Companies Home Search Profile

CASP+ Certification Training

Focused View

Bob Salmans

20:42:51

0 View
  • 1. DoS Protection, Load Balancers and Proxies.mp4
    16:33
  • 2. Intrusion PreventionDetection Systems.mp4
    12:39
  • 3. Application Security.mp4
    04:41
  • 4. NACs and VPNs.mp4
    07:03
  • 5. Securing DNS and Email.mp4
    10:16
  • 6. Routers and NAT Gateways.mp4
    07:44
  • 7. Firewalls, UTMs and NGFWs.mp4
    11:59
  • 1. Traffic Monitoring.mp4
    07:50
  • 2. Security Sensors.mp4
    15:11
  • 3. Network Segmentation.mp4
    15:11
  • 4. Deperimeterization Zero Trust.mp4
    03:35
  • 5. Merging Networks.mp4
    07:28
  • 6. Defense In Depth.mp4
    03:53
  • 1. Software Defined Networking (SDN).mp4
    09:25
  • 2. Scalability and Automation.mp4
    09:55
  • 3. Resiliency In Infrastructure Design.mp4
    15:00
  • 4. Virtuailzation and Containerization.mp4
    17:00
  • 5. CDNs and Caching.mp4
    06:44
  • 1. Baselines and Templates.mp4
    07:56
  • 2. APIs and Middleware.mp4
    13:18
  • 3. Software Assurance.mp4
    11:02
  • 4. Integrating Enterprise Applications.mp4
    06:29
  • 5. Application Development Security.mp4
    09:48
  • 6. Web Application Security.mp4
    06:44
  • 1. Data Loss Prevention and Detection.mp4
    05:41
  • 2. Data Classification, Labeling and Tagging.mp4
    07:21
  • 3. Obfuscation and Anonymization of Data.mp4
    07:17
  • 4. Data Lifecycle Management.mp4
    12:39
  • 5. Data Inventory and Mapping.mp4
    06:43
  • 6. Data Integrity Management.mp4
    13:34
  • 1. Managing Credentials.mp4
    09:47
  • 2. Password Policies.mp4
    11:30
  • 3. Access Control.mp4
    07:00
  • 4. AAA Protocols.mp4
    13:05
  • 5. MFA, OTP and SSO.mp4
    05:03
  • 6. Authenticating Hardware and People.mp4
    05:17
  • 1. Virtualization Technologies.mp4
    08:17
  • 2. Virtualization Strategies.mp4
    09:18
  • 3. Cloud Deployment Models.mp4
    08:57
  • 4. Cloud Computing Characteristics.mp4
    08:07
  • 5. Cloud Provider Limitations.mp4
    09:42
  • 6. Extending On-premise Security Controls.mp4
    08:51
  • 1. The CIA Triad.mp4
    07:23
  • 2. Non-repudiation and Compliance Requirements.mp4
    10:13
  • 3. Cryptography and PKI .mp4
    07:10
  • 4. Hashes and Digital Signatures .mp4
    10:25
  • 5. Cryptography Use Cases.mp4
    10:06
  • 1. AI and ML.mp4
    05:23
  • 2. Quantum Computing and Nano Technology.mp4
    06:04
  • 3. Homomorphic Encryption and SMC.mp4
    07:34
  • 4. Blockchain and Distributed Consensus.mp4
    07:43
  • 5. Big Data and Passwordless Authentication.mp4
    08:11
  • 6. Virtual Reality and 3D Printing.mp4
    07:08
  • 7. Deepfakes and Biometric Impersonation.mp4
    05:46
  • 1. Threat Intelligence.mp4
    14:16
  • 2. Threat Intel Collection Methods.mp4
    07:29
  • 3. Types of Threat Actors.mp4
    07:15
  • 4. Threat Management Frameworks.mp4
    09:55
  • 5. Using MITRE ATT&CK.mp4
    08:51
  • 6. IOCs and Responses.mp4
    06:12
  • 1. Vulnerability Scans.mp4
    11:24
  • 2. Security Content Automation Protocol (SCAP).mp4
    12:12
  • 3. Assessments.mp4
    14:19
  • 4. Patch Management.mp4
    07:41
  • 5. Information Sources.mp4
    04:34
  • 1. Vulnerability Assessment vs Pentesting.mp4
    06:58
  • 2. Testing Methods.mp4
    11:48
  • 3. Pentesting Post Exploit.mp4
    06:53
  • 4. Vulnerability Assessment Tools.mp4
    07:07
  • 5. Some Pentesting Tools.mp4
    09:33
  • 6. Vulnerability Assessments and Pentesting Requirements.mp4
    05:26
  • 1. Common Software Vulnerabilities.mp4
    13:01
