- Mod 1.0 Intro CASP 00:00:58
- Mod 1.1 CASP Introduction 00:42:00
- Mod 1.2 Exploring Cloud Services Act 00:21:19
- Mod 1.3 Acquisition Merger Demerger 00:56:41
- Mod 1.4 Acquisition Merger Demerger Part2 00:17:48
- Mod 1.5 Compare and Contrast 00:59:03
- Mod 1.6 Given Scenario Execute Risk 00:45:05
- Mod 1.7 Given Scenario Execute Risk Part2 00:36:02
- Mod 1.8 Continuing Terminology IT Governance 00:06:05
- Mod 1.9 Analyze Security Solution Metrics and Attributes 00:15:37
- Mod 1.10 Analyze Risk 00:15:19
- Mod 1.11 Trend Analysis Act 00:04:24
- Mod 2.1 Enterprise Security Architecture 00:37:18
- Mod 2.2 Network Device Security Act 00:09:42
- Mod 2.3 Application and Protocol 00:43:57
- Mod 2.4 Advanced Network Security Act 00:28:07
- Mod 2.5 Complex Network Security Solution 00:41:24
- Mod 2.6 Implementing VLANs Switchport Sec Act 00:21:18
- Mod 2.7 Implementing VLANs Switchport Sec Act Part2 00:38:58
- Mod 2.8 Distributed Denial of Service 00:23:36
- Mod 2.9 Exploring DoS Attacks Act 00:08:17
- Mod 2.10 Security Zones 00:05:13
- Mod 2.11 Network Access Control 00:31:41
- Mod 2.12 Searching for Vulnerablie ICS-SCADA Act 00:06:27
- Mod 2.13 Analyze a Scenario Integrate Security 00:21:50
- Mod 2.14 Configuring Windows Firewall Act 00:38:29
- Mod 2.15 Log Monitoring and Auditing 00:13:19
- Mod 2.16 Group Policy Act 00:20:55
- Mod 2.17 Patch Management 00:12:12
- Mod 2.18 Management Interface 00:38:27
- Mod 2.19 Measured Launch 00:07:02
- Mod 2.20 Analyze a Scenario to Integrate Security Controls 00:22:55
- Mod 2.21 Security Implications Privacy 00:28:03
- Mod 2.22 Baseband 00:14:45
- Mod 2.23 Given Software Vulnerabilty Scenarios 00:19:24
- Mod 2.24 SQL Injection Act 00:08:42
- Mod 2.25 Improper Error and Exception Handling 00:11:23
- Mod 2.26 Buffer Overflows Act 00:08:11
- Mod 2.27 Memory Leaks 00:33:29
- Mod 2.28 Researching Vulnerabilities Exploits Act- 00:06:31
- Mod 3.1 Enterprise Security Operations 00:07:34
- Mod 3.2 Runtime Debugging 00:06:26
- Mod 3.3 Fingerprinting an OS Services Act 00:08:22
- Mod 3.4 Code Review 00:22:22
- Mod 3.5 Conducting OSINT Act 00:02:21
- Mod 3.6 Types 00:14:53
- Mod 3.7 Conducting a Vulnerability Assessment Act 00:11:23
- Mod 3.8 Analyze a Scenario Output 00:12:14
- Mod 3.9 Network Sniffing Act 00:04:50
- Mod 3.10 Security Content Automation 00:04:18
- Mod 3.11 Using a SCAP Scanner Act 00:04:41
- Mod 3.12 Network Enumerator 00:19:00
- Mod 3.13 Password Cracking Act 00:18:33
- Mod 3.14 Host Vulnerability Scanner 00:13:36
- Mod 3.15 Using Command Line Tools Act 00:29:45
- Mod 3.16 OpenSSL 00:04:28
- Mod 3.17 Scanning for Heartbleed Act 00:01:26
- Mod 3.18 Local Exploitation Tools 00:05:50
- Mod 3.19 Verifying File Integrity with SFC Act 00:05:24
- Mod 3.20 Log Analysis Tools 00:07:44
- Mod 3.21 Given Scenario Implement Incident 00:20:19
- Mod 3.22 Facilitate Incident Detection Response 00:32:16
- Mod 3.23 Using Incident Response Support Tools Act 00:08:05
- Mod 3.24 Severity of Incident Detection Breach 00:08:43
- Mod 4.1 Technical Integration of Enterprise 00:38:56
- Mod 4.2 Technical Integration of Enterprise Part2 00:05:14
- Mod 4.3 DataSecurity Considerations 00:24:46
- Mod 4.4 Examing Network Diagrams Act 00:06:49
- Mod 4.5 Security and Privacy Considerations of Storage integration 00:11:40
- Mod 4.6 Exploring Directory Services and DNS Act 00:10:42
- Mod 4.7 Given Scenario Integrate Cloud and Virtualization 00:15:20
- Mod 4.8 Taking Another Look at Cloud Services Act 00:11:42
- Mod 4.9 Security Advantages and Disadvanatges of Virtualization 00:13:16
- Mod 4.10 Using Virtualization Act 00:10:52
- Mod 4.11 Cloud Augmented Security 00:17:09
- Mod 4.12 Given Scenario Integrate and Troubleshoot Advanced Authentication 00:35:06
- Mod 4.13 Given Scenario Cryptographic 00:49:17
- Mod 4.14 Cryptographic Part2 00:56:34
- Mod 4.15 Mobile Device Encryption 00:03:16
- Mod 4.16 Cryptography Act 00:13:38
- Mod 4.17 Select the Appropriate Control 00:26:02
- Mod 4.18 Phising Act 00:17:02
- Mod 4.19 Telephony VoIP Integration 00:11:05
- Mod 5.1 Research Methods to Determine Industry Trends 00:31:00
- Mod 5.2 Practicing Threat Intelligence Act 00:04:27
- Mod 5.3 Scenario Implememt Security Activities Across 00:34:30
- Mod 5.4 Static Testing 00:36:28
- Mod 5.5 Explain the Importance of Interaction 00:19:58
- Mod 5.6 CASP Conclusion 00:00:52