$142.90
- 18 Courses | 11h 55m 15s
- 2 Books | 28h 39m
Prepare to become CASP+ certified by acquiring master-level cybersecurity knowledge.
The price above is for a single user on an annual subscription. For more users please enter the number of users next to the ‘Add to cart’ option.
Description
Prepare to become CASP+ certified by acquiring master-level cybersecurity knowledge.
COURSES INCLUDED
BUSINESS AND INDUSTRY INFLUENCES AND RISKS
Explore various business and industry influences along with their associated security risks.
10 videos | 41m Assessment
ORGANIZATIONAL SECURITY AND PRIVACY POLICIES
Explore various critical security and privacy policies and procedures that represent the organizational requirements.
10 videos | 34m Assessment
RISK MITIGATION STRATEGIES AND CONTROLS
Discover how to execute risk mitigation strategies and controls in a given scenario.
11 videos | 51m Assessment
RISK METRIC SCENARIOS FOR ENTERPRISE SECURITY
Analyzing risk metric situations is important to help improve enterprise security. Explore different risk metric scenarios.
10 videos | 29m Assessment
INTEGRATING NETWORK AND SECURITY COMPONENTS, CONCEPTS, AND ARCHITECTURES
Discover integration of network and security components, concepts, and architectures.
12 videos | 1h 19m Assessment
INTEGRATING SECURITY CONTROLS FOR HOST DEVICES
Discover enterprise security architecture, and examining integration of security controls for host devices to meet security requirements.
11 videos | 40m Assessment
INTEGRATING CONTROLS FOR MOBILE & SMALL FORM FACTOR DEVICES
Analyze ways to integrate security controls for mobile and small form factor devices to meet security requirements.
10 videos | 43m Assessment
SELECTING SOFTWARE SECURITY CONTROLS
Discover how to choose the appropriate security controls in various application vulnerability scenarios.
10 videos | 34m Assessment
CONDUCTING SECURITY ASSESSMENTS
Discover enterprise security operations and explore numerous methods for conducting effective security assessments.
12 videos | 45m Assessment
IMPLEMENTING INCIDENT RESPONSE & RECOVERY
Representing the final section of Module 3: Enterprise Security operations, you will implement incident response and recovery procedures in various scenarios.
10 videos | 37m Assessment
INTEGRATING HOSTS, STORAGE , & APPLICATIONS IN THE ENTERPRISE
Explore how to integrate hosts, storage, networks, and applications into a secure enterprise.
10 videos | 43m Assessment
INTEGRATING CLOUD & VIRTUALIZATION TECHNOLOGIES IN THE ENTERPRISE
Discover how to integrate cloud and virtualization technologies into a secure enterprise architecture.
10 videos | 36m Assessment
INTEGRATING & TROUBLESHOOTING ADVANCED AAA TECHNOLOGIES
Explore various scenarios to integrate and troubleshoot advanced authentication and authorization technologies in support of enterprise security initiatives and goals.
8 videos | 35m Assessment
IMPLEMENTING CRYPTOGRAPHIC TECHNIQUES
Discover how to implement various cryptographic techniques in different scenarios.
11 videos | 52m Assessment
SECURE COMMUNICATION & COLLABORATION SOLUTIONS
Discover how to choose the appropriate controls to secure communications and collaboration solutions.
10 videos | 23m Assessment
APPLYING RESEARCH METHODS FOR TREND & IMPACT ANALYSIS
Discover the importance of applying research methods to determine industry trends and their impact on the enterprise.
9 videos | 21m Assessment
IMPLEMENTING SECURITY ACTIVITIES ACROSS THE TECHNOLOGY LIFE CYCLE
Discover how to implement security activities across the technology and software development life cycles.
12 videos | 36m Assessment
INTERACTING ACROSS DIVERSE BUSINESS UNITS
Discover the importance of interaction across diverse business units to achieve security goals.
8 videos | 25m Assessment
Resource
Contact Us for more information.