Computing, Communication, and Business Integration for CASP (CAS-002)
CompTIA Advanced Security Practitioner is an advanced-level security certification for security professionals in an enterprise, government, or military environment. This course covers domain 4 of the CompTIA CAS-002 certification exam.
What you'll learn
In today's world, workers are more mobile than ever. Tools that enable collaboration provide an unprecedented ability for workers and executives to conduct business from anywhere on the planet. As the tools and capabilities continue to evolve, so do vulnerabilities and the potential for data breaches. In this course, Computing, Communication, and Business Integration for CASP (CAS-002), you'll first learn about the various collaboration tools that exist and the unique security concerns they present. Additionally, you'll learn about change management and development methodologies. Finally, you will learn about asset and security lifecycle management. By the end of this course, you'll have the knowledge needed to both pass the CompTIA CAS-002 certification exam and help secure your company's IT assets from attack.
Table of contents
- Communicating with Stakeholders from Other Disciplines 3m
- Sales Staff 3m
- Programmers 2m
- Database Administrators 2m
- Network Administrators 2m
- Executive Management 2m
- Financial Managers 4m
- Human Resources 1m
- Emergency Response Teams 2m
- Facilities and Physical Security Managers 2m
- Providing Objective Guidance 2m
- Establishing Effective Collaboration Within Teams 2m
- IT Governance 3m
- Module Intro and Security of Unified Collaboration Tools 2m
- Web and Video Conferencing 4m
- Instant Messaging 3m
- Desktop Sharing 2m
- Remote Assistance and Remote Access Security 4m
- Presence and Presence Security Concerns 4m
- Email and Email Security Concerns 5m
- Telephony and VoIP Security 3m
- Collaboration Sites and Social Media 3m
- Cloud-based Collaboration 3m
- Remote Access and VPNs 4m
- Mobile Device Management and BYOD Concerns 7m
- Over-the-air Technologies 5m
- Module Intro and End-to-end Solution Ownership 4m
- Operational Activities 2m
- Maintenance 4m
- Change Management/Rollback Assessment 2m
- Commission/Decommission of Assets 2m
- Asset Disposal 2m
- Asset/Object Reuse 1m
- General Change Management 1m
- SDLC 3m
- NIST SP 800-64 and Session Initiation Phase 2m
- Systems Acquisition/Development Phase 1m
- Implementation/Assessment Phase 1m
- Operations/Maintenance Phase 1m
- Disposal/Sunset Phase 1m
- Security Requirements Traceability Matrix (SRTM) 1m
- Validation and Acceptance Testing 2m
- Agile Software Development 1m
- Waterfall and Spiral Development Methods 3m
- Adapt Solutions to Address Emerging Security Trends 2m
- Asset Management, Inventory Control, and RFID 4m