Request new password

We Are All About You

XpertSkills - the parent company under which iCollege operates - was established in South Africa in 2003 and since then, we have grown globally in leaps and bounds with customers and partners in more than 120 countries. With employees on 3 continents and as a next-generation, virtual organization we are unconstrained by the limits that are usually associated with traditional “brick & mortar” companies.

This allows us to focus, without distraction, on reaching our ultimate goal – ensuring your ongoing success – by providing affordable, reliable, high quality and relevant learning products whilst remaining innovative and agile.

Contact Details:

Web: www.xpertskills.com
Skype: xpertskills
Mail: info@xpertskills.com

Physical Address:

Head Office - South Africa
16 Monte Carlo Crescent
Kyalami business Park
Johannesburg
South Africa 1684

You are here

CompTIA Advanced Security Practitioner (CASP) CAS-002

EDUTAINMENT COURSE:

CompTIA Advanced Security Practitioner (CASP) CAS-002

Interactive and entertaining talk-show style format presented by industry leading experts.
Overview

CompTIA Advanced Security (CASP+) is the only hands-on, performance-based certification for advanced security practitioners. This learning path covers the five CASP+ CAS-003 domains. Get the skills to become certified, from enterprise security architecture to research, development, and collaboration. There is no required prerequisite for this course however, the CASP certification is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus at the enterprise level.

Objectives
  • Integrate network and security components, concepts, and architectures
  • Integrate security controls for host devices
  • Integrate controls for mobile and small form factor devices
  • Select software security controls
  • Conduct security assessments
  • Select the proper security assessment tools
  • Implement incident response and recovery
  • Integrate hosts, storage, and applications in the enterprise
  • Integrate cloud and virtualization technologies in the enterprise
  • Integrate and troubleshoot advanced AAA technologies
  • Implement cryptographic techniques
  • Secure communication and collaboration solutions
  • Apply research methods for trend and impact analysis
  • Implement security activities across the technology lifecycle
  • Interact across diverse business units
Prerequisites

CompTIA requires that anyone taking the CASP exam has 10 years of experience in IT administration, including at least 5 years of hands-on technical security experience.

Target Audience
  • IT security professionals who have a minimum of 10 years of experience in IT administration, including at least 5 years of hands-on technical security experience
  • Systems/network/application security professionals who are preparing for the CASP exam
  • Any IT professional who wants to gain an advanced understanding of how to secure modern enterprises beyond the Security+ or SSCP certifications.

