CompTIA Advanced Security Practitioner (CASP) CAS-003 Video Course

CAS-003: CompTIA Advanced Security Practitioner (CASP) CAS-003

Your CompTIA CAS-003 exam is just around the corner, right? So, it's high time to find an effective preparation tool! Our training course is what you really need! This is a series of videos led by the experienced IT instructors who will provide you with a detailed overview of the CAS-003 certification test. Ace your CompTIA CAS-003 at the first attempt and obtain the CompTIA Advanced Security Practitioner (CASP) CAS-003 credential with ease.

# of Students
96
# of Lectures
260
Course Length
12 h
Course Rating
4.5
Price $32.99
Today $29.99

Curriculum for CAS-003 Video Course

Course Introduction

  Video Name Time
  1. Course Introduction 03:22
  2. Instructor Introduction 01:35
  Video Name Time
  1. Chapter Introdcution 02:15
  2. Topic A: Understanding Business and Industry Influences 00:10
  3. Ongoing Risk Management 01:17
  4. New Products and User Behaviors 03:43
  5. Business Models and Strategies 03:25
  6. Cloud Technologies 04:47
  7. Acquisitions and Mergers 03:08
  8. Due Diligence Team 01:05
  9. Data Ownership 01:30
  10. Data Reclassification 01:00
  11. Integrating Diverse Industries 05:01
  12. Common Regulations 05:08
  13. Geographic Differences 02:25
  14. Data Sovereignty 00:53
  15. Internal and External Influences 05:32
  16. De-perimeterization 01:07
  17. Understand Changes in Network Boundaries 06:53
  18. Topic B: Policies and Procedures 00:22
  19. Understanding Policies and Procedures 01:34
  20. Policy Life Cycle 01:28
  21. Process Life Cycle 01:30
  22. Reviewing Policies and Processes 03:45
  23. Common Business Documents 04:44
  24. Security for Contracts 01:14
  25. Contract Requirements 01:54
  26. General Privacy Principles 01:13
  27. Standard Security Practices 11:28
  28. Demo - Examining Security Policies 07:11
  29. Topic C: Risk Mitigation and Control 00:24
  30. Introduction to Risk Mitigation 01:00
  31. Categorizing Data 03:48
  32. Incorporating Stakeholder Input 01:18
  33. Aggregate CIA Scores 01:37
  34. Selecting and Implementing Controls 04:11
  35. Security Control Frameworks 00:51
  36. Options for Frameworks 04:40
  37. Extreme Scenario Planning 02:41
  38. System-Specific Risk Analysis 01:13
  39. Qualitative Risk Analysis 01:39
  40. Quantitative Risk Analysis 01:06
  41. Risk Impact 03:08
  42. Likelihood of Threat 00:48
  43. Return on Investment 01:52
  44. Understanding Payback 02:05
  45. Total Cost of Ownership 01:24
  46. TCO Guidelines 01:23
  47. Translate to Business Terms 01:31
  48. Risk Management Strategies 02:09
  49. Risk Management Processes 01:06
  50. Information and Asset Value and Costs 00:49
  51. Vulnerabilities and Threat Identification 01:06
  52. Additional Factors 01:34
  53. Topic D: Business Continuity Planning 00:21
  54. Continuity Planning 00:19
  55. BCP Components 01:51
  56. BCP Steps 02:38
  57. Additional Plans 01:48
  58. Conducting Business Impact Analysis 04:57
  59. Chapter 01 Review 01:03
  Video Name Time
  1. Chapter Introdcution 00:34
  2. Topic A: Physical and Virtual Network Security Devices 00:15
  3. Unified Threat Management 01:19
  4. Analyzing UTM 01:31
  5. Intrusion Detection and Prevention 05:13
  6. In-Line Network Encryptor 01:31
  7. Network Access Control 03:02
  8. SIEM 01:15
  9. Firewalls 07:05
  10. Firewall Architecture 05:16
  11. Wireless Controller 01:49
  12. Routers and Switches 02:09
  13. Proxy Servers 01:30
  14. Topic B: Application and Protocol Level Security 00:29
  15. Web Application Firewalls 01:46
  16. Hardware Security Modules 01:50
  17. Vulnerability Scanners 02:11
  18. Topic C: Advanced Network Design 00:31
  19. Virtual Private Networks 02:51
  20. VPN Protocols 01:58
  21. IP Security (IPSec) 03:01
  22. IPSec Modes 01:02
  23. Demo - Examining IPSec Policies 09:28
  24. Secure Sockets Layer (SSL) 01:44
  25. Transport Layer Security (TLS 01:00
  26. Additional Security Protocols 03:26
  27. Authentication Protocols 04:45
  28. Topic D: Network Solutions for Data Flow 00:36
  29. Data Loss Prevention 02:48
  30. Data Flow Enforcement 02:00
  31. Network Flow 01:32
  32. Topic E: Secure Baselines of Networking and Security Components 00:31
  33. Securing Device Configurations 00:25
  34. Access Control Lists (ACLs) 00:43
  35. ACL Rule Sets 02:04
  36. Change Monitoring 01:30
  37. Configuration Lockdown 00:51
  38. Availability Controls 03:29
  39. Disk Availability 03:56
  40. Key Availability Terms 01:25
  41. Topic F: Advanced Configuration of Network Devices 00:16
  42. Additional Configurations 00:49
  43. Transport Security 01:44
  44. Trunking Security 03:47
  45. Port Security 02:20
  46. Ports and Sockets 03:37
  47. Security Zones 01:29
  48. Network Segmentation 01:24
  49. Network Access Control 02:52
  50. NAC Concepts 02:53
  51. Network Enabled Devices 02:21
  52. Automation Systems 01:23
  53. Physical Security 02:17
  54. Chapter 02 Review 01:16
  Video Name Time
  1. Chapter Introdcution 00:56
