
CAS-003: CompTIA Advanced Security Practitioner (CASP) CAS-003 Certification Video Training Course
The complete solution to prepare for for your exam with CAS-003: CompTIA Advanced Security Practitioner (CASP) CAS-003 certification video training course. The CAS-003: CompTIA Advanced Security Practitioner (CASP) CAS-003 certification video training course contains a complete set of videos that will provide you with thorough knowledge to understand the key concepts. Top notch prep including CompTIA CASP+ CAS-003 exam dumps, study guide & practice test questions and answers.
CAS-003: CompTIA Advanced Security Practitioner (CASP) CAS-003 Certification Video Training Course Exam Curriculum
Course Introduction
-
1. Course Introduction
-
2. Instructor Introduction
Chapter 01 - Understanding Risk Management
-
1. Chapter Introdcution
-
2. Topic A: Understanding Business and Industry Influences
-
3. Ongoing Risk Management
-
4. New Products and User Behaviors
-
5. Business Models and Strategies
-
6. Cloud Technologies
-
7. Acquisitions and Mergers
-
8. Due Diligence Team
-
9. Data Ownership
-
10. Data Reclassification
-
11. Integrating Diverse Industries
-
12. Common Regulations
-
13. Geographic Differences
-
14. Data Sovereignty
-
15. Internal and External Influences
-
16. De-perimeterization
-
17. Understand Changes in Network Boundaries
-
18. Topic B: Policies and Procedures
-
19. Understanding Policies and Procedures
-
20. Policy Life Cycle
-
21. Process Life Cycle
-
22. Reviewing Policies and Processes
-
23. Common Business Documents
-
24. Security for Contracts
-
25. Contract Requirements
-
26. General Privacy Principles
-
27. Standard Security Practices
-
28. Demo - Examining Security Policies
-
29. Topic C: Risk Mitigation and Control
-
30. Introduction to Risk Mitigation
-
31. Categorizing Data
-
32. Incorporating Stakeholder Input
-
33. Aggregate CIA Scores
-
34. Selecting and Implementing Controls
-
35. Security Control Frameworks
-
36. Options for Frameworks
-
37. Extreme Scenario Planning
-
38. System-Specific Risk Analysis
-
39. Qualitative Risk Analysis
-
40. Quantitative Risk Analysis
-
41. Risk Impact
-
42. Likelihood of Threat
-
43. Return on Investment
-
44. Understanding Payback
-
45. Total Cost of Ownership
-
46. TCO Guidelines
-
47. Translate to Business Terms
-
48. Risk Management Strategies
-
49. Risk Management Processes
-
50. Information and Asset Value and Costs
-
51. Vulnerabilities and Threat Identification
-
52. Additional Factors
-
53. Topic D: Business Continuity Planning
-
54. Continuity Planning
-
55. BCP Components
-
56. BCP Steps
-
57. Additional Plans
-
58. Conducting Business Impact Analysis
-
59. Chapter 01 Review
Chapter 02 - Network and Security Components and Architecture
-
1. Chapter Introdcution
-
2. Topic A: Physical and Virtual Network Security Devices
-
3. Unified Threat Management
-
4. Analyzing UTM
-
5. Intrusion Detection and Prevention
-
6. In-Line Network Encryptor
-
7. Network Access Control
-
8. SIEM
-
9. Firewalls
-
10. Firewall Architecture
-
11. Wireless Controller
-
12. Routers and Switches
-
13. Proxy Servers
-
14. Topic B: Application and Protocol Level Security
-
15. Web Application Firewalls
-
16. Hardware Security Modules
-
17. Vulnerability Scanners
-
18. Topic C: Advanced Network Design
-
19. Virtual Private Networks
-
20. VPN Protocols
-
21. IP Security (IPSec)
-
22. IPSec Modes
-
23. Demo - Examining IPSec Policies
-
24. Secure Sockets Layer (SSL)
-
25. Transport Layer Security (TLS
-
26. Additional Security Protocols
-
27. Authentication Protocols
-
28. Topic D: Network Solutions for Data Flow
-
29. Data Loss Prevention
-
30. Data Flow Enforcement
-
31. Network Flow
-
32. Topic E: Secure Baselines of Networking and Security Components
-
33. Securing Device Configurations
