CompTIA Advanced Security Practitioner (CASP)
4.0 (226 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
1,995 students enrolled

CompTIA Advanced Security Practitioner (CASP)

Gain the CyberSecurity Skills
4.0 (226 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
1,995 students enrolled
Last updated 12/2016
English
English [Auto], Polish [Auto], 1 more
  • Romanian [Auto]
Current price: $139.99 Original price: $199.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 8 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • This course will prepare you to pass the exam CompTIA Advanced Security Practitioner (CASP)
  • The CompTIA Advanced Security Practitioner certification is an international, vendor-neutral exam that proves competency in enterprise security; risk management; research and analysis; and integration of computing, communications, and business disciplines.
  • The exam covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers.
Requirements
  • Ten years of IT administration experience, including at least five years of hands-on technical security experience
  • CompTIA Security + Certification or equivalent experience
Description

CompTIA's CASP - CompTIA Advanced Security Practitioner , is a vendor-neutral certification that validates IT professionals with advanced-level security skills and knowledge. This certification course covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers, while managing risk.

There is no required prerequisite for this course however, the CASP certification is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus at the enterprise level.

This CASP training course follows the CompTIA authorized objectives, ensuring you receive the training and knowledge needed to succeed.

Who this course is for:
  • An IT security professional who has a minimum of 10 years experience in IT administration including at least 5 years of hands-on technical security experience.
  • IT professionals aiming to move into a specialist security position such as a risk manager or analyst, security architect, or penetration tester/ethical Hacker.
  • Cyber Security / IS Professional,Information Security Analyst,Security Architect,IT Specialist INFOSEC,IT Specialist, Cybersecurity, Cybersecurity Risk Manager,Cybersecurity Risk Analyst
Course content
Expand all 192 lectures 07:59:26
+ Business Influences and Associated Security Risks
7 lectures 11:44
Introduction
00:17
Risk Management
01:40
Business Model Strategies
02:00
Integrating Diverse Industries
01:02
Internal and External Influences
03:00
Impact of De-Perimeterization
01:22
+ Risk Mitigation Planning - Strategies and Controls
16 lectures 37:06
Introduction
00:14
Business Classifications
02:12
Information Life Cycle and Steak-Holder Input
01:59
Implementing Technical Controls
04:44
Determine Aggregate CIA Score
01:39
Worst Case Scenario Planning
03:34
Calculation Tools and Attacker Motivation
02:55
Total Cost of Ownership and Risk Strategies
02:24
Risk Management Process
01:26
Identifying Vulnerabilities and Threats
01:41
Security Architecture Frameworks
02:36
Business Continuity Planning
01:46
IT Governance
01:38
Security Policies
02:42
+ Security-Privacy Policies and Procedures
13 lectures 41:44
Introduction
00:15
Security-Privacy Policies and Procedures
00:26
Policy Development Updates
03:36
Developing Processes and Procedures
01:49
Legal Compliance Part1
04:02
Legal Compliance Part2
04:16
Outage Impact and Estimating Downtime Terms
07:11
Sensitive Information-Internal Security Policies
03:53
Incident Response Process
03:45
Forensic Tasks
02:34
Employment and Termination Procedures
02:58
Network Auditing
01:55
+ Incident Response and Recovery Procedures
10 lectures 30:04
Introduction
00:11
E-Discovery and Data Retention Policies
05:30
Data Recovery-Storage and Backup Schemes
08:41
Data Owner and Data Handling
01:45
Disposal Terms and Concepts
01:18
Data Breach and Data Analysis
01:16
Incident Response Guidelines
04:50
Media-Software and Network Analysis
03:20
Order of Volatility
01:03
+ Industry Trends
10 lectures 15:51
Introduction
00:18
Performing Ongoing Research
01:14
Evolution of Technology
00:54
Situational Awareness and Vulnerability Assessments
03:45
Researching Security Implications
02:16
Global Industry Security Response
01:01
Threat Actors
01:49
Contract Security Requirements
00:55
Contract Documents
01:07
+ Securing the Enterprise
8 lectures 11:26
Introduction
00:14
Benchmarks and Baselines
02:06
Prototyping and Testing Multiple Solutions
01:34
Cost/Benefit Analysis
01:00
Metrics Collection and Trend Data
02:03
Security Controls-Reverse Engineering and Deconstructing
01:39
Security Solutions Business Needs
01:28
Lesson Learned- After Action Report
01:22
+ Assessment Tools and Methods
11 lectures 26:29
Introduction
00:19
Protocol Analyzer- Network Enumerator-Password Cracker
02:42
Fuzzers and HTTP Interceptors
02:10
Exploitation Tools
01:44
Passive Reconnaissance Tools
05:27
Vulnerability Assessments and Malware Sandboxing
02:03
Memory Dumping and Penetration Testing
03:49
Reconnaissance and Fingerprinting
01:52
Code Review
01:10
Social Engineering
01:58
+ Social Cryptographic Concepts and Techniques
14 lectures 46:30
Introduction
00:15
Cryptographic Benefits and Techniques
03:02
Hashing Algorithms
05:46
Message Authentication Code
01:11
Transport Encryption Protocol
02:08
Symmetric Algorithms
05:21
Asymmetric Algorithms
02:54
Hybrid Encryption and Digital Signatures
03:15
Public Key Infrastructure
05:12
Digital Certificate Classes and Cypher Types
01:27
Des Modes
04:54
Strength vs Performance and Cryptographic Implementations
01:55
+ Enterprise Storage
12 lectures 30:07
Introduction
00:16
Virtual Storage Types and Challenges
02:23
Cloud Storage
04:38
Data Warehousing
01:54
Data Archiving
02:13
Network Attached Storage (NAS)
01:38
Storage Protocols and Fiber Channel over Ethernet (FCoE)
02:55
Storage Network File Systems
01:48
Secure Storage Management Techniques
05:03
Replication and Encryption Methods
02:49