O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CompTIA Advanced Security Practitioner (CASP) CAS-003

Video Description

This course provides advanced-level training in risk management, enterprise security operations and architecture, research and collaboration, and integration of enterprise security. It covers all of the new exam objectives for the CAS-003 exam. The CASP certification is the highest-level security certification offered by CompTIA and is the final step in achieving the new CompTIA Security Analytics Expert (CSAE) or Security Infrastructure Expert (CSIE) stackable certification. In this course you will advance your skills in the following areas: Risk Management Enterprise Security Architecture Enterprise Security Operations Technical Integration of Enterprise Security Research, Development and Collaboration This course is intended for advanced students and cybersecurity practitioners who will implement cybersecurity. Successful completion of pre-requisite courses in Security+ and CySA+/PenTest+ is highly recommended.

Table of Contents

  1. Mod 1.0 Intro CASP 00:00:58
  2. Mod 1.1 CASP Introduction 00:42:00
  3. Mod 1.2 Exploring Cloud Services Act 00:21:19
  4. Mod 1.3 Acquisition Merger Demerger 00:56:41
  5. Mod 1.4 Acquisition Merger Demerger Part2 00:17:48
  6. Mod 1.5 Compare and Contrast 00:59:03
  7. Mod 1.6 Given Scenario Execute Risk 00:45:05
  8. Mod 1.7 Given Scenario Execute Risk Part2 00:36:02
  9. Mod 1.8 Continuing Terminology IT Governance 00:06:05
  10. Mod 1.9 Analyze Security Solution Metrics and Attributes 00:15:37
  11. Mod 1.10 Analyze Risk 00:15:19
  12. Mod 1.11 Trend Analysis Act 00:04:24
  13. Mod 2.1 Enterprise Security Architecture 00:37:18
  14. Mod 2.2 Network Device Security Act 00:09:42
  15. Mod 2.3 Application and Protocol 00:43:57
  16. Mod 2.4 Advanced Network Security Act 00:28:07
  17. Mod 2.5 Complex Network Security Solution 00:41:24
  18. Mod 2.6 Implementing VLANs Switchport Sec Act 00:21:18
  19. Mod 2.7 Implementing VLANs Switchport Sec Act Part2 00:38:58
  20. Mod 2.8 Distributed Denial of Service 00:23:36
  21. Mod 2.9 Exploring DoS Attacks Act 00:08:17
  22. Mod 2.10 Security Zones 00:05:13
  23. Mod 2.11 Network Access Control 00:31:41
  24. Mod 2.12 Searching for Vulnerablie ICS-SCADA Act 00:06:27
  25. Mod 2.13 Analyze a Scenario Integrate Security 00:21:50
  26. Mod 2.14 Configuring Windows Firewall Act 00:38:29
  27. Mod 2.15 Log Monitoring and Auditing 00:13:19
  28. Mod 2.16 Group Policy Act 00:20:55
  29. Mod 2.17 Patch Management 00:12:12
  30. Mod 2.18 Management Interface 00:38:27
  31. Mod 2.19 Measured Launch 00:07:02
  32. Mod 2.20 Analyze a Scenario to Integrate Security Controls 00:22:55
  33. Mod 2.21 Security Implications Privacy 00:28:03
  34. Mod 2.22 Baseband 00:14:45
  35. Mod 2.23 Given Software Vulnerabilty Scenarios 00:19:24
  36. Mod 2.24 SQL Injection Act 00:08:42
  37. Mod 2.25 Improper Error and Exception Handling 00:11:23
  38. Mod 2.26 Buffer Overflows Act 00:08:11
  39. Mod 2.27 Memory Leaks 00:33:29
  40. Mod 2.28 Researching Vulnerabilities Exploits Act- 00:06:31
  41. Mod 3.1 Enterprise Security Operations 00:07:34
  42. Mod 3.2 Runtime Debugging 00:06:26
  43. Mod 3.3 Fingerprinting an OS Services Act 00:08:22
  44. Mod 3.4 Code Review 00:22:22
  45. Mod 3.5 Conducting OSINT Act 00:02:21
  46. Mod 3.6 Types 00:14:53
  47. Mod 3.7 Conducting a Vulnerability Assessment Act 00:11:23
  48. Mod 3.8 Analyze a Scenario Output 00:12:14
  49. Mod 3.9 Network Sniffing Act 00:04:50
  50. Mod 3.10 Security Content Automation 00:04:18
  51. Mod 3.11 Using a SCAP Scanner Act 00:04:41
  52. Mod 3.12 Network Enumerator 00:19:00
  53. Mod 3.13 Password Cracking Act 00:18:33
  54. Mod 3.14 Host Vulnerability Scanner 00:13:36
  55. Mod 3.15 Using Command Line Tools Act 00:29:45
  56. Mod 3.16 OpenSSL 00:04:28
  57. Mod 3.17 Scanning for Heartbleed Act 00:01:26
  58. Mod 3.18 Local Exploitation Tools 00:05:50
  59. Mod 3.19 Verifying File Integrity with SFC Act 00:05:24
  60. Mod 3.20 Log Analysis Tools 00:07:44
  61. Mod 3.21 Given Scenario Implement Incident 00:20:19
  62. Mod 3.22 Facilitate Incident Detection Response 00:32:16
  63. Mod 3.23 Using Incident Response Support Tools Act 00:08:05
  64. Mod 3.24 Severity of Incident Detection Breach 00:08:43
  65. Mod 4.1 Technical Integration of Enterprise 00:38:56
  66. Mod 4.2 Technical Integration of Enterprise Part2 00:05:14
  67. Mod 4.3 DataSecurity Considerations 00:24:46
  68. Mod 4.4 Examing Network Diagrams Act 00:06:49
  69. Mod 4.5 Security and Privacy Considerations of Storage integration 00:11:40
  70. Mod 4.6 Exploring Directory Services and DNS Act 00:10:42
  71. Mod 4.7 Given Scenario Integrate Cloud and Virtualization 00:15:20
  72. Mod 4.8 Taking Another Look at Cloud Services Act 00:11:42
  73. Mod 4.9 Security Advantages and Disadvanatges of Virtualization 00:13:16
  74. Mod 4.10 Using Virtualization Act 00:10:52
  75. Mod 4.11 Cloud Augmented Security 00:17:09
  76. Mod 4.12 Given Scenario Integrate and Troubleshoot Advanced Authentication 00:35:06
  77. Mod 4.13 Given Scenario Cryptographic 00:49:17
  78. Mod 4.14 Cryptographic Part2 00:56:34
  79. Mod 4.15 Mobile Device Encryption 00:03:16
  80. Mod 4.16 Cryptography Act 00:13:38
  81. Mod 4.17 Select the Appropriate Control 00:26:02
  82. Mod 4.18 Phising Act 00:17:02
  83. Mod 4.19 Telephony VoIP Integration 00:11:05
  84. Mod 5.1 Research Methods to Determine Industry Trends 00:31:00
  85. Mod 5.2 Practicing Threat Intelligence Act 00:04:27
  86. Mod 5.3 Scenario Implememt Security Activities Across 00:34:30
  87. Mod 5.4 Static Testing 00:36:28
  88. Mod 5.5 Explain the Importance of Interaction 00:19:58
  89. Mod 5.6 CASP Conclusion 00:00:52