-
34. Access Control Lists (ACLs)
-
35. ACL Rule Sets
-
36. Change Monitoring
-
37. Configuration Lockdown
-
38. Availability Controls
-
39. Disk Availability
-
40. Key Availability Terms
-
41. Topic F: Advanced Configuration of Network Devices
-
42. Additional Configurations
-
43. Transport Security
-
44. Trunking Security
-
45. Port Security
-
46. Ports and Sockets
-
47. Security Zones
-
48. Network Segmentation
-
49. Network Access Control
-
50. NAC Concepts
-
51. Network Enabled Devices
-
52. Automation Systems
-
53. Physical Security
-
54. Chapter 02 Review
Chapter 03 - Implementing Advanced Authentication and Cryptographic Techniques
-
1. Chapter Introdcution
-
2. Topic A: Understanding Authentication and Authorization Concepts
-
3. Authentication
-
4. The Importance of Identity
-
5. Additional Password Options
-
6. Demo - Enforcing Strong Passwords
-
7. Biometric Authentication
-
8. Biometric Considerations
-
9. Beyond Single Factor
-
10. Certificate Authentication
-
11. Authorization
-
12. Open Authorization
-
13. XACML
-
14. SPML
-
15. Authorization Concepts
-
16. Trust Models
-
17. Topic B: Cryptographic Techniques
-
18. Introduction to Cryptography
-
19. Cryptographic Techniques
-
20. Key Stretching
-
21. Hashing
-
22. Message Digest (MD) Algorithms
-
23. Secure Hash Algorithm (SHA)
-
24. Digital Signatures
-
25. Message Authentication
-
26. Code Signing
-
27. Additional Concepts
-
28. Protecting Data in Transit
-
29. Protecting Data in Memory
-
30. Protecting Data at Rest
-
31. Symmetric Algorithms
-
32. Asymmetric Algorithms
-
33. Encryption Methods
-
34. Topic C: Cryptographic Implementations
-
35. Crypto Options
-
36. Additional Crypto Options
-
37. Cryptographic Applications
-
38. Crypto Considerations
-
39. Stream vs. Block Ciphers
-
40. Block Cipher Modes
-
41. Public Key Infrastructure
-
42. Primary PKI Functions
-
43. Additional PKI Concepts
-
44. Chapter 03 Review
Chapter 04 - Implementing Security for Systems, Applications, and Storage
-
1. Chapter Introdcution
-
2. Topic A: Security for Host Devices
-
3. Trusted OS
-
4. Trusted OS Options
-
5. Security Software
-
6. Additional Host-Based Software Options
-
7. Demo - Configuring a Host-Based Firewall
-
8. Auditing
-
9. Demo - Configuring Audit Policies
-
10. Endpoint Detection Response
-
11. Host Hardening
-
12. Group Policy
-
13. Demo - Configuring Group Policy Security
-
14. Command Shell Restrictions
-
15. Out-of-Band Management
-
16. Dedicated Interfaces
-
17. External I/O Restrictions
-
18. Wireless Technologies
-
19. Wi-Fi Components
-
20. 802.11 Standards
-
21. Wireless Security
-
22. Securing Other Host Devices
-
23. Boot Security
-
24. Additional Boot Security Options
-
25. Topic B: Mobile Device Security
-
26. Enterprise Mobility Management
-
27. MDM Concepts
-
28. Management Options
-
29. Context Aware Management
-
30. Security and Privacy
-
31. Physical Security Options
-
32. Additional Mobile Device Concepts
-
33. Authentication Options
-
34. Mobile Devices
-
35. Wearable Security Implications
-
36. Topic C: Software Security Controls
-
37. Application Security Design Considerations
-
38. Application Issues
-
39. Application Issues conti...
-
40. Data Remnants
-
41. Securing Applications
-
42. Using JSON and REST
-
43. Browser Extensions
-
44. Application Vulnerabilities
-
45. Chapter 04 Review
Chapter 05 - Implementing Security for Cloud and Virtualization Technologies
-
1. Chapter Introduction
-
2. Topic A: Cloud and Virtualization Technology
-
3. Cloud Computing and Virtualization
-
4. Cloud Options
-
5. Security Considerations
-
6. Cloud Service Models
-
7. Demo - Examining Cloud Service Models
-
8. Security and Virtualization
-
9. Cloud-Augmented Security Services
-
10. Security as a Service
-
11. Virtualization Vulnerabilities
