Companies Home Search Profile

CompTIA Advanced Security Practitioner (CASP+) (CAS-004) Cert Prep

Focused View

27:37:05

0 View
  • 01 - Welcome.mp4
    04:03
  • 02 - About the exam.mp4
    06:53
  • 01 - Securing networks.mp4
    06:48
  • 02 - Switches.mp4
    07:27
  • 03 - Routers.mp4
    08:27
  • 04 - Wireless and mesh.mp4
    03:23
  • 05 - Firewalls.mp4
    11:30
  • 06 - Proxies.mp4
    06:59
  • 07 - Gateways.mp4
    04:39
  • 08 - IDS and IPS.mp4
    06:29
  • 09 - Network access control.mp4
    02:56
  • 10 - Remote access.mp4
    08:59
  • 11 - Unified communication.mp4
    19:08
  • 12 - Cloud vs. on-premises.mp4
    04:49
  • 13 - DNSSEC.mp4
    04:16
  • 14 - Load balancer.mp4
    06:48
  • 01 - Securing architectures.mp4
    01:16
  • 02 - Traffic mirroring.mp4
    04:23
  • 03 - Network sensors.mp4
    11:46
  • 04 - Host sensors.mp4
    06:15
  • 05 - Layer 2 segmentation.mp4
    05:14
  • 06 - Network segmentation.mp4
    13:14
  • 07 - Server segmentation.mp4
    10:51
  • 08 - Zero trust.mp4
    06:37
  • 09 - Merging networks.mp4
    05:32
  • 10 - Software-defined networking.mp4
    05:27
  • 01 - Infrastructure design.mp4
    01:09
  • 02 - Scalability.mp4
    05:39
  • 03 - Resiliency issues.mp4
    12:49
  • 04 - Automation.mp4
    06:26
  • 05 - Performance design.mp4
    06:03
  • 06 - Virtualization.mp4
    08:19
  • 07 - Containerization.mp4
    05:48
  • 01 - Cloud and virtualization.mp4
    01:06
  • 02 - Cloud deployment models.mp4
    04:34
  • 03 - Cloud service models.mp4
    05:07
  • 04 - Deployment considerations.mp4
    04:57
  • 05 - Provider limitations.mp4
    02:59
  • 06 - Extending controls.mp4
    05:06
  • 07 - Provisioning and deprovision.mp4
    02:59
  • 08 - Storage models.mp4
    05:22
  • 09 - Virtualization.mp4
    07:56
  • 01 - Software applications.mp4
    02:42
  • 02 - Systems development lifecycle.mp4
    06:36
  • 03 - Software development lifecycle.mp4
    05:52
  • 04 - Development approaches.mp4
    10:51
  • 05 - Software assurance.mp4
    08:56
  • 06 - Baselines and templates.mp4
    06:31
  • 07 - Best practices.mp4
    06:07
  • 08 - Integrating applications.mp4
    04:31
  • 01 - Data security.mp4
    03:36
  • 02 - Data lifecycle.mp4
    10:29
  • 03 - Data classification.mp4
    06:55
  • 04 - Labeling and tagging.mp4
    08:11
  • 05 - Deidentification.mp4
    11:03
  • 06 - Data encryption.mp4
    07:32
  • 07 - Data loss prevention (DLP).mp4
    10:01
  • 08 - DLP detection.mp4
    06:42
  • 09 - Data loss detection.mp4
    11:34
  • 01 - Authentication and authorization.mp4
    01:44
  • 02 - Access control.mp4
    04:47
  • 03 - Credential management.mp4
    04:27
  • 04 - Password policies.mp4
    08:02
  • 05 - Multifactor authentication.mp4
    08:25
  • 06 - Authentication protocols.mp4
    10:00
  • 07 - Federation.mp4
    07:02
  • 08 - Root of trust.mp4
    04:24
  • 09 - Attestation.mp4
    02:14
  • 10 - Identity proofing.mp4
    03:33
  • 01 - Cryptography.mp4
    01:48
  • 02 - Privacy and confidentiality.mp4
    06:32
  • 03 - Integrity.mp4
    06:30
  • 04 - Compliance and policy.mp4
    03:33
  • 05 - Data states.mp4
    07:02
  • 06 - Cryptographic use cases.mp4
    06:17
  • 07 - PKI use cases.mp4
    08:41
  • 01 - Emerging technology.mp4
    04:18
  • 02 - Artificial intelligence and machine learning.mp4
    08:55
  • 03 - Deep learning.mp4
    08:58
  • 04 - Big data.mp4
    04:40
  • 05 - Blockchain distributed consensus.mp4
    05:36
  • 06 - Passwordless authentication.mp4
    05:17
  • 07 - Homomorphic encryption.mp4
    03:37
