->
Oreilly - CompTIA Advanced Security Practitioner (CASP) CAS-003 - 9780134855615
Oreilly - CompTIA Advanced Security Practitioner (CASP) CAS-003
by Michael J. Shannon | Publisher: Pearson IT Certification | Release Date: January 2018 | ISBN: 9780134855615


18+ Hours of Video Instruction More than 18 hours of video instruction to prepare you for the new CASP CAS-003 exam. Overview The CompTIA Advanced Security Practitioner (CASP) CAS-003 Complete Video Course is an engaging, self-paced video training solution that provides learners with 18 hours of personal, visual instruction from expert trainer Michael J. Shannon. Through the use of topic-focused instructional videos, you will gain an in-depth understanding of each objective in the CompTIA CASP CAS-300 exam as well as a deeper understanding of advanced security principles. This title covers every key topic in the exam, including risk management, enterprise security architecture, enterprise security operations, technical integration of enterprise security, research, development, and collaboration. Michael Shannon also includes demos throughout the training so you can see first hand how to approach real-world security problems. This is the perfect training solution to learn all of the advanced security topics that appear on the test and real security knowledge and skills to help you do your work as a security practitioner. Full of live trainer discussions, hands-on demos, lightboard elaborations, and deep-dive discussions, this course covers security in a way that is easy to access and even fun. In addition to covering every objective in the CompTIA CASP CAS-003 exam this title includes a full practice exam, module quizzes so you can test yourself throughout your training, and hands-on performance-based exercises so you have everything you need. About the Instructor Michael J. Shannon began his IT career when he transitioned from recording studio engineer to network technician for a major telecommunications company in the early 1990s. He soon began to focus on security, and was one of the first 10 people to attain the HIPAA Certified Security Specialist. Throughout his 30 years in IT he has worked as an employee, contractor, and consultant for several companies including Platinum Technologies, Fujitsu, IBM, State Farm, MindSharp, and Skillsoft, among others. Mr. Shannon has authored several books, training manuals, published articles, and CBT modules over the years as well. He has attained the CISSP, PCNSE7, CCNP Security, ITIL Intermediate SO and RCV, and Security+ certifications in the security field. Skill Level CompTIA requires that anyone taking the CASP exam have 10 years of experience in IT administration, including at least 5 years of hands-on technical security experience. Learn How To Integrate network and security components, concepts, and architecturesIntegrate security controls for host devicesIntegrate controls for mobile and small form factor devicesSelect software security controlsConduct security assessmentsSelect the proper security assessment toolsImplement incident response and recoveryIntegrate hosts, storage, and applications in the enterpriseIntegrate cloud and virtualization technologies in the enterpriseIntegrate and troubleshoot advanced AAA technologiesImplement cryptographic techniquesSecure communication and collaboration solutionsApply research methods for trend and impact analysisImplement security activities across the technology lifecycleInteract across diverse business units Who Should Take This Course IT security professionals who have a minimum of 10 years of experience in IT administration, including at least 5 years of hands-on technical security experienceSystems/network/application security professionals who are preparing for the CASP examAny IT professional who wants to gain an advanced understanding of how to secure modern enterprises beyond the Security+ or SSCP certifications Course Requirements Recommended prerequisites: CompTIA Network+, Security+, CSA+, or equivalent experience Lesson descriptions Lesson 1, "Business and Industry Influences and Risks," covers risk management of new products, new technologies, and user behaviors as well as risks involved with new or changing business models and strategies. Lesson 2, "Organizational Security Privacy Policies and Procedures," explores advanced organizational security and privacy policies. Lesson 3, "Risk Mitigation Strategies and Controls," delves