O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CompTIA Advanced Security Practitioner CAS-003

Video Description

The CompTIA Advanced Security Practitioner course is a preparatory course for the exam CAS-003 conducted by The Computing Technology Industry Association (CompTIA). It covers the exam topics in detail and prepares the students in the areas of risk management; enterprise security operations and architecture; research and collaboration; and integration of enterprise security. This certification course covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers, while managing risk. There is no required prerequisite for this course however, the CASP certification is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus at the enterprise level. We recommend that students have a minimum of ten years of experience in IT administration, including at least five years of hands-on technical security experience.

Table of Contents

  1. Course Introduction
    1. Course Introduction 00:03:23
    2. Instructor Introduction 00:01:35
  2. Chapter 01 - Understanding Risk Management
    1. Chapter Introduction 00:02:15
    2. Topic A: Understanding Business and Industry Influences 00:00:10
    3. Ongoing Risk Management 00:01:17
    4. New Products and User Behaviors 00:03:43
    5. Business Models and Strategies 00:03:26
    6. Cloud Technologies 00:04:47
    7. Acquisitions and Mergers 00:03:08
    8. Due Diligence Team 00:01:06
    9. Data Ownership 00:01:30
    10. Data Reclassification 00:01:00
    11. Integrating Diverse Industries 00:05:02
    12. Common Regulations 00:05:09
    13. Geographic Differences 00:02:25
    14. Data Sovereignty 00:00:54
    15. Internal and External Influences 00:05:33
    16. De-perimeterization 00:01:07
    17. Understand Changes in Network Boundaries 00:06:54
    18. Topic B: Policies and Procedures 00:00:23
    19. Understanding Policies and Procedures 00:01:34
    20. Policy Life Cycle 00:01:29
    21. Process Life Cycle 00:01:31
    22. Reviewing Policies and Processes 00:03:45
    23. Common Business Documents 00:04:45
    24. Security for Contracts 00:01:14
    25. Contract Requirements 00:01:55
    26. General Privacy Principles 00:01:14
    27. Standard Security Practices 00:11:29
    28. Demo - Examining Security Policies 00:07:11
    29. Topic C: Risk Mitigation and Control 00:00:25
    30. Introduction to Risk Mitigation 00:01:01
    31. Categorizing Data 00:03:49
    32. Incorporating Stakeholder Input 00:01:18
    33. Aggregate CIA Scores 00:01:37
    34. Selecting and Implementing Controls 00:04:11
    35. Security Control Frameworks 00:00:51
    36. Options for Frameworks 00:04:40
    37. Extreme Scenario Planning 00:02:41
    38. System-Specific Risk Analysis 00:01:13
    39. Qualitative Risk Analysis 00:01:40
    40. Quantitative Risk Analysis 00:01:06
    41. Risk Impact 00:03:09
    42. Likelihood of Threat 00:00:49
    43. Return on Investment 00:01:52
    44. Understanding Payback 00:02:05
    45. Total Cost of Ownership 00:01:24
    46. TCO Guidelines 00:01:23
    47. Translate to Business Terms 00:01:31
    48. Risk Management Strategies 00:02:09
    49. Risk Management Processes 00:01:06
    50. Information and Asset Value and Costs 00:00:49
    51. Vulnerabilities and Threat Identification 00:01:06
    52. Additional Factors 00:01:34
    53. Topic D: Business Continuity Planning 00:00:22
    54. Continuity Planning 00:00:20
    55. BCP Components 00:01:51
    56. BCP Steps 00:02:39
    57. Additional Plans 00:01:49
    58. Conducting Business Impact Analysis 00:04:58
    59. Chapter 01 Review 00:01:03
  3. Chapter 02 - Network and Security Components and Architecture
    1. Chapter Introduction 00:00:34
    2. Topic A: Physical and Virtual Network Security Devices 00:00:16
    3. Unified Threat Management 00:01:19
    4. Analyzing UTM 00:01:31
    5. Intrusion Detection and Prevention 00:05:13
    6. In-Line Network Encryptor 00:01:32
    7. Network Access Control 00:03:02
