware Security Module (HSM)
Self-Encrypting Drives (SEDs)
Host Security Controls
Topic 3.3 - Security Considerations and Impacts
Embedded Devices
Internet of Things (IoT)
Internet of Things (IoT) (Cont.)
System on a Chip (SoC)
Microcontrollers
Industrial Computer Systems
Industrial Control Systems (ICSs)
Programmable Logic Controller (PLC)
Supervisory Control and Data Acquisition (SCADA)
Heating, Ventilation, and Air Conditioning (HVAC)
Common Protocols in ICS
Common Protocols in ICS (Cont.)
Sectors
Topic 3.4 - Cloud Adoption and Impacts
Business Continuity and Disaster Recovery Considerations
Key Management Practices
Storage Configurations
Serverless
Logging and Monitoring
Cloud Access Security Broker (CASB)
Misconfiguration
Topic 3.5 - Public Key Infrastructure (PKI)
Components of PKI
Components of PKI (Cont.)
Certificate and Cryptographic Key Issues
Demo - Cloud Adoption and Impacts and PKI
Topic 3.6 - Cryptographic Algorithms and Protocols
Hashing
Hashing (Cont.)
Hashing (Cont.)
Symmetric Algorithms
Symmetric Algorithms (Cont.)
Asymmetric Algorithms
Asymmetric Algorithms (Cont.)
Cryptographic Applications and Protocols
Domain 3 Review
Domain 3 Review
Domain 3 Review
5 Domain 4 - Governance, Risk, and Compliance Governance, Risk, and Compliance
Topic 4.1 - Risk Management
Risk Management Concepts
Risk Management Concepts (Cont.)
Risk Management Concepts (Cont.)
Risk Management Concepts (Cont.)
Risk Management Concepts (Cont.)
Risk Frameworks
Risk Frameworks (Cont.)
Risk Frameworks (Cont.)
Risk Frameworks (Cont.)
Risk Assessment Methods and Strategies
Risk Assessment Methods and Strategies (Cont.)
Risk Assessment Methods and Strategies (Cont.)
Risk Assessment Methods and Strategies (Cont.)
Risk Assessment Methods and Strategies (Cont.)
People/Insider Risk Management
People/Insider Risk Management (Cont.)
Vendor Risk Management
Vendor Risk Management (Cont.)
Vendor Risk Management (Cont.)
Vendor Risk Management (Cont.)
Vendor Risk Management (Cont.)
Vendor Risk Management (Cont.)
Topic 4.2 - Governance & Compliance Strategies
Basic Concepts
Basic Concepts (Cont.)
Managing Critical Data Assets
Managing Critical Data Assets (Cont.)
Managing Critical Data Assets (Cont.)
Managing Critical Data Assets (Cont.)
Managing Critical Data Assets (Cont.)
Regulation, Accreditation, and Standards
Regulation, Accreditation, and Standards (Cont.)
Regulation, Accreditation, and Standards (Cont.)
Regulation, Accreditation, and Standards (Cont.)
Regulation, Accreditation, and Standards (Cont.)
Regulation, Accreditation, and Standards (Cont.)
Legal Considerations & Contract Types
Legal Considerations & Contract Types (Cont.)
Legal Considerations & Contract Types (Cont.)
Legal Considerations & Contract Types (Cont.)
Demo - Regulations and Legal Considerations
Topic 4.3 - Business Continuity & Disaster Recovery
Business Continuity Planning
Business Continuity Planning (Cont.)
Business Continuity Planning (Cont.)
Business Continuity Planning (Cont.)
Disaster Recovery Planning
Disaster Recovery Planning (Cont.)
Disaster Recovery Planning (Cont.)
Disaster Recovery Planning (Cont.)
Disaster Recovery Planning (Cont.)
Disaster Recovery Planning (Cont.)
Disaster Recovery Planning (Cont.)
Testing
Testing (Cont.)
Testing (Cont.)
Testing (Cont.)
Testing (Cont.)
Testing (Cont.)
Testing (Cont.)
Domain 4 Review
Domain 4 Review
Course Closure
Course Closure
Course Closure
Course Closure
Course Closure
Course Closure
Course Closure
Self-Paced

Free

Enroll icon
This course includes: :
Full lifetime access