Book description
Trust the best selling Authorized Cert Guide series from Pearson IT Certification to help you learn, prepare, and practice for exam success. These guides are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam.
Master CompTIA® Advanced Security Practitioner (CASP) CAS-002 exam topics
Assess your knowledge with chapter-opening quizzes
Review key concepts with exam preparation tasks
This is the eBook edition of the CompTIA® Advanced Security Practitioner (CASP) CAS-002 Authorized Cert Guide. This eBook does not include the companion CD-ROM with practice exam that comes with the print edition.
CompTIA® Advanced Security Practitioner (CASP) CAS-002 Authorized Cert Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. “Do I Know This Already?” quizzes open each chapter and enable you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly.
CompTIA® Advanced Security Practitioner (CASP) CAS-002 Authorized Cert Guide focuses specifically on the objectives for CompTIA’s CASP CAS-002 exam. Expert security certification training experts Robin Abernathy and Troy McMillan share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.
Well-regarded for its level of detail, assessment features, comprehensive design scenarios, and challenging review questions and exercises, this authorized study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time.
The authorized study guide helps you master all the topics on the CompTIA CASP exam, including:
Enterprise security: cryptography; storage; network/security components, concepts, and architectures; host controls; application vulnerabilities/controls
Risk management and incident response: business influences/risks; risk mitigation; privacy policies / procedures; incident response/recovery
Research, analysis, and assessment: industry trends; securing the enterprise; assessment tools / methods
Integration of computing, communications, and business disciplines: business unit collaboration; secure communication / collaboration; security across the technology life cycle
Technical integration of enterprise components: host/storage/network/application integration; secure enterprise architecture; authentication and authorization
CompTIA Advanced Security Practitioner (CASP) CAS-002 Authorized Cert Guide is part of a recommended learning path from Pearson IT Certification that includes simulation, hands-on training, and self-study products. To find out more, please visit http://www.pearsonitcertification.com.
Table of contents
- About This eBook
- Title Page
- Copyright Page
- Contents at a Glance
- Table of Contents
- About the Authors
- Dedication
- Acknowledgments
- About the Reviewers
- We Want to Hear from You!
- Reader Services
- CompTIA®
- About the Book
- Introduction. The CASP Exam
-
Part I: Enterprise Security
- Chapter 1. Cryptographic Concepts and Techniques
- Chapter 2. Enterprise Storage
-
Chapter 3. Network and Security Components, Concepts, and Architectures
-
Foundation Topics
- Advanced Network Design (Wired/Wireless)
- Security Devices
- Networking Devices
- Virtual Networking and Security Components
- Complex Network Security Solutions for Data Flow
- Secure Configuration and Baselining of Networking and Security Components
- Software-Defined Networking
- Cloud-Managed Networks
- Network Management and Monitoring Tools
- Advanced Configuration of Routers, Switches, and Other Network Devices
- Security Zones
- Network Access Control
- Operational and Consumer Network-Enabled Devices
- Critical Infrastructure/Supervisory Control and Data Acquisition (SCADA)/Industrial Control Systems (ICS)
- Exam Preparation Tasks
- Review Questions
-
Foundation Topics
-
Chapter 4. Security Controls for Hosts
-
Foundation Topics
- Trusted OS
- Endpoint Security Software
- Host Hardening
