CAS-003: CompTIA Advanced Security Practitioner (CASP) CAS-003

CAS-003: CompTIA Advanced Security Practitioner (CASP) CAS-003

BEST SELLER 258 Lectures 11h 56m 6s

Prepare for your CompTIA examination with our training course. The CAS-003 course contains a complete batch of videos that will provide you with profound and thorough knowledge related to CompTIA certification exam. Pass the CompTIA CAS-003 test with flying colors.

$24.99 $32.49

Curriculum For This Course

2 lectures 4m 57s
  • 1. Course Introduction
    3m 22s
  • 2. Instructor Introduction
    1m 35s

59 lectures 2h 22m 2s
  • 1. Chapter Introdcution
    2m 15s
  • 2. Topic A: Understanding Business and Industry Influences
    10s
  • 3. Ongoing Risk Management
    1m 17s
  • 4. New Products and User Behaviors
    3m 43s
  • 5. Business Models and Strategies
    3m 25s
  • 6. Cloud Technologies
    4m 47s
  • 7. Acquisitions and Mergers
    3m 8s
  • 8. Due Diligence Team
    1m 5s
  • 9. Data Ownership
    1m 30s
  • 10. Data Reclassification
    1m
  • 11. Integrating Diverse Industries
    5m 1s
  • 12. Common Regulations
    5m 8s
  • 13. Geographic Differences
    2m 25s
  • 14. Data Sovereignty
    53s
  • 15. Internal and External Influences
    5m 32s
  • 16. De-perimeterization
    1m 7s
  • 17. Understand Changes in Network Boundaries
    6m 53s
  • 18. Topic B: Policies and Procedures
    22s
  • 19. Understanding Policies and Procedures
    1m 34s
  • 20. Policy Life Cycle
    1m 28s
  • 21. Process Life Cycle
    1m 30s
  • 22. Reviewing Policies and Processes
    3m 45s
  • 23. Common Business Documents
    4m 44s
  • 24. Security for Contracts
    1m 14s
  • 25. Contract Requirements
    1m 54s
  • 26. General Privacy Principles
    1m 13s
  • 27. Standard Security Practices
    11m 28s
  • 28. Demo - Examining Security Policies
    7m 11s
  • 29. Topic C: Risk Mitigation and Control
    24s
  • 30. Introduction to Risk Mitigation
    1m
  • 31. Categorizing Data
    3m 48s
  • 32. Incorporating Stakeholder Input
    1m 18s
  • 33. Aggregate CIA Scores
    1m 37s
  • 34. Selecting and Implementing Controls
    4m 11s
  • 35. Security Control Frameworks
    51s
  • 36. Options for Frameworks
    4m 40s
  • 37. Extreme Scenario Planning
    2m 41s
  • 38. System-Specific Risk Analysis
    1m 13s
  • 39. Qualitative Risk Analysis
    1m 39s
  • 40. Quantitative Risk Analysis
    1m 6s
  • 41. Risk Impact
    3m 8s
  • 42. Likelihood of Threat
    48s
  • 43. Return on Investment
    1m 52s
  • 44. Understanding Payback
    2m 5s
  • 45. Total Cost of Ownership
    1m 24s
  • 46. TCO Guidelines
    1m 23s
  • 47. Translate to Business Terms
    1m 31s
  • 48. Risk Management Strategies
    2m 9s
  • 49. Risk Management Processes
    1m 6s
  • 50. Information and Asset Value and Costs
    49s
  • 51. Vulnerabilities and Threat Identification
    1m 6s
  • 52. Additional Factors
    1m 34s
  • 53. Topic D: Business Continuity Planning
    21s
  • 54. Continuity Planning
    19s
  • 55. BCP Components
    1m 51s
  • 56. BCP Steps
    2m 38s
  • 57. Additional Plans
    1m 48s
  • 58. Conducting Business Impact Analysis
    4m 57s
  • 59. Chapter 01 Review
    1m 3s

