28 Hours

89 Course Videos

250 Test Questions

CompTIA Advanced Security Practitioner (CASP-003)

This course provides advanced-level training in risk management, enterprise security operations and architecture, research and collaboration, and integration of enterprise security. It covers all of the new exam objectives for the CAS-003 exam. The CASP certification is the highest-level security certification offered by CompTIA and is the final step in achieving the new CompTIA Security Analytics Expert (CSAE) or Security Infrastructure Expert (CSIE) stackable certification.

In this course you will advance your skills in the following areas:

  • Risk Management
  • Enterprise Security Architecture
  • Enterprise Security Operations
  • Technical Integration of Enterprise Security
  • Research, Development and Collaboration

This course is intended for advanced students and cybersecurity practitioners who will implement cybersecurity. Successful completion of pre-requisite courses in Security+ and CySA+/PenTest+ is highly recommended.

Video Titles Included In this Course
  • 1. Intro CASP
  • 2. CASP Introduction
  • 3. Mod 1.1 Exploring Cloud Services Act
  • 4. Mod 1.1 Acquisition Merger Demerger
  • 5. Mod 1.1 Acquisition Merger Demerger Part2
  • 6. Mod 1.2 Compare and Contrast
  • 7. Mod 1.3 Given Scenario Execute Risk
  • 8. Mod 1.3 Given Scenario Execute Risk Part2
  • 9. Mod 1.3 Continuing Terminology IT Governance
  • 10. Mod 1.4 Analyze Security Solution Metrics and Attributes
  • 11. Mod 1.4 Analyze Risk
  • 12. Mod 1.4 Trend Analysis Act
  • 1. Mod 2 Enterprise Security Architecture
  • 2. Mod 2.1 Network Device Security Act
  • 3. Mod 2.1 Application and Protocol
  • 4. Mod 2.1 Advanced Network Security Act
  • 5. Mod 2.1 Complex Network Security Solution
  • 6. Mod 2.1 Implementing VLANs Switchport Sec Act
  • 7. Mod 2.1 Implementing VLANs Switchport Sec Act Part2
  • 8. Mod 2.1 Distributed Denial of Service
  • 9. Mod 2.1 Exploring DoS Attacks Act
  • 10. Mod 2.1 Security Zones
  • 11. Mod 2.1 Network Access Control
  • 12. Mod 2.1 Searching for Vulnerablie ICS-SCADA Act
  • 13. Mod 2.2 Analyze a Scenario Integrate Security
  • 14. Mod 2.2 Configuring Windows Firewall Act
  • 15. Mod 2.2 Log Monitoring and Auditing
  • 16. Mod 2.2 Group Policy Act
  • 17. Mod 2.2 Patch Management
  • 18. Mod 2.2 Management Interface
  • 19. Mod 2.2 Measured Launch
  • 20. Mod 2.3 Analyze a Scenario to Integrate Security Controls
  • 21. Mod 2.3 Security Implications Privacy
