Research and Analysis for CASP (CAS-002)
CompTIA Advanced Security Practitioner is an advanced-level security certification for security professionals in an enterprise, government, or military environment. This course covers domain 3 of the CompTIA CAS-002 certification exam.
What you'll learn
Computer security experts are needed by companies of all sizes and in every industry. New hacks are discovered daily including theft of user information, intellectual property, company secrets, and more. In this course, Research and Analysis for CASP (CAS-002), you'll learn about best practices for identifying new and emerging threats. Next, you will learn about the importance of emergency response plans and teams, understanding the bid process, and contracting with third party providers. Lastly, you will gain an understanding of return on investment (ROI), total cost of ownership (TCO), and how to properly prioritize workload and resources to ensure security demands are met. By the end of this course, you'll have the knowledge needed to both pass the CompTIA CAS-002 certification exam and help secure your company's IT assets from attack.
Table of contents
- Module Overview 2m
- Perform Ongoing Research 2m
- Best Practices 2m
- New Technologies 3m
- New Security Systems and Services 4m
- Technology Evolution, RFCs, and ISO 2m
- Situational Awareness 1m
- Latest Client-side Attacks 2m
- Knowledge of Current Vulnerabilities and Threats 4m
- Zero-day Mitigating Controls and Remediation 5m
- Emergent Threats and Issues 2m
- Research Security Implications of New Business Tools/Social Media 4m
- End-user Cloud Storage 2m
- Global IA Industry / Community 2m
- CERT and US-CERT 2m
- Conventions and Conferences 2m
- Threat Actors 3m
- Research Security Requirements for Contracts 2m
- RFQ, RFP, RFIs 4m
- Module Overview 1m
- Create Benchmarks and Compare to Baselines 3m
- Prototyping, Cost Benefit Analysis, and ROI 4m
- Total Cost of Ownership (TCO) 1m
- Metrics Collection and Analysis 2m
- Analyze and Interpret Trend Data 2m
- Reviewing Effectiveness of Security Controls 2m
- Reverse Engineer/Deconstruct Existing Security Solutions 3m
- Security Solution Attributes 8m
- Lessons Learned, After Action Reports, and Using Judgment 7m