- Security Advantages and Disadvantages of Virtualizing Servers
- Cloud-Augmented Security Services
- Boot Loader Protections
- Vulnerabilities Associated with Commingling of Hosts with Different Security Requirements
- Virtual Desktop Infrastructure (VDI)
- Terminal Services/Application Delivery Services
- Trusted Platform Module (TPM)
- Virtual TPM (VTPM)
- Hardware Security Module (HSM)
- Exam Preparation Tasks
- Review Questions
-
Foundation Topics
-
Chapter 5. Application Vulnerabilities and Security Controls
-
Foundation Topics
- Web Application Security Design Considerations
- Specific Application Issues
- Application Sandboxing
- Application Security Frameworks
- Secure Coding Standards
- Software Development Methods
- Database Activity Monitoring (DAM)
- Web Application Firewalls (WAF)
- Client-Side Processing Versus Server-Side Processing
- Exam Preparation Tasks
- Review Questions
-
Foundation Topics
-
Part II: Risk Management and Incident Response
-
Chapter 6. Business Influences and Associated Security Risks
-
Foundation Topics
- Risk Management of New Products, New Technologies, and User Behaviors
- New or Changing Business Models/Strategies
- Security Concerns of Integrating Diverse Industries
- Ensuring That Third-Party Providers Have Requisite Levels of Information Security
- Internal and External Influences
- Impact of De-perimiterization
- Exam Preparation Tasks
- Review Questions
-
Foundation Topics
-
Chapter 7. Risk Mitigation Planning, Strategies, and Controls
-
Foundation Topics
- Classify Information Types into Levels of CIA Based on Organization/Industry
- Incorporate Stakeholder Input into CIA Decisions
- Implement Technical Controls Based on CIA Requirements and Policies of the Organization
- Determine the Aggregate CIA Score
- Extreme Scenario/Worst-Case Scenario Planning
- Determine Minimum Required Security Controls Based on Aggregate Score
- Conduct System-Specific Risk Analysis
- Make Risk Determination
- Recommend Which Strategy Should be Applied Based on Risk Appetite
- Risk Management Processes
- Enterprise Security Architecture Frameworks
- Continuous Improvement/Monitoring
- Business Continuity Planning
- IT Governance
- Exam Preparation Tasks
- Review Questions
-
Foundation Topics
-
Chapter 8. Security, Privacy Policies, and Procedures
-
Foundation Topics
- Policy Development and Updates in Light of New Business, Technology, Risks, and Environment Changes
- Process/Procedure Development and Updates in Light of Policy, Environment, and Business Changes
- Support Legal Compliance and Advocacy by Partnering with HR, Legal, Management, and Other Entities
- Use Common Business Documents to Support Security
- Use General Privacy Principles for Sensitive Information (PII)
- Support the Development of Various Policies
- Exam Preparation Tasks
- Review Questions
-
Foundation Topics
- Chapter 9. Incident Response and Recovery Procedures
-
Chapter 6. Business Influences and Associated Security Risks
-
Part III: Research, Analysis, and Assessment
-
Chapter 10. Industry Trends
-
Foundation Topics
- Perform Ongoing Research
- Situational Awareness
- Vulnerability Management Systems
- Advanced Persistent Threats
- Zero-Day Mitigating Controls and Remediation
- Emergent Threats and Issues
- Research Security Implications of New Business Tools
- Global IA Industry/Community
- Research Security Requirements for Contracts
- Exam Preparation Tasks
- Review Questions
-
Foundation Topics
-
Chapter 11. Securing the Enterprise
-
Foundation Topics
- Create Benchmarks and Compare to Baselines
- Prototype and Test Multiple Solutions
- Cost/Benefit Analysis
- Metrics Collection and Analysis
- Analyze and Interpret Trend Data to Anticipate Cyber Defense Needs
- Review Effectiveness of Existing Security Controls
- Reverse Engineer/Deconstruct Existing Solutions