Module 1: Underlying Security Models

1.0 Course Guide

1.1 Underlying Security Models Part 1

1.2 Underlying Security Models Part 2

1.3 Underlying Security Models Part 3

1.4 Underlying Security Models Part 4

1.5 Underlying Security Models Part 5

1.6 Underlying Security Models Part 6

1.7 Underlying Security Models Part 7

1.8 General Security Part 1

1.9 General Security Part 2

Module 2: Selecting Security

2.0 Selecting Security Products Part 1

2.1 Selecting Security Products Part 2

2.2 Selecting Security Products Part 3

2.3 Control Selection Process Part 1

2.4 Control Selection Process Part 2

Module 3: Cryptography

3.0 Cryptography Symmetric and Asymmetric Part 1

3.1 Cryptography Symmetric and Asymmetric Part 2

3.2 Cryptography Symmetric and Asymmetric Part 3

3.3 Cryptography Symmetric and Asymmetric Part 4

3.4 Cryptography Message Integrity Controls Part 1

3.5 Cryptography Message Integrity Controls Part 2

3.6 Cryptography Message Integrity Controls Part 3

3.7 Cryptography Digital Signatures Part 1

3.8 Cryptography Digital Signatures Part 2

3.9 Cryptography PKI and PGP Part 1

3.10 Cryptography PKI and PGP Part 2

3.11 Cryptography PKI and PGP Part 3

3.12 Cryptography PKI and PGP Part 4

Module 4: Storage

4.0 Storage Part 1

4.1 Storage Part 2

4.2 Storage Part 3

4.3 Storage Part 4

Module 5: Virtual Computing

5.0 Virtual Computing

5.1 Cloud Computing Part 1

5.2 Cloud Computing Part 2

5.3 Cloud Computing Part 3

5.4 Cloud Computing Part 4

5.5 Cloud Computing Part 5

Module 6: IPv6

6.0 IPV6 Part 1

6.1 IPV6 Part 2

Module 7: Remote Access Security

7.0 Remote Access Security Part 1

7.1 Remote Access Security Part 2

Module 8: Domain Name System

8.0 Domain Name System Part 1

8.1 Domain Name System Part 2

8.2 Domain Name System Part 3

8.3 Domain Name System Part 4

8.4 Domain Name System Part 5

8.5 Domain Name System Part 6

8.6 Domain Name System Part 7

8.7 Domain Name System Part 8

Module 9: Directory Services

9.0 Directory Services

Module 10: Firewall and VPN

10.0 Firewall and VPN Part 1

10.1 Firewall and VPN Part 2

10.2 Firewall and VPN Part 3

10.3 Firewall and VPN Part 4

10.4 Firewall Policy Part 1

10.5 Firewall Policy Part 2

10.6 Firewall Policy Part 3

10.7 Firewall Policy Part 4

Module 11: Security Configuration Management

11.0 Security Configuration Management Part 1

11.1 Security Configuration Management Part 2

11.2 Security Configuration Management Part 3

Module 12: Network Infrastructure Security

12.0 Network Infrastructure Security Part 1

12.1 Network Infrastructure Security Part 2

12.2 Network Infrastructure Security Part 3

12.3 Network Infrastructure Security Part 4

Module 13: Secure Web Services

13.0 Secure Web Services Part 1

13.1 Secure Web Services Part 2

13.2 OWASP top Ten Part 1

13.3 OWASP top Ten Part 2

13.4 OWASP top Ten Part 3

13.5 OWASP top Ten Part 4

13.6 OWASP top Ten Part 5

Module 14: Buffer Overflows

14.0 Buffer Overflows Part 1

14.1 Buffer Overflows Part 2

Module 15: SQL Injection

15.0 SQL Injection Part 1

15.1 SQL Injection Part 2

Module 16: Access Control

16.0 Access Control Part 1

16.1 Access Control Part 2

Module 17: Single Sign-On

17.0 Single Sign-On Part 1

17.1 Single Sign-On Part 2

17.2 Single Sign-On Part 3

Module 18: Risk Assessment

18.0 Risk Assessment Part 1

18.1 Risk Assessment Part 2

Module 19: Testing and Assessment

19.0 Testing and Assessment Part 1

19.1 Testing and Assessment Part 2

19.2 Testing and Assessment Part 3

Module 20: Common Vulnerability

20.0 Common Vulnerability Scoring System Part 1

20.1 Common Vulnerability Scoring System Part 2

20.2 Common Vulnerability Scoring System Part 3

20.3 Common Vulnerability Scoring System Part 4

Module 21: Common Criteria

21.0 Common Criteria Part 1

21.1 Common Criteria Part 2

21.2 Common Criteria Part 3

21.3 Common Criteria Part 4

21.4 Common Criteria Part 5

Module 22: Personally Identifiable Information

22.0 Personally Identifiable Information Part 1

22.1 Personally Identifiable Information Part 2

Module 23: Risk Management

23.0 Risk Management Part 1

23.1 Risk Management Part 2

23.2 Risk Management Part 3

Module 24: Frameworks

24.0 Frameworks Part 1

24.1 Frameworks Part 2

24.2 Frameworks Part 3

24.3 Frameworks Part 4

Module 25: Interconnecting Systems

25.0 Interconnecting Systems Part 1

25.1 Interconnecting Systems Part 2

Module 26: Security Services

26.0 Security Services Part 1

26.1 Security Services Part 2

26.2 Security Services Part 3

26.3 Security Services Part 4

Module 27: Continuous Monitoring

27.0 Continuous Monitoring Part 1

27.1 Continuous Monitoring Part 2

27.2 Continuous Monitoring Part 3

27.3 Continuous Monitoring Part 4

Module 28: Incident Handling

28.0 Incident Handling Part 1

28.1 Incident Handling Part 2

