CompTIA Advanced Security Practitioner: CAS-001

Develop the knowledge and skills required to design and implement enterprise level security solutions.
4.3 (8 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
353 students enrolled
$30
Take This Course
  • Lectures 37
  • Contents Video: 5.5 hours
    Other: 1 min
  • Skill Level Intermediate Level
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 4/2015 English

Course Description

The CompTIA Advanced Security Practitioner (CASP) Course (CAS-001), powered by Calibrate, helps existing and prospective IT professionals develop mastery of the knowledge and skills required to conceptualize, design and implement security solutions at the enterprise level. Individuals who successfully complete this course will have the knowledge necessary to meet the requirements of the CASP (CAS-001) certification exam and will be well-positioned to apply their new knowledge and critical thinking skills to a wide range of complex, enterprise-level security scenarios.

What are the requirements?

  • Several years experience in IT administration, hands-on technical security work, and related areas.

What am I going to get from this course?

  • Host, network, application, and storage integration
  • Enterprise-level infrastructure security
  • Risk management
  • Enterprise security research and analysis
  • Advanced authentication tools and techniques
  • Security policies and procedures
  • Identification and assessment of industry trends

What is the target audience?

  • Existing and prospective IT professionals wishing to develop mastery of the knowledge and skills required to conceptualize, design and implement security solutions at the enterprise level.

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Cryptographic Tools and Techniques
Introduction
Preview
00:58
19:13

This lecture explains the goals of cryptography and how symmetric and asymmetric encryption work.

Symmetric and Asymmetric Encryption
5 questions
19:56

This lecture explains the role that authentication plays in cryptography and how authentication is achieved.

Authentication
5 questions
Summary
00:53
Section 1 Final
8 questions
Thanks for choosing our course!
Article
Section 2: Enterprise computing
Introduction
01:01
18:08

This lecture explains virtualization and its security implications.

Virtualization
5 questions
19:35

This lecture compares enterprise storage solutions and determines the security implications associated with them.

Enterprise Storage
5 questions
12:55

This lecture explains how to design and deploy a secure network infrastructure and enterprise applications.

Comprehensive Enterprise Security, Part 2
12:18
Enterprise Security
5 questions
Summary
01:00
Section 2 Final
8 questions
Section 3: Host and Application Security
Introduction
01:01
12:26

In this lecture you'll learn how to harden host machines and utilize a wide range of software solutions to monitor host machines.

Host security
4 questions
19:37

In this lecture you'll learn to identify and compare authentication systems.

General application security
4 questions
13:01

In this lecture you will learn to understand and describe application security basics.

Web application security
3 questions
Summary
01:08
Section 3 Final
10 questions
Section 4: Security analysis and assessment
Introduction
00:49
09:48

In this lecture, you will learn to distinguish and select a method or tool to conduct a security assessment.

Security assessments, Part 2
11:40
Security assessments
4 questions
17:32

In this lecture you will learn to perform necessary analysis to ensure enterprise security.

Enterprise security analysis
4 questions
Summary
00:58
Section 4 Final
8 questions
Section 5: Risk
Introduction
01:06
Risk implications, Part 1
09:34
Risk implications, Part 2
11:21
Risk implications
4 questions
Risk mitigation
18:35
Risk mitigation
4 questions
Research
12:22
Research
4 questions
Summary
01:06
Section 5 Final
10 questions
Section 6: Security policies and procedures
Introduction
00:57
Security and privacy policies
19:44
Security and privacy policies
4 questions
Incident response
19:53
Incident response
4 questions
Summary
00:51
Section 6 Final
8 questions
Section 7: Organizational security
Introduction
01:04
Business integration
07:43
Business integration
3 questions
Security impacts of inter-organizational change
10:29
Security impacts of inter-organizational change
3 questions
Security controls for communications and collaboration
13:18
Security controls for communications and collaboration
2 questions
Security and technology lifecycle
08:09
Security and technology lifecycle
3 questions
Summary
00:54
Section 7 Final
8 questions

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Medallion Learning, Efficient and Effective Job Skills Instruction

Medallion Learning provides organizations with engaging eLearning courses that utilize best-practices in instructional design, delivery, and assessment. By tailoring instruction to the needs of each individual, we bring your learners to content mastery in less time and at lower cost. Courses combine high quality, engaging content with a proven, individualized instructional model to bring learners to content mastery as efficiently and effectively as possible.

Ready to start learning?
Take This Course