53 lectures 1h 55m 57s
  • 1. Chapter Introdcution
    34s
  • 2. Topic A: Physical and Virtual Network Security Devices
    15s
  • 3. Unified Threat Management
    1m 19s
  • 4. Analyzing UTM
    1m 31s
  • 5. Intrusion Detection and Prevention
    5m 13s
  • 6. In-Line Network Encryptor
    1m 31s
  • 7. Network Access Control
    3m 2s
  • 8. SIEM
    1m 15s
  • 9. Firewalls
    7m 5s
  • 10. Firewall Architecture
    5m 16s
  • 11. Wireless Controller
    1m 49s
  • 12. Routers and Switches
    2m 9s
  • 13. Proxy Servers
    1m 30s
  • 14. Topic B: Application and Protocol Level Security
    29s
  • 15. Web Application Firewalls
    1m 46s
  • 16. Hardware Security Modules
    1m 50s
  • 17. Vulnerability Scanners
    2m 11s
  • 18. Topic C: Advanced Network Design
    31s
  • 19. Virtual Private Networks
    2m 51s
  • 20. VPN Protocols
    1m 58s
  • 21. IP Security (IPSec)
    3m 1s
  • 22. IPSec Modes
    1m 2s
  • 23. Demo - Examining IPSec Policies
    9m 28s
  • 24. Secure Sockets Layer (SSL)
    1m 44s
  • 25. Transport Layer Security (TLS
    1m
  • 26. Additional Security Protocols
    3m 26s
  • 27. Authentication Protocols
    4m 45s
  • 28. Topic D: Network Solutions for Data Flow
    36s
  • 29. Data Loss Prevention
    2m 48s
  • 30. Data Flow Enforcement
    2m
  • 31. Network Flow
    1m 32s
  • 32. Topic E: Secure Baselines of Networking and Security Components
    31s
  • 33. Securing Device Configurations
    25s
  • 34. Access Control Lists (ACLs)
    43s
  • 35. ACL Rule Sets
    2m 4s
  • 36. Change Monitoring
    1m 30s
  • 37. Configuration Lockdown
    51s
  • 38. Availability Controls
    3m 29s
  • 39. Disk Availability
    3m 56s
  • 40. Key Availability Terms
    1m 25s
  • 41. Topic F: Advanced Configuration of Network Devices
    16s
  • 42. Additional Configurations
    49s
  • 43. Transport Security
    1m 44s
  • 44. Trunking Security
    3m 47s
  • 45. Port Security
    2m 20s
  • 46. Ports and Sockets
    3m 37s
  • 47. Security Zones
    1m 29s
  • 48. Network Segmentation
    1m 24s
  • 50. NAC Concepts
    2m 53s
  • 51. Network Enabled Devices
    2m 21s
  • 52. Automation Systems
    1m 23s
  • 53. Physical Security
    2m 17s
  • 54. Chapter 02 Review
    1m 16s