- Analyze Security Solution Attributes to Ensure They Meet Business Needs
- Conduct a Lessons-Learned/After-Action Report
- Use Judgment to Solve Difficult Problems That Do Not Have a Best Solution
- Exam Preparation Tasks
- Review Questions
-
Foundation Topics
- Chapter 12. Assessment Tools and Methods
-
Chapter 10. Industry Trends
-
Part IV: Integration of Computing, Communications, and Business Disciplines
-
Chapter 13. Business Unit Collaboration
-
Foundation Topics
- Interpreting Security Requirements and Goals to Communicate with Stakeholders from Other Disciplines
- Provide Objective Guidance and Impartial Recommendations to Staff and Senior Management on Security Processes and Controls
- Establish Effective Collaboration within Teams to Implement Secure Solutions
- IT Governance
- Exam Preparation Tasks
- Review Questions
-
Foundation Topics
- Chapter 14. Secure Communication and Collaboration
- Chapter 15. Security Across the Technology Life Cycle
-
Chapter 13. Business Unit Collaboration
- Part V: Technical Integration of Enterprise Components
- Part VI: Appendixes
- Glossary
- Index
- Appendix C. Memory Tables
- Appendix D. Memory Tables Answer Key
-
Practice Exam 1
- Chapter 1: Cryptographic Concepts and Techniques
- Chapter 1: Cryptographic Concepts and Techniques
- Chapter 1: Cryptographic Concepts and Techniques
- Chapter 1: Cryptographic Concepts and Techniques
- Chapter 1: Cryptographic Concepts and Techniques
- Chapter 7: Risk Mitigation Planning, Strategies, and Controls
- Chapter 7: Risk Mitigation Planning, Strategies, and Controls
- Chapter 7: Risk Mitigation Planning, Strategies, and Controls
- Chapter 7: Risk Mitigation Planning, Strategies, and Controls
- Chapter 8: Security, Privacy Policies, and Procedures
- Chapter 8: Security, Privacy Policies, and Procedures
- Chapter 8: Security, Privacy Policies, and Procedures
- Chapter 8: Security, Privacy Policies, and Procedures
- Chapter 9: Incident Response and Recovery Procedures
- Chapter 9: Incident Response and Recovery Procedures
- Chapter 9: Incident Response and Recovery Procedures
- Chapter 9: Incident Response and Recovery Procedures
- Chapter 10: Industry Trends
- Chapter 10: Industry Trends
- Chapter 10: Industry Trends
- Chapter 10: Industry Trends
- Chapter 10: Industry Trends
- Chapter 11: Securing the Enterprise
- Chapter 11: Securing the Enterprise
- Chapter 11: Securing the Enterprise
- Chapter 11: Securing the Enterprise
- Chapter 13: Business Unit Collaboration
- Chapter 13: Business Unit Collaboration
- Chapter 13: Business Unit Collaboration
- Chapter 13: Business Unit Collaboration
- Chapter 15: Security Across the Technology Life Cycle
- Chapter 15: Security Across the Technology Life Cycle
- Chapter 15: Security Across the Technology Life Cycle
- Chapter 15: Security Across the Technology Life Cycle
- Chapter 16: Host, Storage, Network, and Application Integration Into a Secure Enterprise Architecture
- Chapter 16: Host, Storage, Network, and Application Integration Into a Secure Enterprise Architecture
- Chapter 16: Host, Storage, Network, and Application Integration Into a Secure Enterprise Architecture
- Chapter 16: Host, Storage, Network, and Application Integration Into a Secure Enterprise Architecture
- Chapter 16: Host, Storage, Network, and Application Integration Into a Secure Enterprise Architecture
- Chapter 16: Host, Storage, Network, and Application Integration Into a Secure Enterprise Architecture
- Chapter 2: Enterprise Storage
- Chapter 2: Enterprise Storage
- Chapter 2: Enterprise Storage
- Chapter 2: Enterprise Storage
- Chapter 3: Network and Security Components, Concepts, and Architectures
- Chapter 3: Network and Security Components, Concepts, and Architectures
- Chapter 3: Network and Security Components, Concepts, and Architectures
