Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ Microsoft AZ-900
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Personal Development Personal Transformation Mindfulness Life Purpose Meditation CBT Emotional Intelligence
Web Development JavaScript React CSS Angular PHP Node.Js WordPress Vue JS
Google Flutter Android Development iOS Development React Native Swift Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
Microsoft Power BI SQL Tableau Business Analysis Data Modeling Business Intelligence MySQL Data Analysis Blockchain
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Business Plan Startup Freelancing Online Business Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee
IT & Software IT Certification CompTIA CASP+

CompTIA Advanced Security Practitioner (CASP)

Gain the CyberSecurity Skills
Rating: 4.2 out of 54.2 (289 ratings)
2,503 students
Created by Stone River eLearning
Last updated 12/2016
English
English [Auto], Polish [Auto], 
30-Day Money-Back Guarantee

What you'll learn

  • This course will prepare you to pass the exam CompTIA Advanced Security Practitioner (CASP)
  • The CompTIA Advanced Security Practitioner certification is an international, vendor-neutral exam that proves competency in enterprise security; risk management; research and analysis; and integration of computing, communications, and business disciplines.
  • The exam covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers.
Curated for the Udemy for Business collection

Requirements

  • Ten years of IT administration experience, including at least five years of hands-on technical security experience
  • CompTIA Security + Certification or equivalent experience

Description

CompTIA's CASP - CompTIA Advanced Security Practitioner , is a vendor-neutral certification that validates IT professionals with advanced-level security skills and knowledge. This certification course covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers, while managing risk.

There is no required prerequisite for this course however, the CASP certification is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus at the enterprise level.

This CASP training course follows the CompTIA authorized objectives, ensuring you receive the training and knowledge needed to succeed.

Who this course is for:

  • An IT security professional who has a minimum of 10 years experience in IT administration including at least 5 years of hands-on technical security experience.
  • IT professionals aiming to move into a specialist security position such as a risk manager or analyst, security architect, or penetration tester/ethical Hacker.
  • Cyber Security / IS Professional,Information Security Analyst,Security Architect,IT Specialist INFOSEC,IT Specialist, Cybersecurity, Cybersecurity Risk Manager,Cybersecurity Risk Analyst

Course content

18 sections • 192 lectures • 7h 59m total length

  • Preview00:21

  • Introduction
    00:17
  • Risk Management
    01:40
  • Business Model Strategies
    02:00
  • Integrating Diverse Industries
    01:02
  • Preview02:23
  • Internal and External Influences
    03:00
  • Impact of De-Perimeterization
    01:22

  • Introduction
    00:14
  • Preview02:29
  • Business Classifications
    02:12
  • Information Life Cycle and Steak-Holder Input
    01:59
  • Implementing Technical Controls
    04:44
  • Determine Aggregate CIA Score
    01:39
  • Worst Case Scenario Planning
    03:34
  • Calculation Tools and Attacker Motivation
    02:55
  • Preview03:07
  • Total Cost of Ownership and Risk Strategies
    02:24
  • Risk Management Process
    01:26
  • Identifying Vulnerabilities and Threats
    01:41
  • Security Architecture Frameworks
    02:36
  • Business Continuity Planning
    01:46
  • IT Governance
    01:38
  • Security Policies
    02:42

  • Introduction
    00:15
  • Security-Privacy Policies and Procedures
    00:26
  • Policy Development Updates
    03:36
  • Developing Processes and Procedures
    01:49
  • Legal Compliance Part1
    04:02
  • Legal Compliance Part2
    04:16
  • Preview05:04
  • Outage Impact and Estimating Downtime Terms
    07:11
  • Sensitive Information-Internal Security Policies
    03:53
  • Incident Response Process
    03:45
  • Forensic Tasks
    02:34
  • Employment and Termination Procedures
    02:58
  • Network Auditing
    01:55

  • Introduction
    00:11
  • E-Discovery and Data Retention Policies
    05:30
  • Data Recovery-Storage and Backup Schemes
    08:41
  • Data Owner and Data Handling
    01:45
  • Disposal Terms and Concepts
    01:18
  • Data Breach and Data Analysis
    01:16
  • Incident Response Guidelines
    04:50
  • Preview02:10
  • Media-Software and Network Analysis
    03:20
  • Order of Volatility
    01:03

  • Introduction
    00:18
  • Performing Ongoing Research
    01:14
  • Preview02:32
  • Evolution of Technology
    00:54
  • Situational Awareness and Vulnerability Assessments
    03:45
  • Researching Security Implications
    02:16
  • Global Industry Security Response
    01:01
  • Threat Actors
    01:49
  • Contract Security Requirements
    00:55
  • Contract Documents
    01:07

  • Introduction
    00:14
  • Benchmarks and Baselines
    02:06
  • Prototyping and Testing Multiple Solutions
    01:34
  • Cost/Benefit Analysis
    01:00
  • Metrics Collection and Trend Data
    02:03
  • Security Controls-Reverse Engineering and Deconstructing
    01:39
  • Security Solutions Business Needs
    01:28
  • Lesson Learned- After Action Report
    01:22

  • Introduction
    00:19
  • Preview03:15
  • Protocol Analyzer- Network Enumerator-Password Cracker
    02:42
  • Fuzzers and HTTP Interceptors
    02:10
  • Exploitation Tools
    01:44
  • Passive Reconnaissance Tools
    05:27
  • Vulnerability Assessments and Malware Sandboxing
    02:03
  • Memory Dumping and Penetration Testing
    03:49
  • Reconnaissance and Fingerprinting
    01:52
  • Code Review
    01:10
  • Social Engineering
    01:58

  • Introduction
    00:15
  • Cryptographic Benefits and Techniques
    03:02
  • Hashing Algorithms
    05:46
  • Message Authentication Code
    01:11
  • Preview04:15
  • Transport Encryption Protocol
    02:08
  • Symmetric Algorithms
    05:21
  • Asymmetric Algorithms
    02:54
  • Hybrid Encryption and Digital Signatures
    03:15
  • Public Key Infrastructure
    05:12
  • Digital Certificate Classes and Cypher Types
    01:27
  • Des Modes
    04:54
  • Preview04:55
  • Strength vs Performance and Cryptographic Implementations
    01:55

  • Introduction
    00:16
  • Virtual Storage Types and Challenges
    02:23
  • Cloud Storage
    04:38
  • Data Warehousing
    01:54
  • Data Archiving
    02:13
  • Preview02:31
  • Network Attached Storage (NAS)
    01:38
  • Storage Protocols and Fiber Channel over Ethernet (FCoE)
    02:55
  • Storage Network File Systems
    01:48
  • Secure Storage Management Techniques
    05:03
  • Preview01:59
  • Replication and Encryption Methods
    02:49

Instructor

Stone River eLearning
500,000+ Happy Udemy Students
Stone River eLearning
  • 4.2 Instructor Rating
  • 53,044 Reviews
  • 678,860 Students
  • 307 Courses

At Stone River eLearning, technology is all we teach. If you're interested in IT, programming, development or design - we have it covered. 

Check out our huge catalog of courses and join the over 1,200,000+ students currently taking Stone River eLearning courses. We currently offer 800+ different technology training courses on our Stone River eLearning website and are adding new courses on hot and trending topics every month. A subscription option is available for those with a real passion for learning.

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Impressum Kontakt
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.