  2. Topic A: Understanding Authentication and Authorization Concepts 00:20
  3. Authentication 04:42
  4. The Importance of Identity 07:43
  5. Additional Password Options 00:54
  6. Demo - Enforcing Strong Passwords 10:04
  7. Biometric Authentication 02:50
  8. Biometric Considerations 01:35
  9. Beyond Single Factor 01:38
  10. Certificate Authentication 03:01
  11. Authorization 07:42
  12. Open Authorization 01:07
  13. XACML 01:55
  14. SPML 01:06
  15. Authorization Concepts 04:02
  16. Trust Models 01:53
  17. Topic B: Cryptographic Techniques 00:27
  18. Introduction to Cryptography 01:19
  19. Cryptographic Techniques 00:51
  20. Key Stretching 00:58
  21. Hashing 03:14
  22. Message Digest (MD) Algorithms 01:36
  23. Secure Hash Algorithm (SHA) 01:30
  24. Digital Signatures 02:00
  25. Message Authentication 01:17
  26. Code Signing 00:45
  27. Additional Concepts 02:12
  28. Protecting Data in Transit 02:02
  29. Protecting Data in Memory 01:13
  30. Protecting Data at Rest 03:44
  31. Symmetric Algorithms 04:08
  32. Asymmetric Algorithms 03:00
  33. Encryption Methods 03:22
  34. Topic C: Cryptographic Implementations 00:27
  35. Crypto Options 02:09
  36. Additional Crypto Options 02:42
  37. Cryptographic Applications 01:05
  38. Crypto Considerations 01:27
  39. Stream vs. Block Ciphers 01:47
  40. Block Cipher Modes 00:25
  41. Public Key Infrastructure 05:41
  42. Primary PKI Functions 02:09
  43. Additional PKI Concepts 01:42
  44. Chapter 03 Review 01:05
  Video Name Time
  1. Chapter Introdcution 00:56
  2. Topic A: Security for Host Devices 00:25
  3. Trusted OS 02:14
  4. Trusted OS Options 03:11
  5. Security Software 06:06
  6. Additional Host-Based Software Options 02:24
  7. Demo - Configuring a Host-Based Firewall 07:42
  8. Auditing 02:08
  9. Demo - Configuring Audit Policies 08:14
  10. Endpoint Detection Response 01:00
  11. Host Hardening 04:00
  12. Group Policy 02:20
  13. Demo - Configuring Group Policy Security 04:44
  14. Command Shell Restrictions 02:17
  15. Out-of-Band Management 02:11
  16. Dedicated Interfaces 02:34
  17. External I/O Restrictions 01:54
  18. Wireless Technologies 05:03
  19. Wi-Fi Components 01:59
  20. 802.11 Standards 03:21
  21. Wireless Security 05:39
  22. Securing Other Host Devices 03:18
  23. Boot Security 02:06
  24. Additional Boot Security Options 04:30
  25. Topic B: Mobile Device Security 00:41
  26. Enterprise Mobility Management 01:18
  27. MDM Concepts 02:56
  28. Management Options 03:32
  29. Context Aware Management 03:57
  30. Security and Privacy 04:16
  31. Physical Security Options 01:27
  32. Additional Mobile Device Concepts 06:07
  33. Authentication Options 02:22
  34. Mobile Devices 04:46
  35. Wearable Security Implications 01:38
  36. Topic C: Software Security Controls 00:26
  37. Application Security Design Considerations 03:03
  38. Application Issues 06:30
  39. Application Issues conti... 08:18
  40. Data Remnants 01:41
  41. Securing Applications 02:34
  42. Using JSON and REST 01:39
  43. Browser Extensions 02:39
  44. Application Vulnerabilities 01:57
  45. Chapter 04 Review 01:06
  Video Name Time
  1. Chapter Introduction 02:21
  2. Topic A: Cloud and Virtualization Technology 01:22
  3. Cloud Computing and Virtualization 05:48
  4. Cloud Options 10:37
  5. Security Considerations 04:35
  6. Cloud Service Models 07:39
  7. Demo - Examining Cloud Service Models 09:14
  8. Security and Virtualization 05:46
  9. Cloud-Augmented Security Services 07:25
  10. Security as a Service 01:54
  11. Virtualization Vulnerabilities 03:40
  12. Topic B: Securing Remote Access and Collaboration 00:37
  13. Remote Access 01:09
  14. Dial-Up Access 03:09
  15. Virtual Private Networks 01:49
  16. Remote Access Purposes 03:05
  17. Security Considerations 02:08
  18. Unified Collaboration Tools 01:08
  19. Web Conferencing 04:43
  20. Video Conferencing 03:06
  21. Storage and Document Collaboration 03:12
  22. Unified Communication 01:44
  23. Instant Messaging 03:01
  24. Presence 03:13
  25. E-Mail 11:55
  26. Chapter 05 Review 01:04
  Video Name Time
  1. Chapter Introduction 01:09
  2. Topic A: Security Assessments 00:20
  3. Importance of Security Assessments 00:40
  4. Malware Sandboxing 02:29
  5. Memory Dumping 01:36
  6. Runtime Debugging 01:25
  7. Reconnaissance 01:20
  8. Fingerprinting 02:29
  9. Code Review 02:47
  10. Social Engineering 12:48
  11. Public Information 11:15
  12. Demo - Accessing Public Information 06:36
  13. Penetration Test 05:41
  14. Vulnerability Assessment 02:55
  15. Assessment Styles 04:30
  16. Topic B: Security Assessment Tools 00:34
  17. Network Tool Types 04:39
  18. Security Content Automation Protocol (SCAP) 02:03
  19. Common Vulnerability Scoring System (CVSS) 03:16
  20. Fuzzing 00:50
  21. Exploit Kits 01:06
  22. Host Tools 07:25
  23. Additional Host Tools 03:40
  24. Physical Security Tools 03:23
  25. Topic C: Incident Response and Recovery 01:02
  26. E-discovery 05:37
  27. Data Breach 01:23
  28. Incident Response Process 04:30
  29. Chapter 06 Review 00:56
  30. Course Closure 02:36

