Curriculum For This Course
Video tutorials list
-
Course Introduction
Video Name Time 1. Course Introduction 03:22 2. Instructor Introduction 01:35 -
Chapter 01 - Understanding Risk Management
Video Name Time 1. Chapter Introdcution 02:15 2. Topic A: Understanding Business and Industry Influences 00:10 3. Ongoing Risk Management 01:17 4. New Products and User Behaviors 03:43 5. Business Models and Strategies 03:25 6. Cloud Technologies 04:47 7. Acquisitions and Mergers 03:08 8. Due Diligence Team 01:05 9. Data Ownership 01:30 10. Data Reclassification 01:00 11. Integrating Diverse Industries 05:01 12. Common Regulations 05:08 13. Geographic Differences 02:25 14. Data Sovereignty 00:53 15. Internal and External Influences 05:32 16. De-perimeterization 01:07 17. Understand Changes in Network Boundaries 06:53 18. Topic B: Policies and Procedures 00:22 19. Understanding Policies and Procedures 01:34 20. Policy Life Cycle 01:28 21. Process Life Cycle 01:30 22. Reviewing Policies and Processes 03:45 23. Common Business Documents 04:44 24. Security for Contracts 01:14 25. Contract Requirements 01:54 26. General Privacy Principles 01:13 27. Standard Security Practices 11:28 28. Demo - Examining Security Policies 07:11 29. Topic C: Risk Mitigation and Control 00:24 30. Introduction to Risk Mitigation 01:00 31. Categorizing Data 03:48 32. Incorporating Stakeholder Input 01:18 33. Aggregate CIA Scores 01:37 34. Selecting and Implementing Controls 04:11 35. Security Control Frameworks 00:51 36. Options for Frameworks 04:40 37. Extreme Scenario Planning 02:41 38. System-Specific Risk Analysis 01:13 39. Qualitative Risk Analysis 01:39 40. Quantitative Risk Analysis 01:06 41. Risk Impact 03:08 42. Likelihood of Threat 00:48 43. Return on Investment 01:52 44. Understanding Payback 02:05 45. Total Cost of Ownership 01:24 46. TCO Guidelines 01:23 47. Translate to Business Terms 01:31 48. Risk Management Strategies 02:09 49. Risk Management Processes 01:06 50. Information and Asset Value and Costs 00:49 51. Vulnerabilities and Threat Identification 01:06 52. Additional Factors 01:34 53. Topic D: Business Continuity Planning 00:21 54. Continuity Planning 00:19 55. BCP Components 01:51 56. BCP Steps 02:38 57. Additional Plans 01:48 58. Conducting Business Impact Analysis 04:57 59. Chapter 01 Review 01:03 -
Chapter 02 - Network and Security Components and Architecture
Video Name Time 1. Chapter Introdcution 00:34 2. Topic A: Physical and Virtual Network Security Devices 00:15 3. Unified Threat Management 01:19 4. Analyzing UTM 01:31 5. Intrusion Detection and Prevention 05:13 6. In-Line Network Encryptor 01:31 7. Network Access Control 03:02 8. SIEM 01:15 9. Firewalls 07:05 10. Firewall Architecture 05:16 11. Wireless Controller 01:49 12. Routers and Switches 02:09 13. Proxy Servers 01:30 14. Topic B: Application and Protocol Level Security 00:29 15. Web Application Firewalls 01:46 16. Hardware Security Modules 01:50 17. Vulnerability Scanners 02:11 18. Topic C: Advanced Network Design 00:31 19. Virtual Private Networks 02:51 20. VPN Protocols 01:58 21. IP Security (IPSec) 03:01 22. IPSec Modes 01:02 23. Demo - Examining IPSec Policies 09:28 24. Secure Sockets Layer (SSL) 01:44 25. Transport Layer Security (TLS 01:00 26. Additional Security Protocols 03:26 27. Authentication Protocols 