  • 22. Mod 2.3 Baseband
  • 23. Mod 2.4 Given Software Vulnerabilty Scenarios
  • 24. Mod 2.4 SQL Injection Act
  • 25. Mod 2.4 Improper Error and Exception Handling
  • 26. Mod 2.4 Buffer Overflows Act
  • 27. Mod 2.4 Memory Leaks
  • 28. Mod 2.4 Researching Vulnerabilities Exploits Act-
  • 1. Mod 3 Enterprise Security Operations
  • 2. Mod 3 Runtime Debugging
  • 3. Mod 3.1 Fingerprinting an OS Services Act
  • 4. Mod 3.1 Code Review
  • 5. Mod 3.1 Conducting OSINT Act
  • 6. Mod 3.1 Types
  • 7. Mod 3.1 Conducting a Vulnerability Assessment Act
  • 8. Mod 3.2 Analyze a Scenario Output
  • 9. Mod 3.2 Network Sniffing Act
  • 10. Mod 3.2 Security Content Automation
  • 11. Mod 3.2 Using a SCAP Scanner Act
  • 12. Mod 3.2 Network Enumerator
  • 13. Mod 3.2 Password Cracking Act
  • 14. Mod 3.2 Host Vulnerability Scanner
  • 15. Mod 3.2 Using Command Line Tools Act
  • 16. Mod 3.2 OpenSSL
  • 17. Mod 3.2 Scanning for Heartbleed Act
  • 18. Mod 3.2 Local Exploitation Tools
  • 19. Mod 3.2 Verifying File Integrity with SFC Act
  • 20. Mod 3.2 Log Analysis Tools
  • 21. Mod 3.3 Given Scenario Implement Incident
  • 22. Mod 3.3 Facilitate Incident Detection Response
  • 23. Mod 3.3 Using Incident Response Support Tools Act
  • 24. Mod 3.3 Severity of Incident Detection Breach
  • 1. Mod 4 Technical Integration of Enterprise
  • 2. Mod 4 Technical Integration of Enterprise Part2
  • 3. Mod 4.1 DataSecurity Considerations
  • 4. Mod 4.1 Examing Network Diagrams Act
  • 5. Mod 4.1 Security and Privacy Considerations of Storage integration
  • 6. Mod 4.1 Exploring Directory Services and DNS Act
  • 7. Mod 4.2 Given Scenario Integrate Cloud and Virtualization
  • 8. Mod 4.2 Taking Another Look at Cloud Services Act
  • 9. Mod 4.2 Security Advantages and Disadvanatges of Virtualization
  • 10. Mod 4.2 Using Virtualization Act
  • 11. Mod 4.2 Cloud Augmented Security
  • 12. Mod 4.3 Given Scenario Integrate and Troubleshoot Advanced Authentication
  • 13. Mod 4.4 Given Scenario Cryptographic
  • 14. Mod 4.4 Cryptographic Part2
  • 15. Mod 4.4 Mobile Device Encryption
  • 16. Mod 4.4 Cryptography Act
  • 17. Mod 4.5 Select the Appropriate Control
  • 18. Mod 4.5 Phising Act
  • 19. Mod 4.5 Telephony VoIP Integration
  • 1. Mod 5 Research Methods to Determine Industry Trends
  • 2. Mod 5.1 Practicing Threat Intelligence Act
  • 3. Mod 5.2 Scenario Implememt Security Activities Across
  • 4. Mod 5.2 Static Testing
  • 5. Mod 5.3 Explain the Importance of Interaction
  • 6. CASP Conclusion

