Enterprise Security for CASP (CAS-002)
CompTIA Advanced Security Practitioner is an advanced-level security certification for security professionals in an enterprise, government, or military environment. This course covers domain 1 of the CompTIA CAS-002 certification exam.
What you'll learn
User data, company secrets, intellectual property, critical infrastructure, and more are all vulnerable if not secured and constantly maintained. In this course, Enterprise Security for CASP (CAS-002), you'll first learn all about cryptographic concepts and encryption methods. Next, you will learn about enterprise storage concepts and technologies. Finally, you'll learn about host security and application vulnerability issues. By the end of this course, you'll have the knowledge needed to both pass the CompTIA CAS-002 certification exam and help secure your company's IT assets from attack.
Table of contents
- Course Intro, DoD 8570 and 8140 Compliance 3m
- Module Overview 3m
- Pseudo-random Number Generators and Encryption Types 4m
- Cryptographic Concepts 3m
- Chain of Trust and Root of Trust 5m
- Cryptographic Methods and Design, EBC, CBC, OFB, and CFB 4m
- Cryptographic Considerations 2m
- DRM 3m
- Watermarking 3m
- S/MIME and Secure Mail Considerations 3m
- Module Intro 1m
- Virtual Storage 4m
- Cloud Storage 3m
- Data Warehousing/Data Archiving 6m
- NAS and SAN 4m
- Storage Protocols - FCoE, iSCSI, CIFS, and NFS 5m
- Multipath 3m
- Snapshots 2m
- Deduplication 1m
- Dynamic Disk Pools 1m
- LUN Masking and Zoning 1m
- HBA Allocation and Offsite Replication 3m
- Encryption Types: Disk, Block, File, Record, and Port 5m
- Module Overview and VNC Remote Control Software 2m
- Mesh Networks 2m
- Inline Network Encryptor (INE) 2m
- Security Information and Event Management (SIEM) 1m
- Placement of Devices 2m
- SSL Inspection and Network Data Flow 2m
- Secure Configuration and Baselining 2m
- Change Management 5m
- Software-defined Networking 4m
- Cloud-managed Networks 3m
- VLANs, Trunking, and VLAN Hopping 3m
- Module Overview 2m
- Command Shell Restrictions 2m
- Configuring Dedicated Interfaces and out of Band NICs 4m
- Peripheral Restrictions and Firewire 2m
- Security Advantages and Disadvantages of Virtualizing Servers 6m
- Cloud-augmented Security Services/Hash Matching 4m
- Content Filtering 2m
- Secure Boot and Measured Launch 3m
- IMA and UEFI 1m
- VM Escape 2m
- Privilege Elevation 1m
- Live VM Migration 2m
- Data Remnants 2m
- VDI, Terminal Services, and Application Delivery Services 4m
- Virtual TPM 3m
- Module Overview 1m
- Security by Design, Default, and Deployment 3m
- Insecure Direct Object References 2m
- Memory Leaks 1m
- Race Conditions 2m
- Time of Check/Time of Use 1m
- Resource Exhaustion 2m
- Geo-tagging 2m
- Application Security Frameworks and Standard Libraries 2m
- Industry-accepted Approaches 1m
- Web Services Security (WS-Security) 1m
- JSON/REST 1m
- Browser Extensions and Active X 2m
- Java Applets 3m
- HTML5 1m
- AJAX 3m
- SOAP 1m
- State Management 2m
- JavaScript 1m
- Module Review 1m