- Chapter 3: Network and Security Components, Concepts, and Architectures
- Chapter 3: Network and Security Components, Concepts, and Architectures
- Chapter 4: Security Controls for Hosts
- Chapter 4: Security Controls for Hosts
- Chapter 4: Security Controls for Hosts
- Chapter 4: Security Controls for Hosts
- Chapter 4: Security Controls for Hosts
- Chapter 5: Application Vulnerabilities and Security Controls
- Chapter 5: Application Vulnerabilities and Security Controls
- Chapter 5: Application Vulnerabilities and Security Controls
- Chapter 5: Application Vulnerabilities and Security Controls
- Chapter 5: Application Vulnerabilities and Security Controls
- Chapter 6: Business Influences and Associated Security Risks
- Chapter 6: Business Influences and Associated Security Risks
- Chapter 6: Business Influences and Associated Security Risks
- Chapter 6: Business Influences and Associated Security Risks
- Chapter 12: Assessment Tools and Methods
- Chapter 12: Assessment Tools and Methods
- Chapter 12: Assessment Tools and Methods
- Chapter 12: Assessment Tools and Methods
- Chapter 12: Assessment Tools and Methods
- Chapter 14: Secure Communication and Collaboration
- Chapter 14: Secure Communication and Collaboration
- Chapter 14: Secure Communication and Collaboration
- Chapter 14: Secure Communication and Collaboration
- Chapter 17: Secure Communication and Collaboration
- Chapter 17: Authentication and Authorization Technologies
- Chapter 17: Authentication and Authorization Technologies
- Chapter 17: Authentication and Authorization Technologies
- Chapter 17: Authentication and Authorization Technologies
- Chapter 17: Authentication and Authorization Technologies
- Chapter 17: Authentication and Authorization Technologies
-
Practice Exam 2
- Chapter 1: Cryptographic Concepts and Techniques
- Chapter 1: Cryptographic Concepts and Techniques
- Chapter 1: Cryptographic Concepts and Techniques
- Chapter 1: Cryptographic Concepts and Techniques
- Chapter 1: Cryptographic Concepts and Techniques
- Chapter 7: Risk Mitigation Planning, Strategies, and Controls
- Chapter 7: Risk Mitigation Planning, Strategies, and Controls
- Chapter 7: Risk Mitigation Planning, Strategies, and Controls
- Chapter 7: Risk Mitigation Planning, Strategies, and Controls
- Chapter 8: Security, Privacy Policies, and Procedures
- Chapter 8: Security, Privacy Policies, and Procedures
- Chapter 8: Security, Privacy Policies, and Procedures
- Chapter 8: Security, Privacy Policies, and Procedures
- Chapter 9: Incident Response and Recovery Procedures
- Chapter 9: Incident Response and Recovery Procedures
- Chapter 9: Incident Response and Recovery Procedures
- Chapter 9: Incident Response and Recovery Procedures
- Chapter 10: Industry Trends
- Chapter 10: Industry Trends
- Chapter 10: Industry Trends
- Chapter 10: Industry Trends
- Chapter 10: Industry Trends
- Chapter 11: Securing the Enterprise
- Chapter 11: Securing the Enterprise
- Chapter 11: Securing the Enterprise
- Chapter 11: Securing the Enterprise
- Chapter 13: Business Unit Collaboration
- Chapter 13: Business Unit Collaboration
- Chapter 13: Business Unit Collaboration
- Chapter 13: Business Unit Collaboration
- Chapter 15: Security Across the Technology Life Cycle
- Chapter 15: Security Across the Technology Life Cycle
- Chapter 15: Security Across the Technology Life Cycle
- Chapter 15: Security Across the Technology Life Cycle
- Chapter 16: Host, Storage, Network, and Application Integration Into a Secure Enterprise Architecture
- Chapter 16: Host, Storage, Network, and Application Integration Into a Secure Enterprise Architecture
- Chapter 16: Host, Storage, Network, and Application Integration Into a Secure Enterprise Architecture