Description

This course provides advanced-level training in risk management, enterprise security operations and architecture, research and collaboration, and integration of enterprise security. It covers all of the new exam objectives for the CAS-003 exam. The CASP certification is the highest-level security certification offered by CompTIA and is the final step in achieving the new CompTIA Security Analytics Expert (CSAE) or Security Infrastructure Expert (CSIE) stackable certification.

In this course you will advance your skills in the following areas:

  • Risk Management
  • Enterprise Security Architecture
  • Enterprise Security Operations
  • Technical Integration of Enterprise Security
  • Research, Development and Collaboration

This course is intended for advanced students and cybersecurity practitioners who will implement cybersecurity. Successful completion of pre-requisite courses in Security+ and CySA+/PenTest+ is highly recommended.

Video Titles Included In this Course
  • 1. Intro CASP
  • 2. CASP Introduction
  • 3. Mod 1.1 Exploring Cloud Services Act
  • 4. Mod 1.1 Acquisition Merger Demerger
  • 5. Mod 1.1 Acquisition Merger Demerger Part2
  • 6. Mod 1.2 Compare and Contrast
  • 7. Mod 1.3 Given Scenario Execute Risk
  • 8. Mod 1.3 Given Scenario Execute Risk Part2
  • 9. Mod 1.3 Continuing Terminology IT Governance
  • 10. Mod 1.4 Analyze Security Solution Metrics and Attributes
  • 11. Mod 1.4 Analyze Risk
  • 12. Mod 1.4 Trend Analysis Act
  • 1. Mod 2 Enterprise Security Architecture
  • 2. Mod 2.1 Network Device Security Act
  • 3. Mod 2.1 Application and Protocol
  • 4. Mod 2.1 Advanced Network Security Act
  • 5. Mod 2.1 Complex Network Security Solution
  • 6. Mod 2.1 Implementing VLANs Switchport Sec Act
  • 7. Mod 2.1 Implementing VLANs Switchport Sec Act Part2
  • 8. Mod 2.1 Distributed Denial of Service
  • 9. Mod 2.1 Exploring DoS Attacks Act
  • 10. Mod 2.1 Security Zones
  • 11. Mod 2.1 Network Access Control
  • 12. Mod 2.1 Searching for Vulnerablie ICS-SCADA Act
  • 13. Mod 2.2 Analyze a Scenario Integrate Security
  • 14. Mod 2.2 Configuring Windows Firewall Act
  • 15. Mod 2.2 Log Monitoring and Auditing
  • 16. Mod 2.2 Group Policy Act
  • 17. Mod 2.2 Patch Management
  • 18. Mod 2.2 Management Interface
  • 19. Mod 2.2 Measured Launch
  • 20. Mod 2.3 Analyze a Scenario to Integrate Security Controls
  • 21. Mod 2.3 Security Implications Privacy
  • 22. Mod 2.3 Baseband
  • 23. Mod 2.4 Given Software Vulnerabilty Scenarios
  • 24. Mod 2.4 SQL Injection Act
  • 25. Mod 2.4 Improper Error and Exception Handling
  • 26. Mod 2.4 Buffer Overflows Act
  • 27. Mod 2.4 Memory Leaks
  • 28. Mod 2.4 Researching Vulnerabilities Exploits Act-
  • 1. Mod 3 Enterprise Security Operations
  • 2. Mod 3 Runtime Debugging
  • 3. Mod 3.1 Fingerprinting an OS Services Act
  • 4. Mod 3.1 Code Review
  • 5. Mod 3.1 Conducting OSINT Act
  • 6. Mod 3.1 Types
  • 7. Mod 3.1 Conducting a Vulnerability Assessment Act
  • 8. Mod 3.2 Analyze a Scenario Output
  • 9. Mod 3.2 Network Sniffing Act
  • 10. Mod 3.2 Security Content Automation
  • 11. Mod 3.2 Using a SCAP Scanner Act
  • 12. Mod 3.2 Network Enumerator
  • 13. Mod 3.2 Password Cracking Act
  • 14. Mod 3.2 Host Vulnerability Scanner
  • 15. Mod 3.2 Using Command Line Tools Act
  • 16. Mod 3.2 OpenSSL
  • 17. Mod 3.2 Scanning for Heartbleed Act
  • 18. Mod 3.2 Local Exploitation Tools
  • 19. Mod 3.2 Verifying File Integrity with SFC Act
  • 20. Mod 3.2 Log Analysis Tools
  • 21. Mod 3.3 Given Scenario Implement Incident
  • 22. Mod 3.3 Facilitate Incident Detection Response
  • 23. Mod 3.3 Using Incident Response Support Tools Act
  • 24. Mod 3.3 Severity of Incident Detection Breach
  • 1. Mod 4 Technical Integration of Enterprise
  • 2. Mod 4 Technical Integration of Enterprise Part2
  • 3. Mod 4.1 DataSecurity Considerations
  • 4. Mod 4.1 Examing Network Diagrams Act
  • 5. Mod 4.1 Security and Privacy Considerations of Storage integration
  • 6. Mod 4.1 Exploring Directory Services and DNS Act
  • 7. Mod 4.2 Given Scenario Integrate Cloud and Virtualization
  • 8. Mod 4.2 Taking Another Look at Cloud Services Act
  • 9. Mod 4.2 Security Advantages and Disadvanatges of Virtualization
  • 10. Mod 4.2 Using Virtualization Act
  • 11. Mod 4.2 Cloud Augmented Security
  • 12. Mod 4.3 Given Scenario Integrate and Troubleshoot Advanced Authentication
  • 13. Mod 4.4 Given Scenario Cryptographic
  • 14. Mod 4.4 Cryptographic Part2
  • 15. Mod 4.4 Mobile Device Encryption
  • 16. Mod 4.4 Cryptography Act
  • 17. Mod 4.5 Select the Appropriate Control
  • 18. Mod 4.5 Phising Act
  • 19. Mod 4.5 Telephony VoIP Integration
  • 1. Mod 5 Research Methods to Determine Industry Trends
  • 2. Mod 5.1 Practicing Threat Intelligence Act
  • 3. Mod 5.2 Scenario Implememt Security Activities Across
  • 4. Mod 5.2 Static Testing
  • 5. Mod 5.3 Explain the Importance of Interaction
  • 6. CASP Conclusion

Additional information

28 Hours

89 Course Videos

250 Test Questions

You may also like…