HRTrainingCenter.com provides Human Resource training on FMLA, COBRA, HIPAA, HRAs (Health Reimbursement Accounts), HSAs (Health Savings Accounts), FLSA, Payroll, Cafeteria Plans, and more through seminars, online training, webcasts, webinars, and audio conferences. Best sellers include FMLA seminars, COBRA seminars, online payroll training, retirement plan training, and HIPAA training.
Course/Product Description
Title:

Advanced Security Practitioner Certification (CASP)

SKU:OT-1003659
Format: Online Training Course
Order:Qty:
Description:

Advanced Security Practitioner Certification (CASP) is designed to provide students with an explanation and understanding of conceptualization of security topics as well as theoretical instruction/demonstrations in designing and engineering security solutions.

This training course prepares students for the CompTIA exam CAS-001. The CompTIA Advanced Security Practitioner (CASP) certification was developed in response to important industry demands such as a need for greater in-depth security knowledge, as well as practical security knowledge.

Benefits

  • Learn how to secure your network systems
  • Learn the concepts related to advanced security practices
  • Learn what authentication is, what the different authentication options are, and how to implement them in an environment
Session 1
  • Section A: Introduction
    • Security
    • Security Careers
    • CASP Certification
    • Knowledge Domains
    • CASP Prerequisites
    • Tools and Principles
  • Section B: Security Principles
    • CIA
    • Confidentiality
    • Integrity
    • Availability
    • AAA
    • Least Privilege
    • Defense in Depth
  • Section C: Security and the Enterprise
    • Security Interpretation
    • Interpreting Terminology
    • Requirements and Goals
    • Providing Guidance
  • Section D: Security Disciplines
    • Disciplines
    • Programmer
    • Database Administrator
    • Network Administrator
    • Management
    • Stakeholders
    • Additional Disciplines
  • Section E: Security and Change
    • Change Management
    • Security Concerns
    • Mergers and Integrations
    • Design Considerations
    • De-Merger Considerations
    • Network Segmentation
    • Merging Third Party Software
  • Section F: Technology Life Cycles
    • The SDLC
    • SDLC Visualized
    • SDLC Simplified
    • SRTM
    • SDLC Management
Session 2
  • Section A: Cryptography Essentials
    • Cryptography Defined
    • Steganography
    • Simple Encryption
    • Cryptography Concepts
    • Uses of Cryptography
    • Types of Encryption
    • Popular Encryption Applications
    • Implementing Encryption
  • Section B: Cryptographic Methods
    • Hashing
    • Digital Signatures
    • Code Signing
    • Non-Repudiation
    • Transport Encryption
  • Section C: Advanced Encryption
    • Entropy
    • Pseudo Random Numbers
    • Perfect Forward Secrecy
    • Confusion and Diffusion
    • Exclusive OR
    • Symmetric Encryption
    • Symmetric Algorithms
  • Section D: Public Key Infrastructure Essentials
    • Asymmetric Encryption
    • Public Key Cryptography
    • Certificates
    • Public Key Infrastructure
    • PKI Applications
  • Section E: Advanced PKI Concepts
    • OCSP and CRL
    • Certificate Issuance
    • Certificate Owners
    • Wildcard Certificates
  • Section F: Implementing a PKI
    • Installing AD CS
    • Configuring the Setup
    • Setup Type
    • CA Type
    • Private Key
    • Certificate Database
    • Request New Certificate
    • Updating Revocation List
    • Update PKI Properties
  • Section G: Encrypting Files/Drives
    • Using EFS
    • FEK
    • Backing Up EFS
    • Recovery Agents
    • BitLocker
Session 3
  • Section A: Authentication Essentials
    • Authentication
    • Weak Authentication Methods
    • Strong Authentication Methods
    • Authentication Credentials
    • Passwords and Human Nature
    • Password Cracking Methods
    • Choosing Secure Passwords
    • Authentication Systems
    • Credential Storage Options
    • Password Cracking Prevention
  • Section B: Advanced Authentication Tools
    • Single Sign-On
    • Federated Authentication
    • SOAP
    • XACML
    • SPML
    • Certificate-Based Authentication
    • Attestation
    • Driver Signing Information
  • Section C: Implementing Authentication
    • VMware Appliances
    • User-Specific Settings
    • Group Policy Settings
    • Account Lockout Settings
  • Section D: Host-Based Security
    • Viruses
    • Worms
    • Types of Viruses
    • Indications of Viral Infection
      Virus Phases
    • Trojans Defined
    • Malware Solutions
    • Host Hardening
    • Additional Host Controls
  • Section E: Storage Solutions
    • Storage Security
    • Secure Storage Management
    • RAID Levels
    • Snapshot
Session 4
  • Section A: Virtualization

