search
search
Details

Advanced Security Practitioner Certification (CASP)

Online Course, ID #1003659
About This Course:
Advanced Security Practitioner Certification (CASP) is designed to provide students with an explanation and understanding of conceptualization of security topics as well as theoretical instruction/demonstrations in designing and engineering security solutions.

This training course prepares students for the CompTIA exam CAS-001. The CompTIA Advanced Security Practitioner (CASP) certification was developed in response to important industry demands such as a need for greater in-depth security knowledge, as well as practical security knowledge.

Benefits
  • Learn how to secure your network systems
  • Learn the concepts related to advanced security practices
  • Learn what authentication is, what the different authentication options are, and how to implement them in an environment
Session 1
  • Section A: Introduction
    • Security
    • Security Careers
    • CASP Certification
    • Knowledge Domains
    • CASP Prerequisites
    • Tools and Principles
  • Section B: Security Principles
    • CIA
    • Confidentiality
    • Integrity
    • Availability
    • AAA
    • Least Privilege
    • Defense in Depth
  • Section C: Security and the Enterprise
    • Security Interpretation
    • Interpreting Terminology
    • Requirements and Goals
    • Providing Guidance
  • Section D: Security Disciplines
    • Disciplines
    • Programmer
    • Database Administrator
    • Network Administrator
    • Management
    • Stakeholders
    • Additional Disciplines
  • Section E: Security and Change
    • Change Management
    • Security Concerns
    • Mergers and Integrations
    • Design Considerations
    • De-Merger Considerations
    • Network Segmentation
    • Merging Third Party Software
  • Section F: Technology Life Cycles
    • The SDLC
    • SDLC Visualized
    • SDLC Simplified
    • SRTM
    • SDLC Management
Session 2
  • Section A: Cryptography Essentials
    • Cryptography Defined
    • Steganography
    • Simple Encryption
    • Cryptography Concepts
    • Uses of Cryptography
    • Types of Encryption
    • Popular Encryption Applications
    • Implementing Encryption
  • Section B: Cryptographic Methods
    • Hashing
    • Digital Signatures
    • Code Signing
    • Non-Repudiation
    • Transport Encryption
  • Section C: Advanced Encryption
    • Entropy
    • Pseudo Random Numbers
    • Perfect Forward Secrecy
    • Confusion and Diffusion
    • Exclusive OR
    • Symmetric Encryption
    • Symmetric Algorithms
  • Section D: Public Key Infrastructure Essentials
    • Asymmetric Encryption
    • Public Key Cryptography
    • Certificates
    • Public Key Infrastructure
    • PKI Applications
  • Section E: Advanced PKI Concepts
    • OCSP and CRL
    • Certificate Issuance
    • Certificate Owners
    • Wildcard Certificates
  • Section F: Implementing a PKI
    • Installing AD CS
    • Configuring the Setup
    • Setup Type
    • CA Type
    • Private Key
    • Certificate Database
    • Request New Certificate
    • Updating Revocation List
    • Update PKI Properties
  • Section G: Encrypting Files/Drives
    • Using EFS
    • FEK
    • Backing Up EFS
    • Recovery Agents
    • BitLocker
Session 3
  • Section A: Authentication Essentials
    • Authentication
    • Weak Authentication Methods
    • Strong Authentication Methods
    • Authentication Credentials
    • Passwords and Human Nature
    • Password Cracking Methods
    • Choosing Secure Passwords
    • Authentication Systems
    • Credential Storage Options
    • Password Cracking Prevention
  • Section B: Advanced Authentication Tools
    • Single Sign-On
    • Federated Authentication
    • SOAP
    • XACML
    • SPML
    • Certificate-Based Authentication
    • Attestation
    • Driver Signing Information
  • Section C: Implementing Authentication
    • VMware Appliances
    • User-Specific Settings
    • Group Policy Settings
    • Account Lockout Settings
  • Section D: Host-Based Security
    • Viruses
    • Worms
    • Types of Viruses
    • Indications of Viral Infection
      Virus Phases
    • Trojans Defined
    • Malware Solutions
    • Host Hardening
    • Additional Host Controls
  • Section E: Storage Solutions
    • Storage Security
    • Secure Storage Management
    • RAID Levels
    • Snapshot
Session 4
  • Section A: Virtualization