04:45 28. Topic D: Network Solutions for Data Flow 00:36 29. Data Loss Prevention 02:48 30. Data Flow Enforcement 02:00 31. Network Flow 01:32 32. Topic E: Secure Baselines of Networking and Security Components 00:31 33. Securing Device Configurations 00:25 34. Access Control Lists (ACLs) 00:43 35. ACL Rule Sets 02:04 36. Change Monitoring 01:30 37. Configuration Lockdown 00:51 38. Availability Controls 03:29 39. Disk Availability 03:56 40. Key Availability Terms 01:25 41. Topic F: Advanced Configuration of Network Devices 00:16 42. Additional Configurations 00:49 43. Transport Security 01:44 44. Trunking Security 03:47 45. Port Security 02:20 46. Ports and Sockets 03:37 47. Security Zones 01:29 48. Network Segmentation 01:24 49. Network Access Control 02:52 50. NAC Concepts 02:53 51. Network Enabled Devices 02:21 52. Automation Systems 01:23 53. Physical Security 02:17 54. Chapter 02 Review 01:16 -
Chapter 03 - Implementing Advanced Authentication and Cryptographic Techniques
Video Name Time 1. Chapter Introdcution 00:56 2. Topic A: Understanding Authentication and Authorization Concepts 00:20 3. Authentication 04:42 4. The Importance of Identity 07:43 5. Additional Password Options 00:54 6. Demo - Enforcing Strong Passwords 10:04 7. Biometric Authentication 02:50 8. Biometric Considerations 01:35 9. Beyond Single Factor 01:38 10. Certificate Authentication 03:01 11. Authorization 07:42 12. Open Authorization 01:07 13. XACML 01:55 14. SPML 01:06 15. Authorization Concepts 04:02 16. Trust Models 01:53 17. Topic B: Cryptographic Techniques 00:27 18. Introduction to Cryptography 01:19 19. Cryptographic Techniques 00:51 20. Key Stretching 00:58 21. Hashing 03:14 22. Message Digest (MD) Algorithms 01:36 23. Secure Hash Algorithm (SHA) 01:30 24. Digital Signatures 02:00 25. Message Authentication 01:17 26. Code Signing 00:45 27. Additional Concepts 02:12 28. Protecting Data in Transit 02:02 29. Protecting Data in Memory 01:13 30. Protecting Data at Rest 03:44 31. Symmetric Algorithms 04:08 32. Asymmetric Algorithms 03:00 33. Encryption Methods 03:22 34. Topic C: Cryptographic Implementations 00:27 35. Crypto Options 02:09 36. Additional Crypto Options 02:42 37. Cryptographic Applications 01:05 38. Crypto Considerations 01:27 39. Stream vs. Block Ciphers 01:47 40. Block Cipher Modes 00:25 41. Public Key Infrastructure 05:41 42. Primary PKI Functions 02:09 43. Additional PKI Concepts 01:42 44. Chapter 03 Review 01:05 -
Chapter 04 - Implementing Security for Systems, Applications, and Storage
Video Name Time 1. Chapter Introdcution 00:56 2. Topic A: Security for Host Devices 00:25 3. Trusted OS 02:14 4. Trusted OS Options 03:11 5. Security Software 06:06 6. Additional Host-Based Software Options 02:24 7. Demo - Configuring a Host-Based Firewall 07:42 8. Auditing 02:08 9. Demo - Configuring Audit Policies 08:14 10. Endpoint Detection Response 01:00 11. Host Hardening 04:00 12. Group Policy 02:20 13. Demo - Configuring Group Policy Security 04:44 14. Command Shell Restrictions 02:17 15. Out-of-Band Management 02:11 16. Dedicated Interfaces 02:34 17. External I/O Restrictions 01:54 18. Wireless Technologies 05:03 19. Wi-Fi Components 01:59 20. 