44 lectures 1h 45m 45s
  • 1. Chapter Introdcution
    56s
  • 2. Topic A: Understanding Authentication and Authorization Concepts
    20s
  • 3. Authentication
    4m 42s
  • 4. The Importance of Identity
    7m 43s
  • 5. Additional Password Options
    54s
  • 6. Demo - Enforcing Strong Passwords
    10m 4s
  • 7. Biometric Authentication
    2m 50s
  • 8. Biometric Considerations
    1m 35s
  • 9. Beyond Single Factor
    1m 38s
  • 10. Certificate Authentication
    3m 1s
  • 11. Authorization
    7m 42s
  • 12. Open Authorization
    1m 7s
  • 13. XACML
    1m 55s
  • 14. SPML
    1m 6s
  • 15. Authorization Concepts
    4m 2s
  • 16. Trust Models
    1m 53s
  • 17. Topic B: Cryptographic Techniques
    27s
  • 18. Introduction to Cryptography
    1m 19s
  • 19. Cryptographic Techniques
    51s
  • 20. Key Stretching
    58s
  • 21. Hashing
    3m 14s
  • 22. Message Digest (MD) Algorithms
    1m 36s
  • 23. Secure Hash Algorithm (SHA)
    1m 30s
  • 24. Digital Signatures
    2m
  • 25. Message Authentication
    1m 17s
  • 26. Code Signing
    45s
  • 27. Additional Concepts
    2m 12s
  • 28. Protecting Data in Transit
    2m 2s
  • 29. Protecting Data in Memory
    1m 13s
  • 30. Protecting Data at Rest
    3m 44s
  • 31. Symmetric Algorithms
    4m 8s
  • 32. Asymmetric Algorithms
    3m
  • 33. Encryption Methods
    3m 22s
  • 34. Topic C: Cryptographic Implementations
    27s
  • 35. Crypto Options
    2m 9s
  • 36. Additional Crypto Options
    2m 42s
  • 37. Cryptographic Applications
    1m 5s
  • 38. Crypto Considerations
    1m 27s
  • 39. Stream vs
    1m 47s
  • 40. Block Cipher Modes
    25s
  • 41. Public Key Infrastructure
    5m 41s
  • 42. Primary PKI Functions
    2m 9s
  • 43. Additional PKI Concepts
    1m 42s
  • 44. Chapter 03 Review
    1m 5s

45 lectures 2h 23m 9s
  • 1. Chapter Introdcution
    56s
  • 2. Topic A: Security for Host Devices
    25s
  • 3. Trusted OS
    2m 14s
  • 4. Trusted OS Options
    3m 11s
  • 5. Security Software
    6m 6s
  • 6. Additional Host-Based Software Options
    2m 24s
  • 7. Demo - Configuring a Host-Based Firewall
    7m 42s
  • 8. Auditing
    2m 8s
  • 9. Demo - Configuring Audit Policies
    8m 14s
  • 10. Endpoint Detection Response
    1m
  • 11. Host Hardening
    4m
  • 12. Group Policy
    2m 20s
  • 13. Demo - Configuring Group Policy Security
    4m 44s
  • 14. Command Shell Restrictions
    2m 17s
  • 15. Out-of-Band Management
    2m 11s
  • 16. Dedicated Interfaces
    2m 34s
  • 17. External I/O Restrictions
    1m 54s
  • 18. Wireless Technologies
    5m 3s
  • 19. Wi-Fi Components
    1m 59s
  • 20. 802.11 Standards
    3m 21s
  • 21. Wireless Security
    5m 39s
  • 22. Securing Other Host Devices
    3m 18s
  • 23. Boot Security
    2m 6s
  • 24. Additional Boot Security Options
    4m 30s
  • 25. Topic B: Mobile Device Security
    41s
  • 26. Enterprise Mobility Management
    1m 18s
  • 27. MDM Concepts
    2m 56s
  • 28. Management Options
    3m 32s
  • 29. Context Aware Management
    3m 57s
  • 30. Security and Privacy
    4m 16s
  • 31. Physical Security Options
    1m 27s
  • 32. Additional Mobile Device Concepts
    6m 7s
  • 33. Authentication Options
    2m 22s
  • 34. Mobile Devices
    4m 46s
  • 35. Wearable Security Implications
    1m 38s
  • 36. Topic C: Software Security Controls
    26s
  • 37. Application Security Design Considerations
    3m 3s
  • 38. Application Issues
    6m 30s
  • 39. Application Issues conti...
    8m 18s
  • 40. Data Remnants
    1m 41s
  • 41. Securing Applications
    2m 34s
  • 42. Using JSON and REST
    1m 39s
  • 43. Browser Extensions
    2m 39s
  • 44. Application Vulnerabilities
    1m 57s
  • 45. Chapter 04 Review
    1m 6s