  • 08 - Virtual and augmented reality.mp4
    04:32
  • 09 - 3D printing.mp4
    03:03
  • 10 - Quantum computing.mp4
    05:34
  • 01 - Threat and vulnerability management.mp4
    01:56
  • 02 - Threat intelligence.mp4
    06:19
  • 03 - Threat hunting.mp4
    06:43
  • 04 - Intelligence collection.mp4
    11:09
  • 05 - Threat actors.mp4
    09:21
  • 06 - Threat management frameworks.mp4
    12:45
  • 07 - Vulnerability management activities.mp4
    11:44
  • 08 - Security Content Automation Protocol.mp4
    07:21
  • 01 - Vulnerability assessments.mp4
    01:35
  • 02 - Penetration test.mp4
    04:49
  • 03 - Pen test steps.mp4
    07:02
  • 04 - Pen test requirements.mp4
    11:25
  • 05 - Code analysis.mp4
    08:29
  • 06 - Protocol analysis.mp4
    07:52
  • 07 - Analysis utilities.mp4
    05:19
  • 01 - Risk reduction.mp4
    01:32
  • 02 - Deceptive technologies.mp4
    05:01
  • 03 - Security data analytics.mp4
    08:05
  • 04 - Preventative controls.mp4
    05:10
  • 05 - Application controls.mp4
    09:42
  • 06 - Security automation.mp4
    10:42
  • 07 - Physical security.mp4
    06:44
  • 01 - Analyzing vulnerabilities.mp4
    01:22
  • 02 - Race conditions.mp4
    04:58
  • 03 - Buffer overflows.mp4
    12:27
  • 04 - Authentication and references.mp4
    05:56
  • 05 - Ciphers and certificates.mp4
    10:46
  • 06 - Improper headers.mp4
    06:09
  • 07 - Software composition.mp4
    09:49
  • 08 - Vulnerable web applications.mp4
    11:45
  • 01 - Attacking vulnerabilities.mp4
    01:15
  • 02 - Directory traversals.mp4
    09:48
  • 03 - Cross-Site Scripting (XSS).mp4
    08:59
  • 04 - Cross-site request forgery (CSRF).mp4
    07:15
  • 05 - SQL injections.mp4
    07:05
  • 06 - XML injections.mp4
    06:29
  • 07 - Other injection attacks.mp4
    04:21
  • 08 - Authentication bypass.mp4
    06:45
  • 09 - VM attacks.mp4
    04:52
  • 10 - Network Attacks.mp4
    11:03
  • 11 - Social engineering.mp4
    07:15
  • 01 - Indicators of compromise.mp4
    01:49
  • 02 - Types of IoCs.mp4
    03:55
  • 03 - PCAP files.mp4
    04:16
  • 04 - NetFlow.mp4
    07:07
  • 05 - Logs.mp4
    07:03
  • 06 - IoC notifications.mp4
    07:40
  • 07 - Response to IoCs.mp4
    05:15
  • 01 - Incident response.mp4
    01:26
  • 02 - Triage.mp4
    08:04
  • 03 - Communication plan.mp4
    10:06
  • 04 - Stakeholder management.mp4
    07:12
  • 05 - Incident response process.mp4
    10:22
  • 06 - Playbooks.mp4
    08:28
  • 01 - Digital forensics.mp4
    01:04
  • 02 - Forensic process.mp4
    04:15
  • 03 - Chain of custody.mp4
    07:06
  • 04 - Order of volatility.mp4
    06:31
  • 05 - Forensic analysis.mp4
    06:41
  • 01 - Digital forensic tools.mp4
    02:22
  • 02 - Forensic workstations.mp4
    05:11
  • 03 - File carving tools.mp4
    03:36
  • 04 - Binary analysis tools.mp4
    07:11
  • 05 - Forensic analysis tools.mp4
    08:11
  • 06 - Imaging tools.mp4
    07:48
  • 07 - Collection tools.mp4
    06:16
  • 01 - Enterprise mobility.mp4
    02:36
  • 02 - Enterprise mobility management.mp4
    09:36
  • 03 - WPA3.mp4
    07:20
  • 04 - Connectivity options.mp4
    08:48
  • 05 - Security configurations.mp4
    08:08
  • 06 - DNS protection.mp4
    03:15
  • 07 - Deployment options.mp4
    04:38
  • 08 - Reconnaissance concerns.mp4
    08:00
  • 09 - Mobile security.mp4
    07:50
  • 01 - Endpoint security controls.mp4
    02:24
  • 02 - Device hardening.mp4
    08:30
  • 03 - Patching.mp4
    04:41
  • 04 - Security settings.mp4
    05:41
  • 05 - Mandatory access controls (MAC).mp4
    06:44
  • 06 - Secure boot.mp4
    05:49
  • 07 - Hardware encryption.mp4