802.11 Standards 03:21 21. Wireless Security 05:39 22. Securing Other Host Devices 03:18 23. Boot Security 02:06 24. Additional Boot Security Options 04:30 25. Topic B: Mobile Device Security 00:41 26. Enterprise Mobility Management 01:18 27. MDM Concepts 02:56 28. Management Options 03:32 29. Context Aware Management 03:57 30. Security and Privacy 04:16 31. Physical Security Options 01:27 32. Additional Mobile Device Concepts 06:07 33. Authentication Options 02:22 34. Mobile Devices 04:46 35. Wearable Security Implications 01:38 36. Topic C: Software Security Controls 00:26 37. Application Security Design Considerations 03:03 38. Application Issues 06:30 39. Application Issues conti... 08:18 40. Data Remnants 01:41 41. Securing Applications 02:34 42. Using JSON and REST 01:39 43. Browser Extensions 02:39 44. Application Vulnerabilities 01:57 45. Chapter 04 Review 01:06 -
Chapter 05 - Implementing Security for Cloud and Virtualization Technologies
Video Name Time 1. Chapter Introduction 02:21 2. Topic A: Cloud and Virtualization Technology 01:22 3. Cloud Computing and Virtualization 05:48 4. Cloud Options 10:37 5. Security Considerations 04:35 6. Cloud Service Models 07:39 7. Demo - Examining Cloud Service Models 09:14 8. Security and Virtualization 05:46 9. Cloud-Augmented Security Services 07:25 10. Security as a Service 01:54 11. Virtualization Vulnerabilities 03:40 12. Topic B: Securing Remote Access and Collaboration 00:37 13. Remote Access 01:09 14. Dial-Up Access 03:09 15. Virtual Private Networks 01:49 16. Remote Access Purposes 03:05 17. Security Considerations 02:08 18. Unified Collaboration Tools 01:08 19. Web Conferencing 04:43 20. Video Conferencing 03:06 21. Storage and Document Collaboration 03:12 22. Unified Communication 01:44 23. Instant Messaging 03:01 24. Presence 03:13 25. E-Mail 11:55 26. Chapter 05 Review 01:04 -
Chapter 06 - Utilizing Security Assessments and Incident Response
Video Name Time 1. Chapter Introduction 01:09 2. Topic A: Security Assessments 00:20 3. Importance of Security Assessments 00:40 4. Malware Sandboxing 02:29 5. Memory Dumping 01:36 6. Runtime Debugging 01:25 7. Reconnaissance 01:20 8. Fingerprinting 02:29 9. Code Review 02:47 10. Social Engineering 12:48 11. Public Information 11:15 12. Demo - Accessing Public Information 06:36 13. Penetration Test 05:41 14. Vulnerability Assessment 02:55 15. Assessment Styles 04:30 16. Topic B: Security Assessment Tools 00:34 17. Network Tool Types 04:39 18. Security Content Automation Protocol (SCAP) 02:03 19. Common Vulnerability Scoring System (CVSS) 03:16 20. Fuzzing 00:50 21. Exploit Kits 01:06 22. Host Tools 07:25 23. Additional Host Tools 03:40 24. Physical Security Tools 03:23 25. Topic C: Incident Response and Recovery 01:02 26. E-discovery 05:37 27. Data Breach 01:23 28. Incident Response Process 04:30 29. Chapter 06 Review 00:56 30. Course Closure 02:36
CAS-003: CompTIA Advanced Security Practitioner (CASP+) CAS-003 Certification Training Video Course Intro
Certbolt provides top-notch exam prep CAS-003: CompTIA Advanced Security Practitioner (CASP+) CAS-003 certification training video course to prepare for the exam. Additionally, we have CompTIA CASP+ CAS-003 exam dumps & practice test questions and answers to prepare and study. pass your next exam confidently with our CAS-003: CompTIA Advanced Security Practitioner (CASP+) CAS-003 certification video training course which has been written by CompTIA experts.