28.2 Incident Handling Part 3

28.3 Incident Handling Part 4

Module 29: Forensic & Incident Response

29.0 Forensic and Incident Response Part 1

29.1 Forensic and Incident Response Part 2

29.2 Forensic and Incident Response Part 3

Module 30: Requirements Processing

30.0 Requirements Processing Part 1

30.1 Requirements Processing Part 2

30.2 Requirements Processing Part 3

Module 31: Standards Bodies

31.0 Standards Bodies

Module 32: Secure System Life Cycle

32.0 Secure System Life Cycle Part 1

32.1 Secure System Life Cycle Part 2

32.2 Secure System Life Cycle Part 3

Module 33: Email

33.0 Email

Module 34: Mobile and BYOD

34.0 Mobile and BYOD Part 1
34.1 Mobile and BYOD Part 2

Module 35: Voiceover IP

35.0 Voice over IP

Module 36: Physical Facilities Assessment Process

36.0 Physical Facilities Assessment Process Part 1

36.1 Physical Facilities Assessment Process Part 2

Module 37: Security Requirements Traceability Matrix

37.0 Security Requirements Traceability Matrix

  1. CASP - Module 0
1
Start
Course Introduction
  1. CASP - Module 1
2
Start
Business Influences and Associated Security Risks
3
Start
Risk Management
4
Start
Business Model Strategies
5
Start
Integrating Diverse Industries
6
Start
Third Party Information Security and Providers
7
Start
Internal and External Influences
8
Start
Impact of De-Perimeterization
  1. CASP - Module 2
9
Start
Risk Mitigation Planning - Strategies and Controls
10
Start
CIA Triad
11
Start
Business Classifications
12
Start
Information Life Cycle and Steak-Holder Input
13
Start
Implementing Technical Controls
14
Start
Determine Aggregate CIA Score
15
Start
Worst Case Scenario Planning
16
Start
Calculation Tools and Attacker Motivation
17
Start
Return Of Investment
18
Start
Total Cost of Ownership and Risk Strategies
19
Start
Risk Management Process
20
Start
Identifying Vulnerabilities and Threats
21
Start
Security Architecture Frameworks
22
Start
Business Continuity Planning
23
Start
IT Governance
24
Start
Security Policies
  1. CASP - Module 3
25
Start
Security-Privacy Policies and Procedures
25
Start
Security-Privacy Policies and Procedures
26
Start
Policy Development Updates
27
Start
Developing Processes and Procedures
28
Start
Legal Compliance
28
Start
Legal Compliance
29
Start
Security Policy Business Documents
30
Start
Outage Impact and Estimating Downtime Terms
31
Start
Sensitive Information-Internal Security Policies
32
Start
Incident Response Process
33
Start
Forensic Tasks
34
Start
Employment and Termination Procedures
35
Start
Network Auditing
  1. CASP - Module 4
36
Start
Incident Response and Recovery Procedures
37
Start
E-Discovery and Data Retention Policies
38
Start
Data Recovery-Storage and Backup Schemes
39
Start
Data Owner and Data Handling
40
Start
Disposal Terms and Concepts
41
Start
Data Breach and Data Analysis
42
Start
Incident Response Guidelines
43
Start
Incident and Emergency Response
44
Start
Media-Software and Network Analysis
45
Start
Order of Volatility
  1. CASP - Module 5
46
Start
Industry Trends Overview
47
Start
Performing Ongoing Research
48
Start
Security Practices
49
Start
Evolution of Technology
50
Start
Situational Awareness and Vulnerability Assessments
51
Start
Researching Security Implications
52
Start
Global Industry Security Response
53
Start
Threat Actors
54
Start
Contract Security Requirements
55
Start
Contract Documents
  1. CASP - Module 6
56
Start
Securing the Enterprise Overview
57
Start
Benchmarks and Baselines
58
Start
Prototyping and Testing Multiple Solutions
59
Start
Cost/Benefit Analysis
60
Start
Metrics Collection and Trend Data
61
Start
Security Controls-Reverse Engineering and Deconstructing
62
Start
Security Solutions Business Needs
63
Start
Lesson Learned- After Action Report
  1. CASP - Module 7
64
Start
Assessment Tools and Methods
65
Start
Port Scanners and Vulnerability Scanners
66
Start
Protocol Analyzer- Network Enumerator-Password Cracker
67
Start
Fuzzers and HTTP Interceptors
68
Start
Exploitation Tools
69
Start
Passive Reconnaissance Tools
70
Start
Vulnerability Assessments and Malware Sandboxing
71
Start
Memory Dumping and Penetration Testing
72
Start
Reconnaissance and Fingerprinting
73
Start
Code Review
74
Start
Social Engineering
  1. CASP - Module 8
75
Start
Social Cryptographic Concepts and Techniques
76
Start
Cryptographic Benefits and Techniques
77
Start
Hashing Algorithms
78
Start
Message Authentication Code
79
Start
Cryptographic Concepts
80
Start
Transport Encryption Protocol
81
Start
Symmetric Algorithms
82
Start
Asymmetric Algorithms
83
Start
Hybrid Encryption and Digital Signatures
84
Start
Public Key Infrastructure
85
Start
Digital Certificate Classes and Cypher Types
86
Start
Des Modes
87
Start
Cryptographic Attacks
88
Start
Strength vs Performance and Cryptographic Implementations
