Curriculum For This Course
Video tutorials list
-
Corse Introduction
Video Name Time 1. Introduction to CASP+ (CAS-005) / SecurityX Training 4:52 -
Security Foundations (Refresh)
Video Name Time 1. Understand the CIA Triad and Security Objective 7:15 2. Security Terminologies 8:41 3. Security Vulnerabilities 5:09 4. Vulnerability Key Terms 4:44 5. Cyber Attack Process 5:34 6. Adversaries and Threat Actors 4:51 7. APTs 8:00 8. Threat Intel & CERT 5:52 9. Understanding Attack Surface 8:01 10. Understand Malware 11:26 11. DOS & DDOS 9:00 12. In-Path Attacks 9:20 13. Buffer overFlow Attack 5:51 14. Race Condition 7:47 15. Privilege Escalation 6:36 16. Side Channel Attacks 8:14 17. Mobile Threats 6:13 -
Governance of Security
Video Name Time 1. Governance and Management 7:07 2. Security Program 13:43 3. Security Senior Roles 8:40 4. Security and Business Integration 6:15 5. Information Security Governance 7:04 6. Governance Frameworks 11:17 7. GRC 5:02 8. Information Security vs GRC 3:57 9. Security Program Documentation 3:42 -
Security Controls and Acquiring and Investing in controls
Video Name Time 1. Security Controls Overview 11:20 2. Compensating Controls and Control Objective 7:16 3. Layered Defenses & Control References 8:05 4. Control Review and Assessment 5:42 5. SMART Metrics 5:28 6. Understand the Enterprise Architecture 6:09 7. The Process of Acquiring New Controls 5:59 8. Project Management in Security Investments 8:46 9. Business Case and Feasibility Analaysis 4:38 10. Management Buy In to support the Security Investment 4:41 -
Risk Management
Video Name Time 1. Risk Management Overview 10:06 2. Risk Appetite & Tolerance and Capacity 5:30 3. Risk Identification 6:42 4. Digital Risk Protection Solutions 8:24 5. Threat Modeling 6:13 6. Use case & Abuse Case 8:38 7. Risk Analysis 8:46 8. Risk Evaluation and Risk Response 12:36 9. Risk Reporting and Monitoring 9:17 10. Risk Management Frameworks 2:38 11. NIST SP800-30 8:38 12. NIST RMF 5:52 -
Foundational Network Knowledge
Video Name Time 1. Understanding Networks 11:34 2. OSI Model & TCP/IP Model 9:56 3. OSI Layer 1 8:45 4. OSI Layer 2 7:28 5. OSI Layer 3 8:09 6. Network Addressing & ARP 7:37 7. Layer 4-7 Deep Dive 6:30 8. Network Security Best Practices 8:59 -
Secure System Design
Video Name Time 1. Zero Trust 9:27 2. Key Security Design Concepts 7:08 3. Deperimeterization & Security Boundaries [NEW] 12:52 4. Abstraction as a Security Strategy 6:46 5. Trusted Computing Base 5:33 -
Security Controls and Network Foundations
Video Name Time 1. Understand Segmentation & VLANs 9:14 2. Understand NAC & Dot1X 14:02 3. Firewalls 8:28 4. DMZ 7:08 5. IDS & IPS 8:12 6. Network Access Policies and BYOD 6:58 7. Content Filtering 8:58 8. VPN, SSL vpn & IPSEC & Split Tunnel 15:08 9. Internet, Email Security Policies 7:01 10. Securing Network Management Best Practices and Policies 7:24 11. Wireless Security 12:42 12. Wired Security 12:15 13. Converged Networks - VOIP & QOS & POE 6:34 14. ICS & OT 9:55 15. ICS & OT Security 7:50 16. DNS 12:35 17. Sandbox 3:48 18. WAF - Web Application Firewall 5:16 19. Load Balancer 5:19 20. API & API Security 8:02 21. API OWASP 10 Security 18:24 22. FIM 7:07 23. SPAN & RSPAN & Network TAPs 9:51 -
Identity Access Management
Video Name Time 1. Understand the Role of IAM 8:40 2. AAA 13:42 3. Biometric Authentication 8:51 4. SSO & RSO 7:36 5. Key Access Control Concepts 5:12 6. Authorization 7:40 7. Accounting 8:20 8. Log Management 9:40 9. Log Management Best Practices 6:59 10. Password & Authentication Attacks 11:05 11. LDAP 13:38 -