  • 2. Race Conditions.mp4
    07:24
  • 3. Cryptographic Vulnerabilities.mp4
    05:03
  • 4. Software Development Vulnerabilities.mp4
    07:18
  • 5. Web Application Attacks.mp4
    08:18
  • 6. VM and Network-Based Attacks.mp4
    13:23
  • 1. Being Proactive.mp4
    13:17
  • 2. Using Data Analysis.mp4
    09:21
  • 3. Preventative Measures.mp4
    08:23
  • 4. Application Control.mp4
    06:30
  • 5. Security Automation.mp4
    04:33
  • 6. Physical .Security.mp4
    07:49
  • 1. Intro.mp4
    03:21
  • 2. Event Classification.mp4
    07:18
  • 3. Event Triage.mp4
    07:02
  • 4.Incident Response Process .mp4
    07:57
  • 5. Incident Response Playbooks.mp4
    15:40
  • 6. Automated Response.mp4
    03:48
  • 7. Communications Plans & Stakeholder Management.mp4
    03:20
  • 1. Intro.mp4
    01:08
  • 2. Forensic Process Identification.mp4
    08:47
  • 3. Digital Forensics.mp4
    05:25
  • 4. Forensic Process Evidence Collection.mp4
    15:38
  • 5. Forensic Process Evidence Preservation.mp4
    04:44
  • 6. Forensic Process Analysis.mp4
    06:15
  • 7. Forensic Process Verification and Presentation.mp4
    03:24
  • 1. Intro.mp4
    02:24
  • 2. Enterprise Mobility Management.mp4
    05:58
  • 3. Windows Information Protection.mp4
    14:20
  • 4. Configuring Endpoint Security Controls.mp4
    08:58
  • 5. Hardening Techniques.mp4
    12:20
  • 6. Compensation Controls.mp4
    04:19
  • 1. Intro.mp4
    01:09
  • 2. Cloud Deployment Models.mp4
    08:05
  • 3. Impacts of Cloud Technology Adoption.mp4
    08:32
  • 4. Securing Specialized Technologies.mp4
    08:15
  • 5. Cloud Threats And Vulnerabilities.mp4
    04:17
  • 6. Monitoring Logs Using Azure AD Audit..mp4
    04:51
  • 7. Emerging Technologies.mp4
    13:21
  • 1. Introduction To Public Key Infrastructure.mp4
    00:47
  • 2. The Role Of Public Key Infrastructure.mp4
    07:46
  • 3. Private And Public Key Encryption.mp4
    07:11
  • 4. Certificate Lifecycle.mp4
    12:13
  • 5. Certificate Types And Usage.mp4
    07:48
  • 6. Understanding Trust Concepts.mp4
    11:15
  • 1. Hashing.mp4
    10:50
  • 2. SSLTLS.mp4
    07:57
  • 3. . Symmetric And Asymmetric Algorithm.mp4
    04:06
  • 4. SMIME and SSH.mp4
    14:10
  • 5. Internet Protocol Security (IPSec).mp4
    09:23
  • 1. Risk Analysis Methods.mp4
    07:19
  • 2. Responding To Risk.mp4
    10:40
  • 3. Types of Risk.mp4
    06:51
  • 4. Risk Management Lifecycle and Frameworks.mp4
    11:28
  • 5. Tracking Risk.mp4
    03:44
  • 6. Risk Appetite, Tolerance, and Capacity.mp4
    08:00
  • 7. Policies and Security Practices.mp4
    08:49
  • 1. Third Party Risk Management.mp4
    17:28
  • 2. Vendor Lock-InOut and Viability.mp4
    06:22
  • 3. Meeting Obligations.mp4
    06:49
  • 4. Third Party Dependencies.mp4
    06:37
  • 5. Technical Considerations.mp4
    06:59
  • 6. Additional Vendor Considerations.mp4
    08:17
  • 1. Data Considerations.mp4
    12:35
  • 2. Location, Location, Location.mp4
    07:39
  • 3. Regulations, Accreditations and Standards.mp4
    12:06
  • 4. Legal Considerations.mp4
    09:19
  • 5. Contract and Agreement Types.mp4
    09:05
  • 1. BC and DR Planning.mp4
    04:12
  • 2. BCDR Planning Process.mp4
    12:03
  • 3. Creating a BC Plan.mp4
    07:44
  • 4. DR Planning.mp4
    15:14
  • 5. Resiliency Technologies.mp4
    08:40
  • 6. Testing BCDR Plans.mp4
    05:57
  • More details


    This expert CompTIA CASP+ training prepares security analysts to take the CAS-004 exam, which is the one exam required to earn the CASP+ certification.