into advanced decisions based on confidentiality, integrity, and availability along with system-specific risk worst-case scenario analysis. Lesson 4, "Risk Metric Scenarios for Enterprise Security," presents risk metric scenarios for enterprise security. Lesson 5, "Integrating Network and Security Components, Concepts, and Architectures," reviews physical and virtual network and security devices along with application and protocol-aware technologies. Lesson 6, "Integrating Security Controls for Host Devices," reviews trusted operating systems and endpoint security software. Lesson 7, "Integrating Controls for Mobile and Small Form Factor Devices," covers enterprise mobility management, security implications, and privacy concerns of a wide array of mobile and cloud-connected devices, plus a survey of wearable technology. Lesson 8, "Selecting Software Security Controls," examines application security design considerations along with specific application issues. Lesson 9, "Conducting Security Assessments," examines a wide number of security assessments and types, including reconnaissance, fingerprinting, white-black-and-gray box testing as well as red and blue team penetration testing. Lesson 10, "Selecting the Proper Security Assessment Tools," reviews network tool types like various scanners and host tool types, such as file integrity monitoring and log analysis tools along with physical security tools. Lesson 11, "Implementing Incident Response and Recovery," covers e-discovery and data breaches along with facilitating incident detection and response. Lesson 12, "Integrating Hosts, Storage, and Applications in the Enterprise," shows the concepts of adapting data flow security to meet changing business needs and different types of standards. Lesson 13, "Integrating Cloud and Virtualization Technologies in the Enterprise," examines technical deployment models like outsourcing/insourcing/managed services/and partnership. Lesson 14, "Integrating and Troubleshooting Advanced AAA Technologies," covers the topics of authentication and authorization, attestation, identity proofing and propagation, federations, and trust models. Lesson 15, "Implementing Cryptographic Techniques," explores advanced cryptographic techniques such as digital signatures, code signing, and perfect forward secrecy. Lesson 16, "Secure Communication and Collaboration Solutions," covers remote access and unified collaboration tools, unified communication, presence, telephony and VOIP integration, and social media. Lesson 17, "Applying Research Methods for Trend and Impact Analysis," looks at performing ongoing research, threat intelligence investigation, researching security implications of emerging business tools, and global information assurance industry and communities. Lesson 18, "Implementing Security Activities Across the Technology Life Cycle," reviews the systems development life cycle and software development life cycle. Lesson 19, "Interacting Across Diverse Business Units," interprets security requirements and goals to communicate with stakeholders from other disciplines, such as sales staff, HR, and legal. About Pearson Video Training Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Prentice Hall, Sams, and Que Topics include IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
  1. Introduction
    • CASP: Introduction 00:01:23
  2. Module 1: Risk Management
    • Module introduction 00:00:26
  3. Lesson 1: Business and Industry Influences and Risks
    • Learning objectives 00:00:42
    • 1.1 Risk Management of New Initiatives 00:14:28
    • 1.2 Business and Industry Policies 00:11:29
    • 1.3 Internal and External Influences 00:05:41
    • 1.4 Impacts of De-perimiterization 00:03:57
  4. Lesson 2: Organizational Security Privacy Policies and Procedures
    • Learning objectives 00:00:44
    • 2.1 Policy and Process Life Cycle Management 00:04:53
    • 2.2 Partnering with HR, Legal, and the C-Suite 00:06:05
    • 2.3 Common Business Documentation 00:10:50
    • 2.4 Security Requirements for Contracts 00:03:34
    • 2.5 General Principles for Sensitive Information 00:09:42
    • 2.6 Developing Standard Policies and Security Practices 00:18:29
  5. Lesson 3: Risk Mitigation Strategies and Controls
    • Learning objectives 00:00:45
    • 3.1 CIA-based Decisions for the Organization 00:14:59
    • 3.2 System-specific Worst-case Analysis 00:15:24
    • 3.3 Risk Determination 00:17:30