  1. CASP - Module 9
89
Start
Enterprise Storage
90
Start
Virtual Storage Types and Challenges
91
Start
Cloud Storage
92
Start
Data Warehousing
93
Start
Data Archiving
94
Start
Storage Area Networks (SANs) and (VSANs)
95
Start
Network Attached Storage (NAS)
96
Start
Storage Protocols and Fiber Channel over Ethernet (FCoE)
97
Start
Storage Network File Systems
98
Start
Secure Storage Management Techniques
99
Start
LUN Masking/Mapping and HBA Allocation
100
Start
Replication and Encryption Methods
  1. CASP - Module 10
101
Start
Network and Security Components-Concepts-Security Architectures
102
Start
Remote Access Protocols
103
Start
IPv6 and Transport Encryption
104
Start
Network Authentication Methods
105
Start
802.1x and Mesh Networks
106
Start
Security Devices
107
Start
Network Devices
108
Start
Firewalls
109
Start
Wireless Controllers
110
Start
Router Security and Port Numbers
111
Start
Network Security Solutions
112
Start
Availability Controls-Terms and Techniques
113
Start
Advanced Router and Switch Configuration
114
Start
Data Flow Enforcement of Applications and Networks
115
Start
Network Device Accessibility and Security
  1. CASP - Module 11
116
Start
Security Controls for Hosts
117
Start
Trusted Operation Systems
118
Start
Endpoint Security Software and Data Loss Prevention
119
Start
Host Based Firewalls
120
Start
Log Monitoring and Host Hardening
121
Start
Standard Operating Environment and Group Policy Security
122
Start
Command Shell Restrictions
123
Start
Configuring and Managing Interface Security
124
Start
USB-Bluetooth-Firewire Restrictions and Security
125
Start
Full Disk Encryption
126
Start
Virtualization Security
127
Start
Cloud Security Services
128
Start
Boot Loader Protections
129
Start
Virtual Host Vulnerabilities
130
Start
Virtual Desktop Infrastructure
131
Start
Terminal Services
132
Start
Virtual TPM
  1. CASP - Module 12
133
Start
Application Vulnerabilities and Security Controls
134
Start
Web Application Security Design
135
Start
Specific Application Issues
136
Start
Session Management
137
Start
Input Validation
138
Start
Web Vulnerabilities and Input Mitigation Issues
139
Start
Buffer Overflow and other Application Issues
140
Start
Application Security Framework
141
Start
Web Service Security and Secure Coding Standards
142
Start
Software Development Methods
143
Start
Monitoring Mechanisms and Client-Server Side Processing
144
Start
Browser Extensions and Other Web Development Techniques
  1. CASP - Module 13
145
Start
Host-Storage-Network and Application Integration
146
Start
Securing Data Flows
147
Start
Standards Concepts
148
Start
Interoperability Issues
149
Start
In House Commercial and Customized Applications
150
Start
Cloud and Virtualization Models
151
Start
Logical and Physical Deployment Diagrams
152
Start
Secure Infrastructure Design
153
Start
Storage Integration Security
154
Start
Enterprise Application Integration Enablers
  1. CASP - Module 14
155
Start
Authentication and Authorization Technologies
156
Start
Authentication and Identity Management
157
Start
Password Types-Management and Policies
158
Start
Authentication Factors
159
Start
Biometrics
160
Start
Dual-Multi Factor and Certificate Authentication
161
Start
Single Sign On Issues
162
Start
Access Control Models and Open Authorization
163
Start
Extensible Access Control Markup Language (XACML)
164
Start
Service Provisioning Markup Language (SPML)
165
Start
Attestation and Identity Propagation
166
Start
Federation and Security Assertion Markup Language (SAML)
167
Start
OpenID-Shibboleth and WAYF
168
Start
Advanced Trust Models
  1. CASP - Module 15
169
Start
Business Unit Collaboration
170
Start
Identifying and Communicating Security Requirements
171
Start
Security Controls Recommendations
172
Start
Secure Solutions Collaboration
  1. CASP - Module 16
173
Start
Secure Communication and Collaboration
174
Start
Web-Video Conferencing-Instant Messaging
175
Start
Desktop Sharing
176
Start
Presence Guidelines
177
Start
Email Messaging Protocol
178
Start
Telephony-VoIP and Social Media
179
Start
Cloud Based Collaboration
180
Start
Remote Access and IPsec
181
Start
Mobile and Personal Device Management
182
Start
Over Air Technology Concerns
183
Start
WLAN Concepts-Terms-Standards
184
Start
WLAN Security and Attacks
  1. CASP - Module 17
185
Start
Security Across the Technology Life Cycle
186
Start
End to End Solution Ownership
187
Start
System Development Life Cycle
188
Start
Security Implications of Software Development Methodologies
189
Start
Asset Management
190
Start
Course End
EDUTAINMENT COURSE E-Learning
?Interactive and entertaining talk-show style format presented by industry leading experts.
  • 07:59:26
    Hours of learning
  • Presented by highly qualified, industry leading experts
  • 12 Months access
Back to Top