    • Virtualization Methods
    • Virtualization Solutions
    • VDI
    • Virtualization Pros and Cons
  • Section B: Implementing Virtualization
    • Virtualization Vulnerabilities
    • Securing Virtual Infrastructures
    • Elastic Clouds
    • VMware Workstation
    • Creating a VM
    • Configuring a VM
  • Section C: VLAN Essentials
    • VLANs
    • VLAN Example
    • VLAN Tagging
    • VLAN Trunk Example
    • VLAN Trunking Protocol
    • VLAN Requirements
    • Network Segmentation
    • Flat Networks
    • Network Segmentation Example
    • Hierarchical Network Model
    • Access Layer Details
    • Distribution Layer Details
    • Core Layer Details
    • Hierarchical Design Example
  • Section D: Implementing VLANs
    • VLANs/Physical Design
    • VLAN Planning
    • Creating a VLAN on a Cisco Switch
  • Section E: Communication/Collaboration
    • VoIP
    • Analog to Digital
    • Sampling
    • Voice into Packets and Back
    • VoIP Implementation
    • VoIP Security
    • Unified Communications Security
    • Mobile Device Security
    • Collaboration Platforms
  • Section F: Securing Remote Communications
    • External Communications
    • Remote Access Solutions
    • Setting up Remote Access
  • Section G: Application Security Essentials
    • Web Applications
    • Web App Implementations
    • Web App Hacking Objectives
    • Anatomy of an Attack
    • Web App Threats
    • Cross-Site Scripting
    • Web App Attack Prevention
    • Specific Application Issues
    • Memory Attacks
Session 5
  • Section A: Application Security Solutions
    • Application Sandboxing
    • Security Framework
    • Fuzzing
    • Web Sessions
    • Web Processing
    • Webshag
  • Section B: Security by Design
    • Secure Design Considerations
    • IPv6
    • IPv6 Addressing
    • SCADA
    • Secure Data Flow
    • Network Design
    • Service Planning
  • Section C: Service Security
    • Secure DNS
    • Secure Directory Services
    • Secure Network Devices
    • Configuring Services
    • Configure Router Security
  • Section D: Security Assessment Methods
    • Vulnerability Assessment
    • Penetration Testing
    • Fingerprinting
    • Code Review
    • Social Engineering
    • Example Attacks
    • Dumpster Diving
    • Shoulder Surfing
    • Eavesdropping
    • Inside and Outside Attacks
    • Reverse Social Engineering
  • Section E: Network Scanning
    • Scanning Tools
    • Angry IP Scanner
    • Nmap/Zenmap
Session 6
  • Section A: Network Analysis
    • Analysis Tools
    • Wireshark
    • Advanced Assessment Tools
  • Section B: Risk Analysis Essentials
    • Risk Analysis Process
    • Discovering Assets
    • Defining Value
    • Determining Risks
    • Calculating Risk Rating
    • Risk Management Plans
    • Threat Analysis
  • Section C: Risk/Business Decisions
    • Risk Management
    • Business Models
    • Visio
    • Risk Influences
    • De-Perimeterization
  • Section D: Risk Mitigation
    • Using CIA
    • CIA-Tracking Worksheet
    • Risk Security Controls
    • System-Specific Analysis
    • Risk Matrix
    • ESA
    • Continuous Monitoring
  • Section E: Risk Assessment Toolkit
    • Risk Assessment
    • Variance Analysis
    • Data Collector Set
  • Section F: Security Incidents
    • Incidents
    • E-Discovery
    • Lansweeper
    • Data Handling
    • Data Breaches
    • System Design
    • Event Logs
  • Section G: Incident Response Planning
    • Contents
    • BIA
    • Business Continuity Teams
    • Disaster Recovery Simulations
    • Backup Types
    • Backup Storage
Session 7
  • Section A: Security Analysis Methods
    • Benchmarking
    • Test/Prototype Solutions
    • Cost/Benefit Analysis
    • Analyze Trend Data
    • Security Effectiveness Review
    • Analyzing Security Solutions
    • After-Action Review
  • Section B: Traffic Analysis
    • FTP Traffic
    • Telnet
    • HTTP
  • Section C: Security Trends
    • Ongoing Research
    • Situational Awareness
    • New Business Tools
    • Information Architecture Industry
    • Contract Security Requirements
  • Section D: Security Policy Essentials
    • Security Policies Defined
    • Password Policy
    • Security Training
    • Security Awareness
    • Security Audits
    • Acceptable Use Policy
    • Legal Compliance
    • Policies/Procedures
    • Privacy Principles
    • Common Documents
  • Section E: Security Policy Types
    • Policy Types
    • Risk Assessment Policy
    • Personal Communication Devices Policy
    • Information Sensitivity Policy
    • Dial-In Access Policy
    • Ethics Policy
  • Section F: BackTrack Example
    • BackTrack
    • Information Gathering
    • Vulnerability Assessment
    • Exploitation Tools
    • Privilege Escalation
    • Maintaining Access