Student Feedback

5 Stars
4 Stars
3 Stars
2 Stars
1 Star
4.5
Rating: 4.5
Overall Rating: Good.

Similar Courses

Only Registered Members can View Training Courses

Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.

  • Trusted by 1.2M IT Certification Candidates Every Month
  • Hundreds Hours of Videos
  • Instant download After Registration

Already Member? Click here to Login

A confirmation link will be sent to this email address to verify your login

1200+ IT Certification Exams available: Get a free sample of any exam right now!
Try Free Demo

Try Free Demo

  • ABA
  • ACAMS
  • ACFE
  • ACI
  • ACSM
  • Adobe
  • AHIMA
  • AHIP
  • AHLEI
  • AICPA
  • AIWMI
  • Alfresco
  • AMA
  • Amazon
  • AndroidATC
  • APBM
  • API
  • APICS
  • Apple
  • Arista
  • Aruba
  • ASIS
  • ASQ
  • Atlassian
  • Autodesk
  • Avaya
  • Axis Communications
  • BACB
  • BCS
  • BICSI
  • Blockchain
  • Blue Coat
  • Blue Prism
  • Brocade
  • C++ Institute
  • CA Technologies
  • Checkpoint
  • CIMA
  • Cisco
  • Citrix
  • CIW
  • Cloudera
  • CompTIA
  • CSA
  • CWNP
  • CyberArc
  • Dell
  • DMI
  • DSCI
  • ECCouncil
  • EMC
  • Esri
  • Exin
  • Extreme Networks
  • F5
  • FileMaker
  • FINRA
  • Fortinet
  • GAQM
  • GARP
  • Genesys
  • GIAC
  • Google
  • Guidance Software
  • H3C
  • HFMA
  • HIPAA
  • Hitachi
  • HP
  • HRCI
  • Huawei
  • IAPP
  • IBM
  • IFPUG
  • IIA
  • IIBA
  • Informatica
  • Isaca
  • iSAQB
  • ISC
  • iSQI
  • ISTQB
  • ITIL
  • Juniper
  • Linux Foundation
  • Logical Operations
  • LPI
  • Magento
  • Marketo
  • McAfee
  • Microsoft
  • Mulesoft
  • NACVA
  • NCMA
  • Network Appliance
  • NI
  • Nokia
  • Novell
  • Nuage Networks
  • OMG
  • Palo Alto Networks
  • Pegasystems
  • PEOPLECERT
  • PMI
  • PRINCE2
  • Python Institute
  • QlikView
  • RedHat
  • Riverbed
  • RSA
  • Salesforce
  • SANS
  • SAP
  • SAS Institute
  • Scrum
  • SDI
  • ServiceNow
  • Six Sigma
  • SNIA
  • SOA
  • Software Certifications
  • SolarWinds
  • Splunk
  • SpringSource
  • Symantec
  • Teradata
  • Test Prep
  • The Open Group
  • Tibco
  • VCE
  • Veeam
  • Veritas
  • Vmedu
  • VMware
  • WatchGuard
  • WorldatWork
  • Zend
Next Step
Next Step

Try Free Demo

  • CompTIA
Next Step
Next Step

Summer Sale! Get 25% Discount on All Your Purchases!

Passguide Products

Enter Your Email Address to Receive Your 25%
OFF
Discount Code Plus... Our Exclusive Weekly Deals

* We value your privacy. We will not rent or sell your email address