CompTIA Advanced Security Practitioner (CASP+) w/Cert Prep
Welcome to CompTIA Advanced Security Practitioner CAS-004. This course provides the knowledge needed to implement security solutions within an enterprise policy framework, using a vendor-neutral format. This includes GRC and vulnerability management programs, applied cryptography, system and network security, identity management, secure development, and incident response. This course maps to the CompTIA CASP+ certification exam. Objective coverage is marked throughout the course. You can download an objective map for the course from http://www.30bird.com.
You will benefit most from this course if you intend to take a CompTIA CASP+ CAS-004 exam.
This course assumes that you have some applied knowledge of computers, TCP/IP networks, and cybersecurity principles. Knowledge equivalent to the CompTIA Security+ or CySA+ certification is helpful but not necessary.
Introduction
- Course setup
Chapter 1: Governance and compliance
- Module A: Security governance
- Module B: Regulatory compliance
- Module C: Standards and frameworks
Chapter 2: Security policies
- Module A: Policy design
- Module B: Controls and procedures
- Module C: Training and coordination
Chapter 3: Risk management
- Module A: Risk assessment
- Module B: Risk management strategies
Chapter 4: Enterprise resilience
- Module A: BCDR planning
- Module B: Resilient architecture
Chapter 5: Threat management
- Module A: Threats and vulnerabilities
- Module B: Threat intelligence sources
- Module C: Applied intelligence
Chapter 6: Cryptographic techniques
- Module A: Cryptographic principles
- Module B: Ciphers and hashes
Chapter 7: Applied cryptography
- Module A: Public key infrastructure
- Module B: Cryptographic protocols
Chapter 8: Authentication and authorization
- Module A: Access control components
- Module B: Authentication technologies
Chapter 9: Network security architecture
- Module A: Network vulnerabilities
- Module B: Network security infrastructure
- Module C: Secure network configuration
Chapter 10: Protecting hosts and data
- Module A: Host security
- Module B: Data security
Chapter 11: Threat detection and response
- Module A: Threat detection systems
- Module B: Network sensors
- Module C: Data analysis
Chapter 12: Specialized system security
- Module A: Mobile device security
- Module B: Operational technologies
Chapter 13: Virtual and cloud infrastructure
- Module A: Virtual and cloud systems
- Module B: Secure cloud infrastructure
Chapter 14: Secure applications
- Module A: Software assurance
- Module B: Application vulnerabilities
Chapter 15: Security assessment and testing
- Module A: Security testing programs
- Module B: Vulnerability assessments
- Module C: Vulnerability and patch management
Chapter 16: Incident response
- Module A: Incident response planning
- Module B: Incident response procedures
- Module C: Digital forensics
Appendix A: Glossary
Index