    • 3.4 Translating Risk into Business Terms 00:13:58
    • 3.5 Risk Treatment 00:06:23
    • 3.6 Risk Management Proces: Overview 00:06:30
    • 3.7 Risk Management Process: OCTAVE and ISO/IEC 31000:2009 Methodologies 00:09:10
    • 3.8 Risk Management Process: Key Terminology 00:03:16
    • 3.9 Business Continuity Planning 00:12:54
    • 3.10 IT Governance and Frameworks 00:10:09
    • 3.11 Enterprise Resilience and Continual Improvement 00:08:44
  6. Lesson 4: Risk Metric Scenarios for Enterprise Security
    • Learning objectives 00:00:53
    • 4.1 Reviewing Control Effectiveness 00:17:30
    • 4.2 Reverse Engineering and Deconstruction 00:06:08
    • 4.3 Collecting and Analyzing Metrics 00:09:30
    • 4.4 Prototypes, Benchmarks, and Baselines 00:09:32
    • 4.5 Analyzing Cyber Defense Trends 00:05:01
    • 4.6 Analyzing Solution Metrics for Business Needs 00:13:33
    • 4.7 Analyzing Solution Metrics for Business Needs: Cisco and Palo Alto Solutions 00:05:45
  7. Module 2: Enterprise Security Architecture
    • Module introduction 00:00:30
  8. Lesson 5: Integrating Network and Security Components, Concepts, and Architectures
    • Learning objectives 00:00:56
    • 5.1 Physical and Virtual Network and Security Devices: Switches, Routers, and Firewalls 00:06:15
    • 5.2 Physical and Virtual Network and Security Devices: Zone-based Policy Firewall Demo 00:21:25
    • 5.3 Application and Protocol-aware Technologies: PAN, WAF, DAM, NIDS/NIPS 00:15:47
    • 5.4 Application and Protocol-aware Technologies: WLAN Controllers, UTM, NAP/NAC, SIEM, Load Balancers, HAIPE/INE Devices, HSMs 00:13:35
    • 5.5 Advanced Network Design: Cryptographic Solutions 00:09:40
    • 5.6 Advanced Network Design: Clientless SSL VPN Demo 00:16:13
    • 5.7 Advanced Network Design: Networking Solutions 00:16:05
    • 5.8 Complex Solutions for Data Flow 00:12:15
    • 5.9 Secure Configuration and SDN 00:11:18
    • 5.10 Network Management and Montioring Tools 00:09:22
    • 5.11 Advanced Configuration of Infrastucture Devices: Configuration and Zoning 00:14:22
    • 5.12 Advanced Configuration of Infrastructure Devices: Routing Protocol Security Exercise 00:18:46
    • 5.13 Advanced Configuration of Infrastructure Devices: Network-enabled Service and System Security Concerns 00:08:12
  9. Lesson 6: Integrating Security Controls for Host Devices
    • Learning objectives 00:00:32
    • 6.1 Implementing Trusted O/S 00:11:25
    • 6.2 Endpoint Security Software 00:14:35
    • 6.3 Hardening Hosts: Administrative Controls 00:11:38
    • 6.4 Hardening Hosts: Peripheral Protection 00:10:57
    • 6.5 Boot Loader Protections 00:06:01
    • 6.6 Terminal Services and Application Delivery Services 00:07:27
  10. Lesson 7: Integrating Controls for Mobile and Small Form Factor Devices
    • Learning objectives 00:00:29
    • 7.1 Enterprise Mobility Management: MDM 00:07:24
    • 7.2 Enterprise Mobility Management: MAM 00:12:06
    • 7.3 Mobility Security and Privacy Concerns: Data Storage 00:06:25
    • 7.4 Mobility Security and Privacy Concerns: Peripherals 00:16:18
    • 7.5 Mobility Security and Privacy Concerns: Authentication 00:06:25
    • 7.6 Wearable Technology 00:04:54
  11. Lesson 8: Selecting Software Security Controls
    • Learning objectives 00:00:37
    • 8.1 Application Security Design Considerations 00:01:33
    • 8.2 Specific Application Issues: Attacks and Exploits 00:13:14
    • 8.3 Specific Application Issues: Common Vulnerabilities 00:09:13
    • 8.4 Specific Application Issues: Sandboxing and Firewalls 00:14:02
    • 8.5 Client-side Processing vs. Server-side Processing 00:04:08
    • 8.6 O/S and Firmware Vulnerabilities 00:06:35
  12. Module 3: Enterprise Security Operations
    • Module introduction 00:00:23
  13. Lesson 9: Conducting Security Assessments
    • Learning objectives 00:00:25
    • 9.1 Security Assessment Methods: Strategies 00:12:15
    • 9.2 Security Assessment Methods: Techniques 00:10:43
    • 9.3 Security Assessment Types: Testing and Assessment 00:09:24
    • 9.4 Security Assessment Types: Exercises 00:07:17
  14. Lesson 10: Selecting the Proper Security Assessment Tools
    • Learning objectives 00:00:26
    • 10.1 Scanners 00:05:43
    • 10.2 Additional Security Assessment Tools: Overview 00:11:12
    • 10.3 Additional Security Assessment Tools: Creating a Phishing Campaign 00:06:51
    • 10.4 Types of Host Tools: Scanners and Crackers 00:09:35
    • 10.5 Types of Host Tools: Monitoring and Analysis 00:05:32