- Chapter 16: Host, Storage, Network, and Application Integration Into a Secure Enterprise Architecture
- Chapter 16: Host, Storage, Network, and Application Integration Into a Secure Enterprise Architecture
- Chapter 16: Host, Storage, Network, and Application Integration Into a Secure Enterprise Architecture
- Chapter 2: Enterprise Storage
- Chapter 2: Enterprise Storage
- Chapter 2: Enterprise Storage
- Chapter 2: Enterprise Storage
- Chapter 3: Network and Security Components, Concepts, and Architectures
- Chapter 3: Network and Security Components, Concepts, and Architectures
- Chapter 3: Network and Security Components, Concepts, and Architectures
- Chapter 3: Network and Security Components, Concepts, and Architectures
- Chapter 3: Network and Security Components, Concepts, and Architectures
- Chapter 4: Security Controls for Hosts
- Chapter 4: Security Controls for Hosts
- Chapter 4: Security Controls for Hosts
- Chapter 4: Security Controls for Hosts
- Chapter 4: Security Controls for Hosts
- Chapter 5: Application Vulnerabilities and Security Controls
- Chapter 5: Application Vulnerabilities and Security Controls
- Chapter 5: Application Vulnerabilities and Security Controls
- Chapter 5: Application Vulnerabilities and Security Controls
- Chapter 5: Application Vulnerabilities and Security Controls
- Chapter 6: Business Influences and Associated Security Risks
- Chapter 6: Business Influences and Associated Security Risks
- Chapter 6: Business Influences and Associated Security Risks
- Chapter 6: Business Influences and Associated Security Risks
- Chapter 12: Assessment Tools and Methods
- Chapter 12: Assessment Tools and Methods
- Chapter 12: Assessment Tools and Methods
- Chapter 12: Assessment Tools and Methods
- Chapter 12: Assessment Tools and Methods
- Chapter 14: Secure Communication and Collaboration
- Chapter 14: Secure Communication and Collaboration
- Chapter 14: Secure Communication and Collaboration
- Chapter 14: Secure Communication and Collaboration
- Chapter 17: Secure Communication and Collaboration
- Chapter 17: Authentication and Authorization Technologies
- Chapter 17: Authentication and Authorization Technologies
- Chapter 17: Authentication and Authorization Technologies
- Chapter 17: Authentication and Authorization Technologies
- Chapter 17: Authentication and Authorization Technologies
- Chapter 17: Authentication and Authorization Technologies
-
Practice Exam 3
- Chapter 1: Cryptographic Concepts and Techniques
- Chapter 1: Cryptographic Concepts and Techniques
- Chapter 1: Cryptographic Concepts and Techniques
- Chapter 1: Cryptographic Concepts and Techniques
- Chapter 1: Cryptographic Concepts and Techniques
- Chapter 1: Cryptographic Concepts and Techniques
- Chapter 7: Risk Mitigation Planning, Strategies, and Controls
- Chapter 7: Risk Mitigation Planning, Strategies, and Controls
- Chapter 7: Risk Mitigation Planning, Strategies, and Controls
- Chapter 7: Risk Mitigation Planning, Strategies, and Controls
- Chapter 7: Risk Mitigation Planning, Strategies, and Controls
- Chapter 8: Security, Privacy Policies, and Procedures
- Chapter 8: Security, Privacy Policies, and Procedures
- Chapter 8: Security, Privacy Policies, and Procedures
- Chapter 8: Security, Privacy Policies, and Procedures
- Chapter 9: Incident Response and Recovery Procedures
- Chapter 9: Incident Response and Recovery Procedures
- Chapter 9: Incident Response and Recovery Procedures
- Chapter 9: Incident Response and Recovery Procedures
- Chapter 10: Industry Trends
- Chapter 10: Industry Trends
- Chapter 10: Industry Trends
- Chapter 11: Securing the Enterprise
- Chapter 11: Securing the Enterprise
- Chapter 11: Securing the Enterprise
- Chapter 11: Securing the Enterprise
- Chapter 13: Business Unit Collaboration
- Chapter 13: Business Unit Collaboration