    8. SIEM 00:01:16
    9. Firewalls 00:07:06
    10. Firewall Architecture 00:05:16
    11. Wireless Controller 00:01:49
    12. Routers and Switches 00:02:09
    13. Proxy Servers 00:01:30
    14. Topic B: Application and Protocol Level Security 00:00:29
    15. Web Application Firewalls 00:01:46
    16. Hardware Security Modules 00:01:51
    17. Vulnerability Scanners 00:02:11
    18. Topic C: Advanced Network Design 00:00:32
    19. Virtual Private Networks 00:02:51
    20. VPN Protocols 00:01:58
    21. IP Security (IPSec) 00:03:01
    22. IPSec Modes 00:01:02
    23. Demo - Examining IPSec Policies 00:09:29
    24. Secure Sockets Layer (SSL) 00:01:45
    25. Transport Layer Security (TLS) 00:01:01
    26. Additional Security Protocols 00:03:26
    27. Authentication Protocols 00:04:46
    28. Topic D: Network Solutions for Data Flow 00:00:36
    29. Data Loss Prevention 00:02:49
    30. Data Flow Enforcement 00:02:01
    31. Network Flow 00:01:32
    32. Topic E: Secure Baselines of Networking and Security Components 00:00:31
    33. Securing Device Configurations 00:00:26
    34. Access Control Lists (ACLs) 00:00:43
    35. ACL Rule Sets 00:02:05
    36. Change Monitoring 00:01:31
    37. Configuration Lockdown 00:00:51
    38. Availability Controls 00:03:30
    39. Disk Availability 00:03:57
    40. Key Availability Terms 00:01:25
    41. Topic F: Advanced Configuration of Network Devices 00:00:17
    42. Additional Configurations 00:00:49
    43. Transport Security 00:01:45
    44. Trunking Security 00:03:47
    45. Port Security 00:02:20
    46. Ports and Sockets 00:03:37
    47. Security Zones 00:01:30
    48. Network Segmentation 00:01:24
    49. Network Access Control 00:02:53
    50. NAC Concepts 00:02:54
    51. Network Enabled Devices 00:02:21
    52. Automation Systems 00:01:23
    53. Physical Security 00:02:17
    54. Chapter 02 Review 00:01:16
  4. Chapter 03 - Implementing Advanced Authentication and Cryptographic Techniques
    1. Chapter Introduction 00:00:56
    2. Topic A: Understanding Authentication and Authorization Concepts 00:00:20
    3. Authentication 00:04:42
    4. The Importance of Identity 00:07:43
    5. Additional Password Options 00:00:55
    6. Demo - Enforcing Strong Passwords 00:10:04
    7. Biometric Authentication 00:02:50
    8. Biometric Considerations 00:01:35
    9. Beyond Single Factor 00:01:39
    10. Certificate Authentication 00:03:02
    11. Authorization 00:07:42
    12. Open Authorization 00:01:08
    13. XACML 00:01:56
    14. SPML 00:01:06
    15. Authorization Concepts 00:04:02
    16. Trust Models 00:01:53
    17. Topic B: Cryptographic Techniques 00:00:27
    18. Introduction to Cryptography 00:01:20
    19. Cryptographic Techniques 00:00:52
    20. Key Stretching 00:00:59
    21. Hashing 00:03:15
    22. Message Digest (MD) Algorithms 00:01:37
    23. Secure Hash Algorithm (SHA) 00:01:31
    24. Digital Signatures 00:02:01
    25. Message Authentication 00:01:18
    26. Code Signing 00:00:45
    27. Additional Concepts 00:02:12
    28. Protecting Data in Transit 00:02:02
    29. Protecting Data in Memory 00:01:13
    30. Protecting Data at Rest 00:03:44
    31. Symmetric Algorithms 00:04:08
    32. Asymmetric Algorithms 00:03:00
    33. Encryption Methods 00:03:23
    34. Topic C: Cryptographic Implementations 00:00:28
    35. Crypto Options 00:02:09
    36. Additional Crypto Options 00:02:42
    37. Cryptographic Applications 00:01:06
    38. Crypto Considerations 00:01:27
    39. Stream vs. Block Ciphers 00:01:48
    40. Block Cipher Modes 00:00:25
    41. Public Key Infrastructure 00:05:41
    42. Primary PKI Functions 00:02:10
    43. Additional PKI Concepts 00:01:42
    44. Chapter 03 Review 00:01:05
  5. Chapter 04 - Implementing Security for Systems, Applications, and Storage
    1. Chapter Introduction 00:00:57
    2. Topic A: Security for Host Devices 00:00:25
    3. Trusted OS 00:02:14
    4. Trusted OS Options 00:03:12
    5. Security Software 00:06:06