    • 10.6 Physical Security Tools 00:04:27
  15. Lesson 11: Implementing Incident Response and Recovery
    • Learning objectives 00:00:31
    • 11.1 E-discovery 00:05:37
    • 11.2 Data Breach Procedures 00:10:59
    • 11.3 Facilitating Incident Detection and Response 00:08:22
    • 11.4 Incident and Emergency Response 00:11:41
    • 11.5 Business Continuity and Disaster Recovery 00:08:03
    • 11.6 Incident Response Support Tools 00:15:11
    • 11.7 Incident or Breach Severity 00:09:07
    • 11.8 Post-incident Response 00:02:29
  16. Module 4: Technical Integration of Enterprise Security
    • Module introduction 00:00:34
  17. Lesson 12: Integrating Hosts, Storage, and Applications in the Enterprise
    • Learning objectives 00:00:51
    • 12.1 Adapting Data Flow Security 00:13:17
    • 12.2 Data Flow Security Standards 00:06:06
    • 12.3 Interoperability Issues 00:03:25
    • 12.4 Resilience Issues 00:06:18
    • 12.5 Data Security Considerations 00:04:06
    • 12.6 Resource Provisioning and De-provisioning 00:08:20
    • 12.7 Merger and Acquisition Design Considerations 00:04:16
    • 12.8 Logical Network Segmentation and Diagramming 00:07:57
    • 12.9 Security Issues with Enterprise Application Integration 00:07:45
  18. Lesson 13: Integrating Cloud and Virtualization Technologies in the Enterprise
    • Learning objectives 00:00:40
    • 13.1 Technical Deployment Models: Cloud/Virtualization Considerations and Hosting Options 00:12:13
    • 13.2 Technical Deployment Models: Cloud Service Models 00:17:15
    • 13.3 Pros and Cons of Virtualization 00:13:17
    • 13.4 Cloud Augmented Security Services 00:10:16
    • 13.5 Host Comingling Vulnerabilities 00:06:57
    • 13.6 Data Security Considerations 00:04:06
  19. Lesson 14: Integrating and Troubleshooting Advanced AAA Technologies
    • Learning objectives 00:00:25
    • 14.1 Authentication 00:10:13
    • 14.2 Authorization 00:06:29
    • 14.3 Attestation, Proofing, and Propagation 00:04:27
    • 14.4 Federation Services 00:04:57
    • 14.5 Trust Models 00:15:32
  20. Lesson 15: Implementing Cryptographic Techniques
    • Learning objectives 00:00:33
    • 15.1 Cryptographic Techniques: Hashing and Signing 00:17:57
    • 15.2 Cryptographic Techniques: Data Protection 00:12:13
    • 15.3 Cryptographic Techniques: Encryption in Action 00:10:16
    • 15.4 Implementing Cryptography: SSH and SSL/TLS 00:10:54
    • 15.5 Implementing Cryptography: Application and Implementation 00:10:38
    • 15.6 Implementing Crytography: Certificate Services 00:11:09
  21. Lesson 16: Secure Communication and Collaboration Solutions
    • Learning objectives 00:00:30
    • 16.1 Remote Access 00:12:40
    • 16.2 Unified Collaboration Tools 00:06:24
  22. Module 5 Research, Development and Collaboration
    • Module introduction 00:00:29
  23. Lesson 17: Applying Research Methods for Trend and Impact Analysis
    • Learning objectives 00:00:30
    • 17.1 Ongoing Research and Threat Intelligence 00:08:37
    • 17.2 Emerging Tools and Global IA 00:06:06
  24. Lesson 18: Implementing Security Activities Across the Technology Life Cycle
    • Learning objectives 00:00:35
    • 18.1 Systems Development Life Cycle 00:03:40
    • 18.2 Software Development Life Cycle: Frameworks and Code Security 00:05:39
    • 18.3 Software Development Life Cycle: Testing and Documentation 00:04:33
    • 18.4 Adapting Solutions for Emerging Disruptive Trends 00:07:13
    • 18.5 Asset Management and Inventory Control 00:03:18
  25. Lesson 19: Interacting Across Diverse Business Units
    • Learning objectives 00:00:44
    • 19.1 Interpreting Data from Other Disciplines 00:09:10
    • 19.2 Forming Guidance, Collaboration, and Other Committees 00:06:45
  26. Summary
    • CASP: Summary 00:01:05
  27. Oreilly - CompTIA Advanced Security Practitioner (CASP) CAS-003

    9780134855615.CompTIA.Advanced.Security.Practitioner.CASP.CAS003.part1.OR.rar

    9780134855615.CompTIA.Advanced.Security.Practitioner.CASP.CAS003.part2.OR.rar

    9780134855615.CompTIA.Advanced.Security.Practitioner.CASP.CAS003.part3.OR.rar

    9780134855615.CompTIA.Advanced.Security.Practitioner.CASP.CAS003.part4.OR.rar

    9780134855615.CompTIA.Advanced.Security.Practitioner.CASP.CAS003.part5.OR.rar

    9780134855615.CompTIA.Advanced.Security.Practitioner.CASP.CAS003.part6.OR.rar


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Coktum   |  

Information
Members of Guests cannot leave comments.




rss