Cloud Security and Securing Shared Computing Infrastructure
Video Name Time 1. Cloud Overview 8:24 2. Cloud deployment Models 5:41 3. Cloud Shared Responsibility Matrix 6:50 4. Cloud Contracts and SLA 8:20 5. Cloud Availability 6:39 6. Cloud Related Threats 8:15 7. Virtualization 4:49 8. Containers 7:31 9. SDN 7:53 10. Storage Solutions 8:52 11. Storage Redundancy Solutions 8:57 12. Backup and Restore 10:40 13. Server, Application Security Policies 6:47 14. Cloud Related Policies 7:27 15. CSA STAR 9:14 16. Secrets Management 6:15 -
Endpoint-Host Security
Video Name Time 1. Endpoint Security Software 12:21 2. Endpoint Security Best Practices 6:24 3. Antimalware Measures 4:32 4. DLP Overview 7:31 5. IRM - Information Right Management 8:07 6. Using IRM Effectively 8:03 7. Asset Management 6:45 8. Patch Management Program 4:48 9. Configuration Management and Baselines 7:10 -
Application Security and Security Testing
Video Name Time 1. What is the Software? 12:02 2. Software Development Lifecycle 7:29 3. OWASP Top 10 for Web Application 9:25 4. CWE - Common Weakness Enumeration 3:32 5. Application Threats in Memory Concurrency and_Resource Management [NEW] 13:45 6. DevOPS 6:31 7. DevSECOPS 7:05 8. Secure Coding Practices 8:39 9. Protecting the Source Code 8:39 10. Application Sandboxing and Runtime Defense Mechanisms [NEW] 12:04 11. Security Requirements Traceability Matrix (SRTM) 8:38 12. Software Release Management 10:33 13. Software Maintenance 6:08 14. Software Testing 9:12 15. Writing Secure Code 8:39 16. Application Security Frameworks Software Assurance and Library Hygiene [NEW] 12:26 17. Data Handling and Context Aware Application Security Controls [NEW] 18:12 18. Penetration Testing Overview 9:59 19. Penetration Testing in Action - Tools and Techniques for Recon/Scanning [NEW] 13:54 20. Penetration Testing In Action - Tools and Techniques for HOST/APP Testing [NEW] 15:44 21. Bug Bounty Programs & Bug Hunting 5:17 -
Policies, Standards and Procedures
Video Name Time 1. Understand the Policy Document 04:40 2. Policy Document Attributes and Review of Policy Document 6:41 3. Standards and Baseline 4:13 4. Procedures and Guidelines 4:18 5. HR Security 11:05 6. HR Policy 5:23 7. Understand Social Engineering Attacks 24:47 8. Security Awareness Training 7:31 9. Auditing and Reviewing Systems 9:23 10. Outsourcing Security Requirements 13:58 11. Supply Chain Risk management 9:42 -
Cryptography
Video Name Time 1. Introduction to Cryptography 8:26 2. Symmetric Encryption 7:39 3. ASymmetric Encryption 7:29 4. Cryptography Key Concepts 6:41 5. PKI 8:03 6. Certificates 5:54 7. Certificate Pinning 5:24 8. SSL & MTLS 4:59 9. Digital Signature 3:50 10. Hashing and Integrity 9:42 11. Cryptographic Applications 5:31 -
Data Security
Video Name Time 1. Data Lifecycle 3:39 2. Data Disposal 4:32 3. Data Classification 12:06 4. Data Governance 6:34 5. Privacy and Data Protection 10:55 6. Privacy Controls and Documentation 10:52 7. Cloud Computing and Data Dispersion 5:05 8. Measures for Data Protection 6:41 9. Data Classification and Protection Policies 8:14 -
Business Continuity & Managing Incidents
Video Name Time 1. Incident Management 9:09 2. Building Incident Response Plan 13:52 3. Digital Forsensics 7:44 4. Business Continuity Planning 11:15 5. RTO & RPO and Recovery Metrics 10:46 6. Recovery Sites 10:54 7. BCP Policy 8:51
Add Comment