25 lectures 1h 43m 16s
  • 1. Chapter Introduction
    2m 21s
  • 2. Topic A: Cloud and Virtualization Technology
    1m 22s
  • 3. Cloud Computing and Virtualization
    5m 48s
  • 4. Cloud Options
    10m 37s
  • 5. Security Considerations
    4m 35s
  • 6. Cloud Service Models
    7m 39s
  • 7. Demo - Examining Cloud Service Models
    9m 14s
  • 8. Security and Virtualization
    5m 46s
  • 9. Cloud-Augmented Security Services
    7m 25s
  • 10. Security as a Service
    1m 54s
  • 11. Virtualization Vulnerabilities
    3m 40s
  • 12. Topic B: Securing Remote Access and Collaboration
    37s
  • 13. Remote Access
    1m 9s
  • 14. Dial-Up Access
    3m 9s
  • 15. Virtual Private Networks
    1m 49s
  • 16. Remote Access Purposes
    3m 5s
  • 18. Unified Collaboration Tools
    1m 8s
  • 19. Web Conferencing
    4m 43s
  • 20. Video Conferencing
    3m 6s
  • 21. Storage and Document Collaboration
    3m 12s
  • 22. Unified Communication
    1m 44s
  • 23. Instant Messaging
    3m 1s
  • 24. Presence
    3m 13s
  • 25. E-Mail
    11m 55s
  • 26. Chapter 05 Review
    1m 4s

30 lectures 1h 41m
  • 1. Chapter Introduction
    1m 9s
  • 2. Topic A: Security Assessments
    20s
  • 3. Importance of Security Assessments
    40s
  • 4. Malware Sandboxing
    2m 29s
  • 5. Memory Dumping
    1m 36s
  • 6. Runtime Debugging
    1m 25s
  • 7. Reconnaissance
    1m 20s
  • 8. Fingerprinting
    2m 29s
  • 9. Code Review
    2m 47s
  • 10. Social Engineering
    12m 48s
  • 11. Public Information
    11m 15s
  • 12. Demo - Accessing Public Information
    6m 36s
  • 13. Penetration Test
    5m 41s
  • 14. Vulnerability Assessment
    2m 55s
  • 15. Assessment Styles
    4m 30s
  • 16. Topic B: Security Assessment Tools
    34s
  • 17. Network Tool Types
    4m 39s
  • 18. Security Content Automation Protocol (SCAP)
    2m 3s
  • 19. Common Vulnerability Scoring System (CVSS)
    3m 16s
  • 20. Fuzzing
    50s
  • 21. Exploit Kits
    1m 6s
  • 22. Host Tools
    7m 25s
  • 23. Additional Host Tools
    3m 40s
  • 24. Physical Security Tools
    3m 23s
  • 25. Topic C: Incident Response and Recovery
    1m 2s
  • 26. E-discovery
    5m 37s
  • 27. Data Breach
    1m 23s
  • 28. Incident Response Process
    4m 30s
  • 29. Chapter 06 Review
    56s
  • 30. Course Closure
    2m 36s

Free Test Engine Player

How to open .dumpsarena Files

Use FREE DumpsArena Test Engine player to open .dumpsarena files

Our test engine player will always be free.

DumpsArena Test Engine

Windows
Satisfaction Guaranteed

98.4% DumpsArena users pass

Our team is dedicated to delivering top-quality exam practice questions. We proudly offer a hassle-free satisfaction guarantee.

Why choose DumpsArena?

23,812+

Satisfied Customers Since 2018

  • Always Up-to-Date
  • Accurate and Verified
  • Free Regular Updates
  • 24/7 Customer Support
  • Instant Access to Downloads
Secure Experience

Guaranteed safe checkout.

At DumpsArena, your shopping security is our priority. We utilize high-security SSL encryption, ensuring that every purchase is 100% secure.

SECURED CHECKOUT
Need Help?

Feel free to contact us anytime!

Contact Support