CAS-003: CompTIA Advanced Security Practitioner (CASP) CAS-003
Prepare for your CompTIA examination with our training course. The CAS-003 course contains a complete batch of videos that will provide you with profound and thorough knowledge related to CompTIA certification exam. Pass the CompTIA CAS-003 test with flying colors.
Curriculum For This Course
-
1. Course Introduction3m 22s
-
2. Instructor Introduction1m 35s
-
1. Chapter Introdcution2m 15s
-
2. Topic A: Understanding Business and Industry Influences10s
-
3. Ongoing Risk Management1m 17s
-
4. New Products and User Behaviors3m 43s
-
5. Business Models and Strategies3m 25s
-
6. Cloud Technologies4m 47s
-
7. Acquisitions and Mergers3m 8s
-
8. Due Diligence Team1m 5s
-
9. Data Ownership1m 30s
-
10. Data Reclassification1m
-
11. Integrating Diverse Industries5m 1s
-
12. Common Regulations5m 8s
-
13. Geographic Differences2m 25s
-
14. Data Sovereignty53s
-
15. Internal and External Influences5m 32s
-
16. De-perimeterization1m 7s
-
17. Understand Changes in Network Boundaries6m 53s
-
18. Topic B: Policies and Procedures22s
-
19. Understanding Policies and Procedures1m 34s
-
20. Policy Life Cycle1m 28s
-
21. Process Life Cycle1m 30s
-
22. Reviewing Policies and Processes3m 45s
-
23. Common Business Documents4m 44s
-
24. Security for Contracts1m 14s
-
25. Contract Requirements1m 54s
-
26. General Privacy Principles1m 13s
-
27. Standard Security Practices11m 28s
-
28. Demo - Examining Security Policies7m 11s
-
29. Topic C: Risk Mitigation and Control24s
-
30. Introduction to Risk Mitigation1m
-
31. Categorizing Data3m 48s
-
32. Incorporating Stakeholder Input1m 18s
-
33. Aggregate CIA Scores1m 37s
-
34. Selecting and Implementing Controls4m 11s
-
35. Security Control Frameworks51s
-
36. Options for Frameworks4m 40s
-
37. Extreme Scenario Planning2m 41s
-
38. System-Specific Risk Analysis1m 13s
-
39. Qualitative Risk Analysis1m 39s
-
40. Quantitative Risk Analysis1m 6s
-
41. Risk Impact3m 8s
-
42. Likelihood of Threat48s
-
43. Return on Investment1m 52s
-
44. Understanding Payback2m 5s
-
45. Total Cost of Ownership1m 24s
-
46. TCO Guidelines1m 23s
-
47. Translate to Business Terms1m 31s
-
48. Risk Management Strategies2m 9s
-
49. Risk Management Processes1m 6s
-
50. Information and Asset Value and Costs49s
-
51. Vulnerabilities and Threat Identification1m 6s
-
52. Additional Factors1m 34s
-
53. Topic D: Business Continuity Planning21s
-
54. Continuity Planning19s
-
55. BCP Components1m 51s
-
56. BCP Steps2m 38s
-
57. Additional Plans1m 48s
-
58. Conducting Business Impact Analysis4m 57s
-
59. Chapter 01 Review1m 3s
-
1. Chapter Introdcution34s
-
2. Topic A: Physical and Virtual Network Security Devices15s
-
3. Unified Threat Management1m 19s
-
4. Analyzing UTM1m 31s
-
5. Intrusion Detection and Prevention5m 13s
-
6. In-Line Network Encryptor1m 31s
-
7. Network Access Control3m 2s
-
8. SIEM1m 15s
-
9. Firewalls7m 5s
-
10. Firewall Architecture5m 16s
-
11. Wireless Controller1m 49s
-
12. Routers and Switches2m 9s
-
13. Proxy Servers1m 30s
-
14. Topic B: Application and Protocol Level Security29s
-
15. Web Application Firewalls1m 46s
-
16. Hardware Security Modules1m 50s
-
17. Vulnerability Scanners2m 11s
-
18. Topic C: Advanced Network Design31s
-
19. Virtual Private Networks2m 51s
-
20. VPN Protocols1m 58s
-
21. IP Security (IPSec)3m 1s
-
22. IPSec Modes1m 2s
-
