CompTIA Advanced Security Practitioner (CASP)
4.3 (40 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
479 students enrolled
Wishlisted Wishlist

Please confirm that you want to add CompTIA Advanced Security Practitioner (CASP) to your Wishlist.

Add to Wishlist

CompTIA Advanced Security Practitioner (CASP)

Gain the CyberSecurity Skills
4.3 (40 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
479 students enrolled
Last updated 12/2016
English
Current price: $12 Original price: $200 Discount: 94% off
3 days left at this price!
30-Day Money-Back Guarantee
Includes:
  • 8 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion

Training 5 or more people?

Get your team access to Udemy's top 2,000 courses anytime, anywhere.

Try Udemy for Business
What Will I Learn?
  • This course will prepare you to pass the exam CompTIA Advanced Security Practitioner (CASP)
  • The CompTIA Advanced Security Practitioner certification is an international, vendor-neutral exam that proves competency in enterprise security; risk management; research and analysis; and integration of computing, communications, and business disciplines.
  • The exam covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers.
View Curriculum
Requirements
  • Ten years of IT administration experience, including at least five years of hands-on technical security experience
  • CompTIA Security + Certification or equivalent experience
Description

CompTIA's CASP - CompTIA Advanced Security Practitioner , is a vendor-neutral certification that validates IT professionals with advanced-level security skills and knowledge. This certification course covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers, while managing risk.

There is no required prerequisite for this course however, the CASP certification is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus at the enterprise level.

This CASP training course follows the CompTIA authorized objectives, ensuring you receive the training and knowledge needed to succeed.

Who is the target audience?
  • An IT security professional who has a minimum of 10 years experience in IT administration including at least 5 years of hands-on technical security experience.
  • IT professionals aiming to move into a specialist security position such as a risk manager or analyst, security architect, or penetration tester/ethical Hacker.
  • Cyber Security / IS Professional,Information Security Analyst,Security Architect,IT Specialist INFOSEC,IT Specialist, Cybersecurity, Cybersecurity Risk Manager,Cybersecurity Risk Analyst
Compare to Other CompTIA Security+ Courses
Curriculum For This Course
192 Lectures
07:59:26
+
Introduction
1 Lecture 00:21
+
Business Influences and Associated Security Risks
7 Lectures 11:44
Introduction
00:17

Risk Management
01:40

Business Model Strategies
02:00

Integrating Diverse Industries
01:02


Internal and External Influences
03:00

Impact of De-Perimeterization
01:22
+
Risk Mitigation Planning - Strategies and Controls
16 Lectures 37:06
Introduction
00:14


Business Classifications
02:12

Information Life Cycle and Steak-Holder Input
01:59

Implementing Technical Controls
04:44

Determine Aggregate CIA Score
01:39

Worst Case Scenario Planning
03:34

Calculation Tools and Attacker Motivation
02:55


Total Cost of Ownership and Risk Strategies
02:24

Risk Management Process
01:26

Identifying Vulnerabilities and Threats
01:41

Security Architecture Frameworks
02:36

Business Continuity Planning
01:46

IT Governance
01:38

Security Policies
02:42
+
Security-Privacy Policies and Procedures
13 Lectures 41:44
Introduction
00:15

Security-Privacy Policies and Procedures
00:26

Policy Development Updates
03:36

Developing Processes and Procedures
01:49

Legal Compliance Part1
04:02

Legal Compliance Part2
04:16


Outage Impact and Estimating Downtime Terms
07:11

Sensitive Information-Internal Security Policies
03:53

Incident Response Process
03:45

Forensic Tasks
02:34

Employment and Termination Procedures
02:58

Network Auditing
01:55
+
Incident Response and Recovery Procedures
10 Lectures 30:04
Introduction
00:11

E-Discovery and Data Retention Policies
05:30

Data Recovery-Storage and Backup Schemes
08:41

Data Owner and Data Handling
01:45

Disposal Terms and Concepts
01:18

Data Breach and Data Analysis
01:16

Incident Response Guidelines
04:50


Media-Software and Network Analysis
03:20

Order of Volatility
01:03
+
Industry Trends
10 Lectures 15:51
Introduction
00:18

Performing Ongoing Research
01:14


Evolution of Technology
00:54

Situational Awareness and Vulnerability Assessments
03:45

Researching Security Implications
02:16

Global Industry Security Response
01:01

Threat Actors
01:49

Contract Security Requirements
00:55

Contract Documents
01:07
+
Securing the Enterprise
8 Lectures 11:26
Introduction
00:14

Benchmarks and Baselines
02:06

Prototyping and Testing Multiple Solutions
01:34

Cost/Benefit Analysis
01:00

Metrics Collection and Trend Data
02:03

Security Controls-Reverse Engineering and Deconstructing
01:39

Security Solutions Business Needs
01:28

Lesson Learned- After Action Report
01:22
+
Assessment Tools and Methods
11 Lectures 26:29
Introduction
00:19


Protocol Analyzer- Network Enumerator-Password Cracker
02:42

Fuzzers and HTTP Interceptors
02:10

Exploitation Tools
01:44

Passive Reconnaissance Tools
05:27

Vulnerability Assessments and Malware Sandboxing
02:03

Memory Dumping and Penetration Testing
03:49

Reconnaissance and Fingerprinting
01:52

Code Review
01:10

Social Engineering
01:58
+
Social Cryptographic Concepts and Techniques
14 Lectures 46:30
Introduction
00:15

Cryptographic Benefits and Techniques
03:02

Hashing Algorithms
05:46

Message Authentication Code
01:11


Transport Encryption Protocol
02:08

Symmetric Algorithms
05:21

Asymmetric Algorithms
02:54

Hybrid Encryption and Digital Signatures
03:15

Public Key Infrastructure
05:12

Digital Certificate Classes and Cypher Types
01:27

Des Modes
04:54


Strength vs Performance and Cryptographic Implementations
01:55
+
Enterprise Storage
12 Lectures 30:07
Introduction
00:16

Virtual Storage Types and Challenges
02:23

Cloud Storage
04:38

Data Warehousing
01:54

Data Archiving
02:13


Network Attached Storage (NAS)
01:38

Storage Protocols and Fiber Channel over Ethernet (FCoE)
02:55

Storage Network File Systems
01:48

Secure Storage Management Techniques
05:03


Replication and Encryption Methods
02:49
8 More Sections
About the Instructor
iCollege Certifications
4.1 Average rating
2,115 Reviews
13,726 Students
100 Courses
Certification Leader

iCollege is a leading international provider of E-Learning courses, learning technologies and development services.

Utilizing state of the art technologies, highly experienced consultants and innovative methodologies, we provide, cutting-edge education products, services and solutions for individuals, corporate organizations, governmental institutions and education providers.

Our collective knowledge and experience in education and training sets the standard for service delivery in learning solutions.

Stone River eLearning
4.2 Average rating
17,325 Reviews
286,513 Students
203 Courses
280,000+ Happy Udemy Students

At Stone River eLearning, technology is all we teach. If you're interested in programming, development or design - we have it covered. 

Check out our huge catalog of courses and join the over 450,000 students currently taking Stone River eLearning courses. We currently offer 100+ different technology training courses on our Stone River eLearning website and are adding new courses on hot and trending topics every month. A subscription option is available for those with a real passion for learning.