    6. Additional Host-Based Software Options 00:02:24
    7. Demo - Configuring a Host-Based Firewall 00:07:43
    8. Auditing 00:02:09
    9. Demo - Configuring Audit Policies 00:08:15
    10. Endpoint Detection Response 00:01:01
    11. Host Hardening 00:04:01
    12. Group Policy 00:02:20
    13. Demo - Configuring Group Policy Security 00:04:44
    14. Command Shell Restrictions 00:02:18
    15. Out-of-Band Management 00:02:12
    16. Dedicated Interfaces 00:02:35
    17. External I/O Restrictions 00:01:54
    18. Wireless Technologies 00:05:03
    19. Wi-Fi Components 00:02:00
    20. 802.11 Standards 00:03:21
    21. Wireless Security 00:05:40
    22. Securing Other Host Devices 00:03:18
    23. Boot Security 00:02:07
    24. Additional Boot Security Options 00:04:31
    25. Topic B: Mobile Device Security 00:00:41
    26. Enterprise Mobility Management 00:01:18
    27. MDM Concepts 00:02:56
    28. Management Options 00:03:32
    29. Context Aware Management 00:03:57
    30. Security and Privacy 00:04:16
    31. Physical Security Options 00:01:27
    32. Additional Mobile Device Concepts 00:06:08
    33. Authentication Options 00:02:22
    34. Mobile Devices 00:04:47
    35. Wearable Security Implications 00:01:39
    36. Topic C: Software Security Controls 00:00:26
    37. Application Security Design Considerations 00:03:03
    38. Application Issues 00:06:31
    39. Application Issues (cont...) 00:08:19
    40. Data Remnants 00:01:41
    41. Securing Applications 00:02:34
    42. Using JSON and REST 00:01:39
    43. Browser Extensions 00:02:40
    44. Application Vulnerabilities 00:01:58
    45. Chapter 04 Review 00:01:06
  6. Chapter 05 - Implementing Security for Cloud and Virtualization Technologies
    1. Chapter Introduction 00:02:21
    2. Topic A: Cloud and Virtualization Technology 00:01:22
    3. Cloud Computing and Virtualization 00:05:49
    4. Cloud Options 00:10:38
    5. Security Considerations 00:04:36
    6. Cloud Service Models 00:07:40
    7. Demo - Examining Cloud Service Models 00:09:14
    8. Security and Virtualization 00:05:47
    9. Cloud-Augmented Security Services 00:07:25
    10. Security as a Service 00:01:54
    11. Virtualization Vulnerabilities 00:03:41
    12. Topic B: Securing Remote Access and Collaboration 00:00:37
    13. Remote Access 00:01:10
    14. Dial-Up Access 00:03:10
    15. Virtual Private Networks 00:01:50
    16. Remote Access Purposes 00:03:05
    17. Security Considerations 00:02:09
    18. Unified Collaboration Tools 00:01:08
    19. Web Conferencing 00:04:44
    20. Video Conferencing 00:03:07
    21. Storage and Document Collaboration 00:03:12
    22. Unified Communication 00:01:44
    23. Instant Messaging 00:03:01
    24. Presence 00:03:13
    25. E-Mail 00:11:55
    26. Chapter 05 Review 00:01:05
  7. Chapter 06 - Utilizing Security Assessments and Incident Response
    1. Chapter Introduction 00:01:09
    2. Topic A: Security Assessments 00:00:20
    3. Importance of Security Assessments 00:00:40
    4. Malware Sandboxing 00:02:30
    5. Memory Dumping 00:01:36
    6. Runtime Debugging 00:01:26
    7. Reconnaissance 00:01:20
    8. Fingerprinting 00:02:30
    9. Code Review 00:02:47
    10. Social Engineering 00:12:48
    11. Public Information 00:11:15
    12. Demo - Accessing Public Information 00:06:36
    13. Penetration Test 00:05:42
    14. Vulnerability Assessment 00:03:34
    15. Assessment Styles 00:04:30
    16. Topic B: Security Assessment Tools 00:00:35
    17. Network Tool Types 00:04:39
    18. Security Content Automation Protocol (SCAP) 00:02:03
    19. Common Vulnerability Scoring System (CVSS) 00:03:16
    20. Fuzzing 00:00:51
    21. Exploit Kits 00:01:07
    22. Host Tools 00:07:25
    23. Additional Host Tools 00:03:40
    24. Physical Security Tools 00:03:23
    25. Topic C: Incident Response and Recovery 00:05:37
    26. E-discovery 00:05:37
    27. Data Breach 00:01:24
    28. Incident Response Process 00:04:30
    29. Chapter 06 Review 00:00:56
    30. Course Closure 00:02:36