    The CASP+ from CompTIA covers the aspects of implementing enterprise security operations that focus on risk management and the big enterprise security architecture picture. The focus of the CASP+ is on configurations and implementations of enterprise security strategies. CompTIA's CASP+ is ideal for security analysts who are advancing in their career and want to make sure they stay in the technological realm, not move into the managerial one.

    A cybersecurity analyst with their CASP+ could take strategic visions from security managers or network planners and plan and lead its implementation.

    For anyone who manages security analysts, this CompTIA training can be used for CAS-004 exam prep, onboarding new security analysts, individual or team training plans, or as a CompTIA reference resource.

    CompTIA Advanced Security Practitioner: What You Need to Know

    For any security analyst using this training for exam preparation, our CASP+ course maps to the CompTIA CAS-004 exam objectives, and covers topics such as:

    • Leading and managing enterprise security operations with a focus on risk management
    • Describing enterprise security architecture concepts, techniques and requirements
    • Analyzing risk through data trend analysis
    • Securing and locking down mobile and small-form factor devices
    • Implementing cryptographic techniques like blockchain and mobile encryption

    Who Should Take CASP+ Training?

    This CASP+ training is considered professional-level CompTIA training, which means it was designed for security analysts. This risk management skills course is designed for security analysts with three to five years of experience with cybersecurity frameworks.

    New or aspiring security analysts. If you're a brand new security analyst, trying to earn the CASP+ might be slightly more challenging than is worth it. It's a great cybersecurity certification to aim toward over the course of your career, but earning it right out the gate would be a challenge. But since the certifying exam covers advanced implementations and risk analysis that normally takes years of experience in the field to master, with this CASP+ training you can prepare for excellence from the earliest point in your career.

    Experienced security analysts. The CASP+ is a career defining certification for security analysts who are several years into their careers. If you've been working as a security analyst for a while and know that you want to stay on the technical side of the house, plan to earn the CASP+ so you can be put in charge of big implementations. With this CASP+ training, you can prepare for CompTIA's certification in risk analysis, enterprise security architecture and advanced cybersecurity implementations.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category

    I love seeing and helping people advance through life. It's my small part in contributing to the advancement of the security community.

    Bob got his start in IT after enlisting in the United States Navy and being assigned to a network engineer role. He brings seven years of IT training experience to CBT Nuggets along with over 20 years of IT experience. Bob was a security team lead for a managed services provider before joining CBTN. In his spare time, he enjoys spending time with his family, cooking, and metal and woodworking.

    Certifications: Microsoft MCSE, Cisco CCNP, Cisco CCDP, Cisco CCNA Security, CISSP, CCSP, GPEN, CISA, CISM, CompTIA Security+, CompTIA CySA+, CompTIA Pentest+

    Areas of expertise: Information security, networking, active directory, Linux

    CBT Nuggets is renowned for providing innovative training that's informative, meaningful, and engaging. We provide a variety of training, primarily in IT, project management, and office productivity topics. Our comprehensive library contains thousands of training videos ranging from Cisco networking to Microsoft Word. Whether you want to pass a certification exam, increase your skills, or simply learn new things, we've got you covered! All of our training is delivered through high-quality online streaming video. Subscribers can train 24 hours a day, seven days a week, from the convenience of a computer or mobile device. CBT Nuggets trainers are the rock stars of training, renowned for their expertise, industry-wide credibility, and engaging personalities. They enable CBT Nuggets to deliver accurate, up-to-date training, using a laid-back whiteboard presentation style. There are no scripts, EVER. Our trainers love to teach, and it shows! CEO and founder Dan Charbonneau was a Microsoft trainer when he began recording CBT Nuggets' very first training videos back in the 1990s. He wanted to help provide large organizations, small teams and individuals with comprehensive and budget-conscious training, and he realized it couldn't be done in a classroom. From the CBT Nuggets World Headquarters in Eugene, Oregon, Dan and his team promise each video will be informative, comprehensive, accurate, and fun to watch.
    • language english
    • Training sessions 145
    • duration 20:42:51
    • Release Date 2024/11/03

    Courses related to Cyber Security