    • Virtualization Methods
    • Virtualization Solutions
    • VDI
    • Virtualization Pros and Cons
  • Section B: Implementing Virtualization
    • Virtualization Vulnerabilities
    • Securing Virtual Infrastructures
    • Elastic Clouds
    • VMware Workstation
    • Creating a VM
    • Configuring a VM
  • Section C: VLAN Essentials
    • VLANs
    • VLAN Example
    • VLAN Tagging
    • VLAN Trunk Example
    • VLAN Trunking Protocol
    • VLAN Requirements
    • Network Segmentation
    • Flat Networks
    • Network Segmentation Example
    • Hierarchical Network Model
    • Access Layer Details
    • Distribution Layer Details
    • Core Layer Details
    • Hierarchical Design Example
  • Section D: Implementing VLANs
    • VLANs/Physical Design
    • VLAN Planning
    • Creating a VLAN on a Cisco Switch
  • Section E: Communication/Collaboration
    • VoIP
    • Analog to Digital
    • Sampling
    • Voice into Packets and Back
    • VoIP Implementation
    • VoIP Security
    • Unified Communications Security
    • Mobile Device Security
    • Collaboration Platforms
  • Section F: Securing Remote Communications
    • External Communications
    • Remote Access Solutions
    • Setting up Remote Access
  • Section G: Application Security Essentials
    • Web Applications
    • Web App Implementations
    • Web App Hacking Objectives
    • Anatomy of an Attack
    • Web App Threats
    • Cross-Site Scripting
    • Web App Attack Prevention
    • Specific Application Issues
    • Memory Attacks
Session 5
  • Section A: Application Security Solutions
    • Application Sandboxing
    • Security Framework
    • Fuzzing
    • Web Sessions
    • Web Processing
    • Webshag
  • Section B: Security by Design
    • Secure Design Considerations
    • IPv6
    • IPv6 Addressing
    • SCADA
    • Secure Data Flow
    • Network Design
    • Service Planning
  • Section C: Service Security
    • Secure DNS
    • Secure Directory Services
    • Secure Network Devices
    • Configuring Services
    • Configure Router Security
  • Section D: Security Assessment Methods
    • Vulnerability Assessment
    • Penetration Testing
    • Fingerprinting
    • Code Review
    • Social Engineering
    • Example Attacks
    • Dumpster Diving
    • Shoulder Surfing
    • Eavesdropping
    • Inside and Outside Attacks
    • Reverse Social Engineering
  • Section E: Network Scanning
    • Scanning Tools
    • Angry IP Scanner
    • Nmap/Zenmap
Session 6
  • Section A: Network Analysis
    • Analysis Tools
    • Wireshark
    • Advanced Assessment Tools
  • Section B: Risk Analysis Essentials
    • Risk Analysis Process
    • Discovering Assets
    • Defining Value
    • Determining Risks
    • Calculating Risk Rating
    • Risk Management Plans
    • Threat Analysis
  • Section C: Risk/Business Decisions
    • Risk Management
    • Business Models
    • Visio
    • Risk Influences
    • De-Perimeterization
  • Section D: Risk Mitigation
    • Using CIA
    • CIA-Tracking Worksheet
    • Risk Security Controls
    • System-Specific Analysis
    • Risk Matrix
    • ESA
    • Continuous Monitoring
  • Section E: Risk Assessment Toolkit
    • Risk Assessment
    • Variance Analysis
    • Data Collector Set
  • Section F: Security Incidents
    • Incidents
    • E-Discovery
    • Lansweeper
    • Data Handling
    • Data Breaches
    • System Design
    • Event Logs
  • Section G: Incident Response Planning
    • Contents
    • BIA
    • Business Continuity Teams
    • Disaster Recovery Simulations
    • Backup Types
    • Backup Storage
Session 7
  • Section A: Security Analysis Methods
    • Benchmarking
    • Test/Prototype Solutions
    • Cost/Benefit Analysis
    • Analyze Trend Data
    • Security Effectiveness Review
    • Analyzing Security Solutions
    • After-Action Review
  • Section B: Traffic Analysis
    • FTP Traffic
    • Telnet
    • HTTP
  • Section C: Security Trends
    • Ongoing Research
    • Situational Awareness
    • New Business Tools
    • Information Architecture Industry
    • Contract Security Requirements
  • Section D: Security Policy Essentials
    • Security Policies Defined
    • Password Policy
    • Security Training
    • Security Awareness
    • Security Audits
    • Acceptable Use Policy
    • Legal Compliance
    • Policies/Procedures
    • Privacy Principles
    • Common Documents
  • Section E: Security Policy Types
    • Policy Types
    • Risk Assessment Policy
    • Personal Communication Devices Policy
    • Information Sensitivity Policy
    • Dial-In Access Policy
    • Ethics Policy
  • Section F: BackTrack Example
    • BackTrack
    • Information Gathering
    • Vulnerability Assessment
    • Exploitation Tools
    • Privilege Escalation
    • Maintaining Access
Info on how to access this course will be sent to you by the Course Provider via email.
Order:
Advanced Security Practitioner Certification (CASP)
Price: $670.00
Qty:
Details
About Us Privacy Guarantee Affiliate List Your Courses Contact Us My Account
Google+ FacebookHRTrainingCenter.com. 5755 North Point Parkway, Suite 227 | Alpharetta, GA 30022 | 770-410-1219 | support@HRTrainingCenter.com
Copyright HRTrainingCenter.com 2018 | Web Site Development by OTAU