23. Demo - Examining IPSec Policies9m 28s
-
24. Secure Sockets Layer (SSL)1m 44s
-
25. Transport Layer Security (TLS1m
-
26. Additional Security Protocols3m 26s
-
27. Authentication Protocols4m 45s
-
28. Topic D: Network Solutions for Data Flow36s
-
29. Data Loss Prevention2m 48s
-
30. Data Flow Enforcement2m
-
31. Network Flow1m 32s
-
32. Topic E: Secure Baselines of Networking and Security Components31s
-
33. Securing Device Configurations25s
-
34. Access Control Lists (ACLs)43s
-
35. ACL Rule Sets2m 4s
-
36. Change Monitoring1m 30s
-
37. Configuration Lockdown51s
-
38. Availability Controls3m 29s
-
39. Disk Availability3m 56s
-
40. Key Availability Terms1m 25s
-
41. Topic F: Advanced Configuration of Network Devices16s
-
42. Additional Configurations49s
-
43. Transport Security1m 44s
-
44. Trunking Security3m 47s
-
45. Port Security2m 20s
-
46. Ports and Sockets3m 37s
-
47. Security Zones1m 29s
-
48. Network Segmentation1m 24s
-
50. NAC Concepts2m 53s
-
51. Network Enabled Devices2m 21s
-
52. Automation Systems1m 23s
-
53. Physical Security2m 17s
-
54. Chapter 02 Review1m 16s
-
1. Chapter Introdcution56s
-
2. Topic A: Understanding Authentication and Authorization Concepts20s
-
3. Authentication4m 42s
-
4. The Importance of Identity7m 43s
-
5. Additional Password Options54s
-
6. Demo - Enforcing Strong Passwords10m 4s
-
7. Biometric Authentication2m 50s
-
8. Biometric Considerations1m 35s
-
9. Beyond Single Factor1m 38s
-
10. Certificate Authentication3m 1s
-
11. Authorization7m 42s
-
12. Open Authorization1m 7s
-
13. XACML1m 55s
-
14. SPML1m 6s
-
15. Authorization Concepts4m 2s
-
16. Trust Models1m 53s
-
17. Topic B: Cryptographic Techniques27s
-
18. Introduction to Cryptography1m 19s
-
19. Cryptographic Techniques51s
-
20. Key Stretching58s
-
21. Hashing3m 14s
-
22. Message Digest (MD) Algorithms1m 36s
-
23. Secure Hash Algorithm (SHA)1m 30s
-
24. Digital Signatures2m
-
25. Message Authentication1m 17s
-
26. Code Signing45s
-
27. Additional Concepts2m 12s
-
28. Protecting Data in Transit2m 2s
-
29. Protecting Data in Memory1m 13s
-
30. Protecting Data at Rest3m 44s
-
31. Symmetric Algorithms4m 8s
-
32. Asymmetric Algorithms3m
-
33. Encryption Methods3m 22s
-
34. Topic C: Cryptographic Implementations27s
-
35. Crypto Options2m 9s
-
36. Additional Crypto Options2m 42s
-
37. Cryptographic Applications1m 5s
-
38. Crypto Considerations1m 27s
-
39. Stream vs1m 47s
-
40. Block Cipher Modes25s
-
41. Public Key Infrastructure5m 41s
-
42. Primary PKI Functions2m 9s
-
43. Additional PKI Concepts1m 42s
-
44. Chapter 03 Review1m 5s
-
1. Chapter Introdcution56s
-
2. Topic A: Security for Host Devices25s
-
3. Trusted OS2m 14s
-
4. Trusted OS Options3m 11s
-
5. Security Software6m 6s
-
6. Additional Host-Based Software Options2m 24s
-
7. Demo - Configuring a Host-Based Firewall7m 42s
-
8. Auditing2m 8s
-
9. Demo - Configuring Audit Policies8m 14s
-
10. Endpoint Detection Response1m
-
11. Host Hardening4m
-
12. Group Policy2m 20s
-
13. Demo - Configuring Group Policy Security4m 44s
-
14. Command Shell Restrictions2m 17s
-
15. Out-of-Band Management2m 11s
-
16. Dedicated Interfaces2m 34s
-
17. External I/O Restrictions1m 54s
-
18. Wireless Technologies5m 3s
-
19. Wi-Fi Components1m 59s
-
20. 802.11 Standards3m 21s
-
21. Wireless Security5m 39s
-
22. Securing Other Host Devices3m 18s
-
23. Boot Security2m 6s
-
24. Additional Boot Security Options4m 30s