- Chapter 13: Business Unit Collaboration
- Chapter 13: Business Unit Collaboration
- Chapter 15: Security Across the Technology Life Cycle
- Chapter 15: Security Across the Technology Life Cycle
- Chapter 15: Security Across the Technology Life Cycle
- Chapter 15: Security Across the Technology Life Cycle
- Chapter 15: Security Across the Technology Life Cycle
- Chapter 16: Host, Storage, Network, and Application Integration Into a Secure Enterprise Architecture
- Chapter 16: Host, Storage, Network, and Application Integration Into a Secure Enterprise Architecture
- Chapter 16: Host, Storage, Network, and Application Integration Into a Secure Enterprise Architecture
- Chapter 16: Host, Storage, Network, and Application Integration Into a Secure Enterprise Architecture
- Chapter 16: Host, Storage, Network, and Application Integration Into a Secure Enterprise Architecture
- Chapter 2: Enterprise Storage
- Chapter 2: Enterprise Storage
- Chapter 2: Enterprise Storage
- Chapter 2: Enterprise Storage
- Chapter 3: Network and Security Components, Concepts, and Architectures
- Chapter 3: Network and Security Components, Concepts, and Architectures
- Chapter 3: Network and Security Components, Concepts, and Architectures
- Chapter 3: Network and Security Components, Concepts, and Architectures
- Chapter 3: Network and Security Components, Concepts, and Architectures
- Chapter 4: Security Controls for Hosts
- Chapter 4: Security Controls for Hosts
- Chapter 4: Security Controls for Hosts
- Chapter 4: Security Controls for Hosts
- Chapter 4: Security Controls for Hosts
- Chapter 5: Application Vulnerabilities and Security Controls
- Chapter 5: Application Vulnerabilities and Security Controls
- Chapter 5: Application Vulnerabilities and Security Controls
- Chapter 5: Application Vulnerabilities and Security Controls
- Chapter 5: Application Vulnerabilities and Security Controls
- Chapter 6: Business Influences and Associated Security Risks
- Chapter 6: Business Influences and Associated Security Risks
- Chapter 6: Business Influences and Associated Security Risks
- Chapter 6: Business Influences and Associated Security Risks
- Chapter 12: Assessment Tools and Methods
- Chapter 12: Assessment Tools and Methods
- Chapter 12: Assessment Tools and Methods
- Chapter 12: Assessment Tools and Methods
- Chapter 12: Assessment Tools and Methods
- Chapter 14: Secure Communication and Collaboration
- Chapter 14: Secure Communication and Collaboration
- Chapter 14: Secure Communication and Collaboration
- Chapter 14: Secure Communication and Collaboration
- Chapter 17: Secure Communication and Collaboration
- Chapter 17: Authentication and Authorization Technologies
- Chapter 17: Authentication and Authorization Technologies
- Chapter 17: Authentication and Authorization Technologies
- Chapter 17: Authentication and Authorization Technologies
- Chapter 17: Authentication and Authorization Technologies
- Chapter 17: Authentication and Authorization Technologies
- Code Snippets
Product information
- Title: CompTIA Advanced Security Practitioner (CASP) CAS-002 Cert Guide
- Author(s):
- Release date: April 2015
- Publisher(s): Pearson IT Certification
- ISBN: 9780134022963
You might also like
book
CISSP Cert Guide
This is the eBook version of the print title. Note that the eBook does not provide …
book
CompTIA Advanced Security Practitioner (CASP+) CAS-004 Cert Guide
CompTIA Advanced Security Practitioner (CASP+) CAS-004 Cert Guide presents you with an organized test preparation routine …
book
CCNA Cyber Ops SECFND #210-250 Official Cert Guide
CCNA Cyber Ops SECFND 210-250 Official Cert Guide from Cisco Press allows you to succeed on …
book
CISSP Cert Guide, 3rd Edition
Learn, prepare, and practice for CISSP exam success with this Cert Guide from Pearson IT Certification, …