CompTIA Advanced Security Practitioner (CASP)

$142.90

  • 18 Courses | 11h 55m 15s
  • 2 Books | 28h 39m

Prepare to become CASP+ certified by acquiring master-level cybersecurity knowledge.

The price above is for a single user on an annual subscription. For more users please enter the number of users next to the ‘Add to cart’ option.

Category:

Description

Prepare to become CASP+ certified by acquiring master-level cybersecurity knowledge.

COURSES INCLUDED

BUSINESS AND INDUSTRY INFLUENCES AND RISKS
Explore various business and industry influences along with their associated security risks.
10 videos | 41m Assessment


ORGANIZATIONAL SECURITY AND PRIVACY POLICIES

Explore various critical security and privacy policies and procedures that represent the organizational requirements.
10 videos | 34m Assessment


RISK MITIGATION STRATEGIES AND CONTROLS

Discover how to execute risk mitigation strategies and controls in a given scenario.
11 videos | 51m Assessment


RISK METRIC SCENARIOS FOR ENTERPRISE SECURITY

Analyzing risk metric situations is important to help improve enterprise security. Explore different risk metric scenarios.
10 videos | 29m Assessment


INTEGRATING NETWORK AND SECURITY COMPONENTS, CONCEPTS, AND ARCHITECTURES

Discover integration of network and security components, concepts, and architectures.
12 videos | 1h 19m Assessment


INTEGRATING SECURITY CONTROLS FOR HOST DEVICES

Discover enterprise security architecture, and examining integration of security controls for host devices to meet security requirements.
11 videos | 40m Assessment


INTEGRATING CONTROLS FOR MOBILE & SMALL FORM FACTOR DEVICES

Analyze ways to integrate security controls for mobile and small form factor devices to meet security requirements.
10 videos | 43m Assessment


SELECTING SOFTWARE SECURITY CONTROLS

Discover how to choose the appropriate security controls in various application vulnerability scenarios.
10 videos | 34m Assessment


CONDUCTING SECURITY ASSESSMENTS

Discover enterprise security operations and explore numerous methods for conducting effective security assessments.
12 videos | 45m Assessment


IMPLEMENTING INCIDENT RESPONSE & RECOVERY

Representing the final section of Module 3: Enterprise Security operations, you will implement incident response and recovery procedures in various scenarios.
10 videos | 37m Assessment


INTEGRATING HOSTS, STORAGE , & APPLICATIONS IN THE ENTERPRISE

Explore how to integrate hosts, storage, networks, and applications into a secure enterprise.
10 videos | 43m Assessment


INTEGRATING CLOUD & VIRTUALIZATION TECHNOLOGIES IN THE ENTERPRISE

Discover how to integrate cloud and virtualization technologies into a secure enterprise architecture.
10 videos | 36m Assessment


INTEGRATING & TROUBLESHOOTING ADVANCED AAA TECHNOLOGIES

Explore various scenarios to integrate and troubleshoot advanced authentication and authorization technologies in support of enterprise security initiatives and goals.
8 videos | 35m Assessment


IMPLEMENTING CRYPTOGRAPHIC TECHNIQUES

Discover how to implement various cryptographic techniques in different scenarios.
11 videos | 52m Assessment


SECURE COMMUNICATION & COLLABORATION SOLUTIONS

Discover how to choose the appropriate controls to secure communications and collaboration solutions.
10 videos | 23m Assessment


APPLYING RESEARCH METHODS FOR TREND & IMPACT ANALYSIS

Discover the importance of applying research methods to determine industry trends and their impact on the enterprise.
9 videos | 21m Assessment


IMPLEMENTING SECURITY ACTIVITIES ACROSS THE TECHNOLOGY LIFE CYCLE

Discover how to implement security activities across the technology and software development life cycles.
12 videos | 36m Assessment


INTERACTING ACROSS DIVERSE BUSINESS UNITS

Discover the importance of interaction across diverse business units to achieve security goals.
8 videos | 25m Assessment

Resource


Contact Us for more information.