-
25. Topic B: Mobile Device Security41s
-
26. Enterprise Mobility Management1m 18s
-
27. MDM Concepts2m 56s
-
28. Management Options3m 32s
-
29. Context Aware Management3m 57s
-
30. Security and Privacy4m 16s
-
31. Physical Security Options1m 27s
-
32. Additional Mobile Device Concepts6m 7s
-
33. Authentication Options2m 22s
-
34. Mobile Devices4m 46s
-
35. Wearable Security Implications1m 38s
-
36. Topic C: Software Security Controls26s
-
37. Application Security Design Considerations3m 3s
-
38. Application Issues6m 30s
-
39. Application Issues conti...8m 18s
-
40. Data Remnants1m 41s
-
41. Securing Applications2m 34s
-
42. Using JSON and REST1m 39s
-
43. Browser Extensions2m 39s
-
44. Application Vulnerabilities1m 57s
-
45. Chapter 04 Review1m 6s
-
1. Chapter Introduction2m 21s
-
2. Topic A: Cloud and Virtualization Technology1m 22s
-
3. Cloud Computing and Virtualization5m 48s
-
4. Cloud Options10m 37s
-
5. Security Considerations4m 35s
-
6. Cloud Service Models7m 39s
-
7. Demo - Examining Cloud Service Models9m 14s
-
8. Security and Virtualization5m 46s
-
9. Cloud-Augmented Security Services7m 25s
-
10. Security as a Service1m 54s
-
11. Virtualization Vulnerabilities3m 40s
-
12. Topic B: Securing Remote Access and Collaboration37s
-
13. Remote Access1m 9s
-
14. Dial-Up Access3m 9s
-
15. Virtual Private Networks1m 49s
-
16. Remote Access Purposes3m 5s
-
18. Unified Collaboration Tools1m 8s
-
19. Web Conferencing4m 43s
-
20. Video Conferencing3m 6s
-
21. Storage and Document Collaboration3m 12s
-
22. Unified Communication1m 44s
-
23. Instant Messaging3m 1s
-
24. Presence3m 13s
-
25. E-Mail11m 55s
-
26. Chapter 05 Review1m 4s
-
1. Chapter Introduction1m 9s
-
2. Topic A: Security Assessments20s
-
3. Importance of Security Assessments40s
-
4. Malware Sandboxing2m 29s
-
5. Memory Dumping1m 36s
-
6. Runtime Debugging1m 25s
-
7. Reconnaissance1m 20s
-
8. Fingerprinting2m 29s
-
9. Code Review2m 47s
-
10. Social Engineering12m 48s
-
11. Public Information11m 15s
-
12. Demo - Accessing Public Information6m 36s
-
13. Penetration Test5m 41s
-
14. Vulnerability Assessment2m 55s
-
15. Assessment Styles4m 30s
-
16. Topic B: Security Assessment Tools34s
-
17. Network Tool Types4m 39s
-
18. Security Content Automation Protocol (SCAP)2m 3s
-
19. Common Vulnerability Scoring System (CVSS)3m 16s
-
20. Fuzzing50s
-
21. Exploit Kits1m 6s
-
22. Host Tools7m 25s
-
23. Additional Host Tools3m 40s
-
24. Physical Security Tools3m 23s
-
25. Topic C: Incident Response and Recovery1m 2s
-
26. E-discovery5m 37s
-
27. Data Breach1m 23s
-
28. Incident Response Process4m 30s
-
29. Chapter 06 Review56s
-
30. Course Closure2m 36s
Hot Exams
Free Test Engine Player
How to open .dumpsarena Files
Use FREE DumpsArena Test Engine player to open .dumpsarena files
Our test engine player will always be free.
Satisfaction Guaranteed
98.4% DumpsArena users pass
Our team is dedicated to delivering top-quality exam practice questions. We proudly offer a hassle-free satisfaction guarantee.
Why choose DumpsArena?
23,812+
Satisfied Customers Since 2018
- Always Up-to-Date
- Accurate and Verified
- Free Regular Updates
- 24/7 Customer Support
- Instant Access to Downloads
Secure Experience
Guaranteed safe checkout.
At DumpsArena, your shopping security is our priority. We utilize high-security SSL encryption, ensuring that every purchase is 100% secure.