CompTIA Advanced Security Practitioner (CASP)

Select currency

CompTIA Advanced Security Practitioner (CASP)
Test scorm
Enquire Now

CompTIA's CASP - CompTIA Advanced Security Practitioner , is a vendor-neutral certification that validates IT professionals with advanced-level security skills and knowledge. This certification course covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments.read more

Module 1: Underlying Security Models

1.0 Course Guide

1.1 Underlying Security Models Part 1

1.2 Underlying Security Models Part 2

1.3 Underlying Security Models Part 3

1.4 Underlying Security Models Part 4

1.5 Underlying Security Models Part 5

1.6 Underlying Security Models Part 6

1.7 Underlying Security Models Part 7

1.8 General Security Part 1

1.9 General Security Part 2

Module 2: Selecting Security

2.0 Selecting Security Products Part 1

2.1 Selecting Security Products Part 2

2.2 Selecting Security Products Part 3

2.3 Control Selection Process Part 1

2.4 Control Selection Process Part 2

Module 3: Cryptography

3.0 Cryptography Symmetric and Asymmetric Part 1

3.1 Cryptography Symmetric and Asymmetric Part 2

3.2 Cryptography Symmetric and Asymmetric Part 3

3.3 Cryptography Symmetric and Asymmetric Part 4

3.4 Cryptography Message Integrity Controls Part 1

3.5 Cryptography Message Integrity Controls Part 2

3.6 Cryptography Message Integrity Controls Part 3

3.7 Cryptography Digital Signatures Part 1

3.8 Cryptography Digital Signatures Part 2

3.9 Cryptography PKI and PGP Part 1

3.10 Cryptography PKI and PGP Part 2

3.11 Cryptography PKI and PGP Part 3

3.12 Cryptography PKI and PGP Part 4

Module 4: Storage

4.0 Storage Part 1

4.1 Storage Part 2

4.2 Storage Part 3

4.3 Storage Part 4

Module 5: Virtual Computing

5.0 Virtual Computing

5.1 Cloud Computing Part 1

5.2 Cloud Computing Part 2

5.3 Cloud Computing Part 3

5.4 Cloud Computing Part 4

5.5 Cloud Computing Part 5

Module 6: IPv6

6.0 IPV6 Part 1

6.1 IPV6 Part 2

Module 7: Remote Access Security

7.0 Remote Access Security Part 1

7.1 Remote Access Security Part 2

Module 8: Domain Name System

8.0 Domain Name System Part 1

8.1 Domain Name System Part 2

8.2 Domain Name System Part 3

8.3 Domain Name System Part 4

8.4 Domain Name System Part 5

8.5 Domain Name System Part 6

8.6 Domain Name System Part 7

8.7 Domain Name System Part 8

Module 9: Directory Services

9.0 Directory Services

Module 10: Firewall and VPN

10.0 Firewall and VPN Part 1

10.1 Firewall and VPN Part 2

10.2 Firewall and VPN Part 3

10.3 Firewall and VPN Part 4

10.4 Firewall Policy Part 1

10.5 Firewall Policy Part 2

10.6 Firewall Policy Part 3

10.7 Firewall Policy Part 4

Module 11: Security Configuration Management

11.0 Security Configuration Management Part 1

11.1 Security Configuration Management Part 2

11.2 Security Configuration Management Part 3

Module 12: Network Infrastructure Security

12.0 Network Infrastructure Security Part 1

12.1 Network Infrastructure Security Part 2

12.2 Network Infrastructure Security Part 3

12.3 Network Infrastructure Security Part 4

Module 13: Secure Web Services

13.0 Secure Web Services Part 1

13.1 Secure Web Services Part 2

13.2 OWASP top Ten Part 1

13.3 OWASP top Ten Part 2

13.4 OWASP top Ten Part 3

13.5 OWASP top Ten Part 4

13.6 OWASP top Ten Part 5

Module 14: Buffer Overflows

14.0 Buffer Overflows Part 1

14.1 Buffer Overflows Part 2

Module 15: SQL Injection

15.0 SQL Injection Part 1

15.1 SQL Injection Part 2

Module 16: Access Control

16.0 Access Control Part 1

16.1 Access Control Part 2

Module 17: Single Sign-On

17.0 Single Sign-On Part 1

17.1 Single Sign-On Part 2

17.2 Single Sign-On Part 3

Module 18: Risk Assessment

18.0 Risk Assessment Part 1

18.1 Risk Assessment Part 2

Module 19: Testing and Assessment

19.0 Testing and Assessment Part 1

19.1 Testing and Assessment Part 2

19.2 Testing and Assessment Part 3

Module 20: Common Vulnerability

20.0 Common Vulnerability Scoring System Part 1

20.1 Common Vulnerability Scoring System Part 2

20.2 Common Vulnerability Scoring System Part 3

20.3 Common Vulnerability Scoring System Part 4

Module 21: Common Criteria

21.0 Common Criteria Part 1

21.1 Common Criteria Part 2

21.2 Common Criteria Part 3

21.3 Common Criteria Part 4

21.4 Common Criteria Part 5

Module 22: Personally Identifiable Information

22.0 Personally Identifiable Information Part 1

22.1 Personally Identifiable Information Part 2

Module 23: Risk Management

23.0 Risk Management Part 1

23.1 Risk Management Part 2

23.2 Risk Management Part 3

Module 24: Frameworks

24.0 Frameworks Part 1

24.1 Frameworks Part 2

24.2 Frameworks Part 3

24.3 Frameworks Part 4

Module 25: Interconnecting Systems

25.0 Interconnecting Systems Part 1

25.1 Interconnecting Systems Part 2

Module 26: Security Services

26.0 Security Services Part 1

26.1 Security Services Part 2

26.2 Security Services Part 3

26.3 Security Services Part 4

Module 27: Continuous Monitoring

27.0 Continuous Monitoring Part 1

27.1 Continuous Monitoring Part 2

27.2 Continuous Monitoring Part 3

27.3 Continuous Monitoring Part 4

Module 28: Incident Handling

28.0 Incident Handling Part 1

28.1 Incident Handling Part 2

28.2 Incident Handling Part 3

28.3 Incident Handling Part 4

Module 29: Forensic & Incident Response

29.0 Forensic and Incident Response Part 1

29.1 Forensic and Incident Response Part 2

29.2 Forensic and Incident Response Part 3

Module 30: Requirements Processing

30.0 Requirements Processing Part 1

30.1 Requirements Processing Part 2

30.2 Requirements Processing Part 3

Module 31: Standards Bodies

31.0 Standards Bodies

Module 32: Secure System Life Cycle

32.0 Secure System Life Cycle Part 1

32.1 Secure System Life Cycle Part 2

32.2 Secure System Life Cycle Part 3

Module 33: Email

33.0 Email

Module 34: Mobile and BYOD

34.0 Mobile and BYOD Part 1
34.1 Mobile and BYOD Part 2

Module 35: Voiceover IP

35.0 Voice over IP

Module 36: Physical Facilities Assessment Process

36.0 Physical Facilities Assessment Process Part 1

36.1 Physical Facilities Assessment Process Part 2

Module 37: Security Requirements Traceability Matrix

37.0 Security Requirements Traceability Matrix

Interface to navigate the videos is the worst. How about a 'next' button that will open the next video instead of having to manually close the browser window?

by r0yster