-
12. Topic B: Securing Remote Access and Collaboration
-
13. Remote Access
-
14. Dial-Up Access
-
15. Virtual Private Networks
-
16. Remote Access Purposes
-
17. Security Considerations
-
18. Unified Collaboration Tools
-
19. Web Conferencing
-
20. Video Conferencing
-
21. Storage and Document Collaboration
-
22. Unified Communication
-
23. Instant Messaging
-
24. Presence
-
25. E-Mail
-
26. Chapter 05 Review
Chapter 06 - Utilizing Security Assessments and Incident Response
-
1. Chapter Introduction
-
2. Topic A: Security Assessments
-
3. Importance of Security Assessments
-
4. Malware Sandboxing
-
5. Memory Dumping
-
6. Runtime Debugging
-
7. Reconnaissance
-
8. Fingerprinting
-
9. Code Review
-
10. Social Engineering
-
11. Public Information
-
12. Demo - Accessing Public Information
-
13. Penetration Test
-
14. Vulnerability Assessment
-
15. Assessment Styles
-
16. Topic B: Security Assessment Tools
-
17. Network Tool Types
-
18. Security Content Automation Protocol (SCAP)
-
19. Common Vulnerability Scoring System (CVSS)
-
20. Fuzzing
-
21. Exploit Kits
-
22. Host Tools
-
23. Additional Host Tools
-
24. Physical Security Tools
-
25. Topic C: Incident Response and Recovery
-
26. E-discovery
-
27. Data Breach
-
28. Incident Response Process
-
29. Chapter 06 Review
-
30. Course Closure
About CAS-003: CompTIA Advanced Security Practitioner (CASP) CAS-003 Certification Video Training Course
CAS-003: CompTIA Advanced Security Practitioner (CASP) CAS-003 certification video training course by prepaway along with practice test questions and answers, study guide and exam dumps provides the ultimate training package to help you pass.
Prepaway's CAS-003: CompTIA Advanced Security Practitioner (CASP) CAS-003 video training course for passing certification exams is the only solution which you need.
Pass CompTIA CASP+ CAS-003 Exam in First Attempt Guaranteed!
Get 100% Real Exam Questions, Accurate & Verified Answers As Seen in the Real Exam!
30 Days Free Updates, Instant Download!

CAS-003 Premium Bundle
- Premium File 368 Questions & Answers. Last update: Feb 20, 2021
- Training Course 260 Lectures
- Study Guide 1220 Pages
Download 25 Sample Questions that you WILL see in your CompTIA CAS-003 exam.
OR
Guarantee your success by buying the full version which covers the full latest pool of questions.
(368 Questions, Last Updated on Feb 20, 2021)
Free CAS-003 Exam Questions & CompTIA CAS-003 Dumps | ||
---|---|---|
Comptia.testking.cas-003.v2020-11-05.by.luca.220q.ete |
Views: 378
Downloads: 110
|
Size: 2.9 MB
|
Comptia.examcollection.cas-003.v2020-09-26.by.sophie.218q.ete |
Views: 292
Downloads: 87
|
Size: 2.6 MB
|
Comptia.test-inside.cas-003.v2020-05-13.by.alex.205q.ete |
Views: 441
Downloads: 215
|
Size: 2.21 MB
|
Comptia.certkiller.cas-003.v2020-03-07.by.aria.204q.ete |
Views: 473
Downloads: 201
|
Size: 1.85 MB
|
Comptia.certkey.cas-003.v2020-02-01.by.abdullah.190q.ete |
Views: 523
Downloads: 211
|
Size: 1.85 MB
|
Comptia.testkings.cas-003.v2019-11-05.by.anna.175q.ete |
Views: 610
Downloads: 192
|
Size: 1.27 MB
|
Comptia.actualtests.cas-003.v2019-08-16.by.lola.159q.ete |
Views: 796
Downloads: 341
|
Size: 1.5 MB
|
Comptia.train4sure.cas-003.v2019-06-05.by.benx_13.119q.ete |
Views: 803
Downloads: 266
|
Size: 1.17 MB
|
Student Feedback
Can View Online Video Courses
Please fill out your email address below in order to view Online Courses.
Registration is Free and Easy, You Simply need to provide an email address.
- Trusted By 1.2M IT Certification Candidates Every Month
- Hundreds Hours of Videos
- Instant download After Registration
A confirmation link will be sent to this email address to verify your login.
Please Log In to view Online Course
Registration is free and easy - just provide your E-mail address.
Click Here to Register