CAS-003: CompTIA Advanced Security Practitioner (CASP) CAS-003
Your CompTIA CAS-003 exam is just around the corner, right? So, it's high time to find an effective preparation tool! Our training course is what you really need! This is a series of videos led by the experienced IT instructors who will provide you with a detailed overview of the CAS-003 certification test. Ace your CompTIA CAS-003 at the first attempt and obtain the CompTIA Advanced Security Practitioner (CASP) CAS-003 credential with ease.
Curriculum for CAS-003 Video Course
Course Introduction
Video Name | Time | |
---|---|---|
1. Course Introduction | 03:22 | |
2. Instructor Introduction | 01:35 |
Video Name | Time | |
---|---|---|
1. Chapter Introdcution | 02:15 | |
2. Topic A: Understanding Business and Industry Influences | 00:10 | |
3. Ongoing Risk Management | 01:17 | |
4. New Products and User Behaviors | 03:43 | |
5. Business Models and Strategies | 03:25 | |
6. Cloud Technologies | 04:47 | |
7. Acquisitions and Mergers | 03:08 | |
8. Due Diligence Team | 01:05 | |
9. Data Ownership | 01:30 | |
10. Data Reclassification | 01:00 | |
11. Integrating Diverse Industries | 05:01 | |
12. Common Regulations | 05:08 | |
13. Geographic Differences | 02:25 | |
14. Data Sovereignty | 00:53 | |
15. Internal and External Influences | 05:32 | |
16. De-perimeterization | 01:07 | |
17. Understand Changes in Network Boundaries | 06:53 | |
18. Topic B: Policies and Procedures | 00:22 | |
19. Understanding Policies and Procedures | 01:34 | |
20. Policy Life Cycle | 01:28 | |
21. Process Life Cycle | 01:30 | |
22. Reviewing Policies and Processes | 03:45 | |
23. Common Business Documents | 04:44 | |
24. Security for Contracts | 01:14 | |
25. Contract Requirements | 01:54 | |
26. General Privacy Principles | 01:13 | |
27. Standard Security Practices | 11:28 | |
28. Demo - Examining Security Policies | 07:11 | |
29. Topic C: Risk Mitigation and Control | 00:24 | |
30. Introduction to Risk Mitigation | 01:00 | |
31. Categorizing Data | 03:48 | |
32. Incorporating Stakeholder Input | 01:18 | |
33. Aggregate CIA Scores | 01:37 | |
34. Selecting and Implementing Controls | 04:11 | |
35. Security Control Frameworks | 00:51 | |
36. Options for Frameworks | 04:40 | |
37. Extreme Scenario Planning | 02:41 | |
38. System-Specific Risk Analysis | 01:13 | |
39. Qualitative Risk Analysis | 01:39 | |
40. Quantitative Risk Analysis | 01:06 | |
41. Risk Impact | 03:08 | |
42. Likelihood of Threat | 00:48 | |
43. Return on Investment | 01:52 | |
44. Understanding Payback | 02:05 | |
45. Total Cost of Ownership | 01:24 | |
46. TCO Guidelines | 01:23 | |
47. Translate to Business Terms | 01:31 | |
48. Risk Management Strategies | 02:09 | |
49. Risk Management Processes | 01:06 | |
50. Information and Asset Value and Costs | 00:49 | |
51. Vulnerabilities and Threat Identification | 01:06 | |
52. Additional Factors | 01:34 | |
53. Topic D: Business Continuity Planning | 00:21 | |
54. Continuity Planning | 00:19 | |
55. BCP Components | 01:51 | |
56. BCP Steps | 02:38 | |
57. Additional Plans | 01:48 | |
58. Conducting Business Impact Analysis | 04:57 | |
59. Chapter 01 Review | 01:03 |
Video Name | Time | |
---|---|---|
1. Chapter Introdcution | 00:34 | |
2. Topic A: Physical and Virtual Network Security Devices | 00:15 | |
3. Unified Threat Management | 01:19 | |
4. Analyzing UTM | 01:31 | |
5. Intrusion Detection and Prevention | 05:13 | |
6. In-Line Network Encryptor | 01:31 | |
7. Network Access Control | 03:02 | |
8. SIEM | 01:15 | |
9. Firewalls | 07:05 | |
10. Firewall Architecture | 05:16 | |
11. Wireless Controller | 01:49 | |
12. Routers and Switches | 02:09 | |
13. Proxy Servers | 01:30 | |
14. Topic B: Application and Protocol Level Security | 00:29 | |
15. Web Application Firewalls | 01:46 | |
16. Hardware Security Modules | 01:50 | |