This CAS-003 video course targets security professionals who want to advance their knowledge and validate extra competence with the CompTIA CASP+ certification. Through 260 interactive lectures, you will learn all the topics required by the test and will solidify the understanding of essential concepts. By providing a detailed overview of the security sphere, these videos help one to delve into specifics of the industry and comprehend them right.
Description
The video course starts with an introduction and then provides students with crucial information divided into six parts. These involve the basics of risk management, components and architecture of networks and security, cryptography and advanced authentication, the security of apps, storage, and systems, as well as virtualization and cloud technologies, and the use of security assessments along with the incident response.
By following the entire course, you will build a strong knowledge base and get proficiency in the skills needed to support a resilient enterprise by applying safety solutions within complex environments as well as integrate, engineer, and conceptualize them. Be ready to allocate about 12 hours to go through all the videos and don’t hesitate to watch the most difficult ones one more time.
Knowledge and Skills Students Develop
As it comes from the above domains included in the course, one will acquire skills and knowledge that include but are not limited to the following:
- Business and industry influences, user behaviors, cloud technologies, business models and strategies, data ownership, common regulations, security for contracts, basic privacy principles, categorizing data, qualitative and quantitative risk analysis, risk management strategies and processes;
- Virtual and physical network security devices, detection and prevention of intrusion, network access control, firewalls, SIEM, proxy servers, routers and switches, hardware security modules, VPN protocols, authentication protocols, Data Loss Prevention, availability controls;
- The role of identity, biometric authentication, open authorization, trust models, hashing, digital signatures, data protection in memory and transit, symmetric and asymmetric algorithms, methods of encryption, PKI;
- Trusted OS, auditing, host hardening, command shell restrictions, dedicated interfaces, wireless technologies and security, boot security, Context Aware Management, application issues, data remnants, the use of REST and JSON, application vulnerabilities;
- Cloud computing, virtualization, cloud service models, SaaS, remote access, dial-up access, web and video conferencing, unified communication;
- Malware sandboxing, memory dumping, fingerprinting, social engineering, penetration test, network tool types, fuzzing, exploit kits, host tools, E-discovery, incident response.
Requirements for This Course
This is an advanced-level course, so basic knowledge of security concepts as well as a core understanding of the mentioned domains is recommended. Also, if you are choosing this course to prepare for CASP+, remember that the certificate has eligibility requirements as well as 10 years of working background in IT administration, 5 of which should have been dedicated to security tasks.
Exam Design
- 90 multiple-choice and performance-based questions
- A duration of 165 minutes
- The test can be taken in English or Japanese
- A registration fee is $452.
Audience to Target
- Those preparing for the CompTIA CAS-003 exam
- Applicants for the CASP+ certification
- Intermediate-level security professionals as well as CompTIA Security+ holders willing to upgrade their skillset
- Specialists that want to verify their competence in cybersecurity to get promoted or earn better compensation
Conclusion
By learning the topics included in this video course, you will get ready to ace the CompTIA CAS-003 exam and get CASP+ certified. The advantage of such a form of study materials is the opportunity to see visual examples and thus better understand even complex principles. After this course, you’ll also be prepared to solve any issue arising in the workplace.
Job Opportunities
Once getting CASP+ accredited, professionals can easily apply for the following roles: security engineer, application security engineer, technical lead analyst, security architect, and others. According to the survey conducted by PayScale, average annual salaries for the mentioned positions are $92k, $98k, $124k, and $91k, respectively. Notice, that the sum might be even higher, depending on the experience level, the company, and other factors.
Certbolt's total training solution includes CAS-003: CompTIA Advanced Security Practitioner (CASP+) CAS-003 certification video training course, CompTIA CASP+ CAS-003 practice test questions and answers & exam dumps which provide the complete exam prep resource and provide you with practice skills to pass the exam. CAS-003: CompTIA Advanced Security Practitioner (CASP+) CAS-003 certification video training course provides a structured approach easy to understand, structured approach which is divided into sections in order to study in shortest time possible.
Add Comment