About The Provider: LearnKey, Inc., is a premier global provider of self-paced training solutions for corporate, education, government, and personal users.

LearnKey brings the classroom experience to you - where and when you need it.

For nearly two decades, our mission has been to create flexible expert learning solutions - solutions that work for everyone because they are not only easy to use, but they are extremely engaging and interactive.

Our long-term commitment to the learning industry combined with our record of customer satisfaction and years of experience are the reasons LearnKey is recognized as a reputable global company. At LearnKey, we provide expert learning solutions today for tomorrow's leaders.
Price: $670.00
More Info: Contact Us For More Information
Order:Qty:
Share This: Share on Facebook


Share on Twitter


Share on Google+


How To Write Clear, Concise, And Compliant Job Descriptions
How To Write Clear, Concise, And Compliant Job Descriptions

Garnishments, Child Support Orders and Other Levies
Garnishments, Child Support Orders and Other Levies

Internal Investigations Certificate Program
Internal Investigations Certificate Program

How To Drive HR Strategy
How To Drive HR Strategy

How To Get Your Managers To Cooperate With HR
How To Get Your Managers To Cooperate With HR

Dealing with Difficult People
Dealing with Difficult People

HR′s Guide To Medical Marijuana In The Workplace
HR′s Guide To Medical Marijuana In The Workplace

Personnel Records: What To Keep, What To Toss
Personnel Records: What To Keep, What To Toss

Creative - And Free - Ways To Use LinkedIn As A Recruiting Tool
Creative - And Free - Ways To Use LinkedIn As A Recruiting Tool

Certificate Program For HR Generalists
Certificate Program For HR Generalists

Basics Of OSHA Recordkeeping
Basics Of OSHA Recordkeeping

IRS Rules For Travel Pay
IRS Rules For Travel Pay

IRS Rules For Work Visas
IRS Rules For Work Visas

How to Supervise People Seminar
How to Supervise People Seminar

Certificate Program In FMLA &ADA Compliance
Certificate Program In FMLA &ADA Compliance

The Essentials Of HR Law
The Essentials Of HR Law

Google+HRTrainingCenter.com. 5755 North Point Parkway, Suite 228 | Alpharetta, GA 30022 | 770-410-1219 | support@HRTrainingCenter.com
Copyright HRTrainingCenter.com 2016 | Web Site Development by OTAU
Facebook