17. Vulnerability Scanners | 02:11 | |
18. Topic C: Advanced Network Design | 00:31 | |
19. Virtual Private Networks | 02:51 | |
20. VPN Protocols | 01:58 | |
21. IP Security (IPSec) | 03:01 | |
22. IPSec Modes | 01:02 | |
23. Demo - Examining IPSec Policies | 09:28 | |
24. Secure Sockets Layer (SSL) | 01:44 | |
25. Transport Layer Security (TLS | 01:00 | |
26. Additional Security Protocols | 03:26 | |
27. Authentication Protocols | 04:45 | |
28. Topic D: Network Solutions for Data Flow | 00:36 | |
29. Data Loss Prevention | 02:48 | |
30. Data Flow Enforcement | 02:00 | |
31. Network Flow | 01:32 | |
32. Topic E: Secure Baselines of Networking and Security Components | 00:31 | |
33. Securing Device Configurations | 00:25 | |
34. Access Control Lists (ACLs) | 00:43 | |
35. ACL Rule Sets | 02:04 | |
36. Change Monitoring | 01:30 | |
37. Configuration Lockdown | 00:51 | |
38. Availability Controls | 03:29 | |
39. Disk Availability | 03:56 | |
40. Key Availability Terms | 01:25 | |
41. Topic F: Advanced Configuration of Network Devices | 00:16 | |
42. Additional Configurations | 00:49 | |
43. Transport Security | 01:44 | |
44. Trunking Security | 03:47 | |
45. Port Security | 02:20 | |
46. Ports and Sockets | 03:37 | |
47. Security Zones | 01:29 | |
48. Network Segmentation | 01:24 | |
49. Network Access Control | 02:52 | |
50. NAC Concepts | 02:53 | |
51. Network Enabled Devices | 02:21 | |
52. Automation Systems | 01:23 | |
53. Physical Security | 02:17 | |
54. Chapter 02 Review | 01:16 |
Video Name | Time | |
---|---|---|
1. Chapter Introdcution | 00:56 | |
2. Topic A: Understanding Authentication and Authorization Concepts | 00:20 | |
3. Authentication | 04:42 | |
4. The Importance of Identity | 07:43 | |
5. Additional Password Options | 00:54 | |
6. Demo - Enforcing Strong Passwords | 10:04 | |
7. Biometric Authentication | 02:50 | |
8. Biometric Considerations | 01:35 | |
9. Beyond Single Factor | 01:38 | |
10. Certificate Authentication | 03:01 | |
11. Authorization | 07:42 | |
12. Open Authorization | 01:07 | |
13. XACML | 01:55 | |
14. SPML | 01:06 | |
15. Authorization Concepts | 04:02 | |
16. Trust Models | 01:53 | |
17. Topic B: Cryptographic Techniques | 00:27 | |
18. Introduction to Cryptography | 01:19 | |
19. Cryptographic Techniques | 00:51 | |
20. Key Stretching | 00:58 | |
21. Hashing | 03:14 | |
22. Message Digest (MD) Algorithms | 01:36 | |
23. Secure Hash Algorithm (SHA) | 01:30 | |
24. Digital Signatures | 02:00 | |
25. Message Authentication | 01:17 | |
26. Code Signing | 00:45 | |
27. Additional Concepts | 02:12 | |
28. Protecting Data in Transit | 02:02 | |
29. Protecting Data in Memory | 01:13 | |
30. Protecting Data at Rest | 03:44 | |
31. Symmetric Algorithms | 04:08 | |
32. Asymmetric Algorithms | 03:00 | |
33. Encryption Methods | 03:22 | |
34. Topic C: Cryptographic Implementations | 00:27 | |
35. Crypto Options | 02:09 | |
36. Additional Crypto Options | 02:42 | |
37. Cryptographic Applications | 01:05 | |
38. Crypto Considerations | 01:27 | |
39. Stream vs. Block Ciphers | 01:47 | |
40. Block Cipher Modes | 00:25 | |
41. Public Key Infrastructure | 05:41 | |
42. Primary PKI Functions | 02:09 | |
43. Additional PKI Concepts | 01:42 | |
44. Chapter 03 Review | 01:05 |
Video Name | Time | |
---|---|---|
1. Chapter Introdcution | 00:56 | |
2. Topic A: Security for Host Devices | 00:25 | |
3. Trusted OS | 02:14 | |
4. Trusted OS Options | 03:11 | |
5. Security Software | 06:06 | |
6. Additional Host-Based Software Options | 02:24 | |
7. Demo - Configuring a Host-Based Firewall | 07:42 | |
8. Auditing | 02:08 | |
9. Demo - Configuring Audit Policies | 08:14 | |
10. Endpoint Detection Response | 01:00 | |
11. Host Hardening | 04:00 | |
12. Group Policy | 02:20 | |
13. Demo - Configuring Group Policy Security | 04:44 | |
14. Command Shell Restrictions | 02:17 | |
15. Out-of-Band Management | 02:11 | |
16. Dedicated Interfaces | 02:34 | |
17. External I/O Restrictions | 01:54 | |
18. Wireless Technologies | 05:03 | |
19. Wi-Fi Components | 01:59 | |
20. 802.11 Standards | 03:21 | |
21. Wireless Security | 05:39 | |
22. Securing Other Host Devices | 03:18 | |
23. Boot Security | 02:06 | |
24. Additional Boot Security Options | 04:30 | |
25. Topic B: Mobile Device Security | 00:41 | |
26. Enterprise Mobility Management | 01:18 | |
27. MDM Concepts | 02:56 | |
28. Management Options | 03:32 | |
29. Context Aware Management | 03:57 | |
30. Security and Privacy | 04:16 | |
31. Physical Security Options | 01:27 | |
32. Additional Mobile Device Concepts | 06:07 | |
33. Authentication Options | 02:22 | |
34. Mobile Devices | 04:46 | |
35. Wearable Security Implications | 01:38 | |
36. Topic C: Software Security Controls | 00:26 | |
37. Application Security Design Considerations | 03:03 | |
38. Application Issues | 06:30 | |
39. Application Issues conti... | 08:18 | |
40. Data Remnants | 01:41 | |
41. Securing Applications | 02:34 | |
42. Using JSON and REST | 01:39 | |
43. Browser Extensions | 02:39 | |
44. Application Vulnerabilities | 01:57 | |
45. Chapter 04 Review | 01:06 |
Video Name | Time | |
---|---|---|
1. Chapter Introduction | 02:21 | |
2. Topic A: Cloud and Virtualization Technology | 01:22 | |
3. Cloud Computing and Virtualization | 05:48 | |
4. Cloud Options | 10:37 | |
5. Security Considerations | 04:35 | |
6. Cloud Service Models | 07:39 | |
7. Demo - Examining Cloud Service Models | 09:14 | |
8. Security and Virtualization | 05:46 | |
9. Cloud-Augmented Security Services | 07:25 | |
10. Security as a Service | 01:54 | |
11. Virtualization Vulnerabilities | 03:40 | |
12. Topic B: Securing Remote Access and Collaboration | 00:37 | |
13. Remote Access | 01:09 | |
14. Dial-Up Access | 03:09 | |
15. Virtual Private Networks | 01:49 | |
16. Remote Access Purposes | 03:05 | |
17. Security Considerations | 02:08 | |
18. Unified Collaboration Tools | 01:08 | |
19. Web Conferencing | 04:43 | |
20. Video Conferencing | 03:06 | |
21. Storage and Document Collaboration | 03:12 | |
22. Unified Communication | 01:44 | |
23. Instant Messaging | 03:01 | |
24. Presence | 03:13 | |
25. E-Mail | 11:55 | |
26. Chapter 05 Review | 01:04 |
Video Name | Time | |
---|---|---|
1. Chapter Introduction | 01:09 | |
2. Topic A: Security Assessments | 00:20 | |
3. Importance of Security Assessments | 00:40 | |
4. Malware Sandboxing | 02:29 | |
5. Memory Dumping | 01:36 | |
6. Runtime Debugging | 01:25 | |
7. Reconnaissance | 01:20 | |
8. Fingerprinting | 02:29 | |
9. Code Review | 02:47 | |
10. Social Engineering | 12:48 | |
11. Public Information | 11:15 | |
12. Demo - Accessing Public Information | 06:36 | |
13. Penetration Test | 05:41 | |
14. Vulnerability Assessment | 02:55 | |
15. Assessment Styles | 04:30 | |
16. Topic B: Security Assessment Tools | 00:34 | |
17. Network Tool Types | 04:39 | |
18. Security Content Automation Protocol (SCAP) | 02:03 | |
19. Common Vulnerability Scoring System (CVSS) | 03:16 | |
20. Fuzzing | 00:50 | |
21. Exploit Kits | 01:06 | |
22. Host Tools | 07:25 | |
23. Additional Host Tools | 03:40 | |
24. Physical Security Tools | 03:23 | |
25. Topic C: Incident Response and Recovery | 01:02 | |
26. E-discovery | 05:37 | |
27. Data Breach | 01:23 | |
28. Incident Response Process | 04:30 | |
29. Chapter 06 Review | 00:56 | |
30. Course Closure | 02:36 |
Student Feedback
Similar Courses
Only Registered Members can View Training Courses
Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.
Try Free Demo
Try Free Demo
Spring Sale! Get 30% Discount on All Your Purchases!
Enter Your Email Address to Receive Your 30%
OFF Discount Code Plus... Our Exclusive Weekly Deals