    04:48
  • 08 - Endpoint protections.mp4
    09:54
  • 09 - Logging and monitoring.mp4
    06:14
  • 10 - Resiliency.mp4
    06:04
  • 01 - Cloud technologies.mp4
    02:37
  • 02 - Business continuity and disaster recovery.mp4
    07:51
  • 03 - Cloud encryption.mp4
    05:23
  • 04 - Serverless computing.mp4
    08:54
  • 05 - Software-defined networking (SDN).mp4
    06:52
  • 06 - Log collection and analysis.mp4
    04:22
  • 07 - Cloud application security broker.mp4
    06:16
  • 08 - Cloud misconfigurations.mp4
    10:57
  • 01 - Operational technologies.mp4
    02:05
  • 02 - Embedded systems.mp4
    10:28
  • 03 - ICS and SCADA.mp4
    09:18
  • 04 - ICS protocols.mp4
    10:54
  • 05 - Industries and sectors.mp4
    04:51
  • 01 - Hashing and symmetric algorithms.mp4
    01:13
  • 02 - Hashing.mp4
    06:55
  • 03 - Message authentication.mp4
    03:33
  • 04 - Symmetric algorithms.mp4
    05:43
  • 05 - Stream ciphers.mp4
    04:32
  • 06 - Block ciphers.mp4
    10:01
  • 01 - Asymmetric algorithms.mp4
    02:11
  • 02 - Using asymmetric algorithms.mp4
    09:28
  • 03 - SSL, TLS, and cipher suites.mp4
    08:21
  • 04 - SMIME and SSH.mp4
    07:27
  • 05 - EAP.mp4
    05:39
  • 06 - IPSec.mp4
    14:34
  • 07 - Elliptic curve cryptography (ECC).mp4
    03:33
  • 08 - Forward secrecy.mp4
    03:35
  • 09 - Authenticated encryption with associated data (AEAD).mp4
    01:53
  • 10 - Key stretching.mp4
    04:30
  • 01 - Public key infrastructure.mp4
    04:30
  • 02 - PKI components.mp4
    10:18
  • 03 - Digital certificates.mp4
    07:44
  • 04 - Using digital certificates.mp4
    05:40
  • 05 - Trust models.mp4
    04:28
  • 06 - Certificate management.mp4
    02:44
  • 07 - Certificate validity CRL and OCSP.mp4
    03:48
  • 08 - Protecting web traffic.mp4
    03:30
  • 09 - Troubleshooting certificates.mp4
    05:22
  • 10 - Troubleshooting keys.mp4
    03:35
  • 01 - Data considerations.mp4
    00:57
  • 02 - Data security.mp4
    03:44
  • 03 - Data classification.mp4
    02:47
  • 04 - Data types.mp4
    05:24
  • 05 - Data retention.mp4
    06:56
  • 06 - Data destruction.mp4
    02:55
  • 07 - Data ownership.mp4
    05:34
  • 08 - Data sovereignty.mp4
    03:18
  • 01 - Risk management.mp4
    01:31
  • 02 - Risk strategies.mp4
    04:30
  • 03 - Risk management lifecycle.mp4
    11:52
  • 04 - Risk types.mp4
    03:03
  • 05 - Risk handling.mp4
    08:33
  • 06 - Risk tracking.mp4
    05:07
  • 07 - Risk assessment.mp4
    18:00
  • 08 - When risk management fails.mp4
    03:44
  • 01 - Policies and frameworks.mp4
    01:24
  • 02 - Policies.mp4
    12:01
  • 03 - Frameworks.mp4
    04:52
  • 04 - Regulations.mp4
    08:08
  • 05 - Standards.mp4
    06:11
  • 06 - Contracts and agreements.mp4
    09:23
  • 07 - Legal considerations.mp4
    07:02
  • 08 - Integrating industries.mp4
    03:29
  • 01 - Business continuity.mp4
    01:11
  • 02 - Business continuity plan.mp4
    13:43
  • 03 - Business impact analysis.mp4
    13:52
  • 04 - Privacy impact analysis.mp4
    03:53
  • 05 - Incident response plan.mp4
    10:58
  • 06 - Testing plans.mp4
    07:10
  • 01 - Risk strategies.mp4
    01:32
  • 02 - Asset value.mp4
    04:04
  • 03 - Access control.mp4
    06:21
  • 04 - Aggregating risk.mp4
    03:07
  • 05 - Scenario planning.mp4
    08:21
  • 06 - Security controls.mp4
    09:16
  • 07 - Security solutions.mp4
    08:54
  • 08 - Cost of a data breach.mp4
    06:01
  • 01 - Vendor risk.mp4
    04:01
  • 02 - Business models.mp4
    11:05
  • 03 - Influences.mp4
    07:25
  • 04 - Organizational changes.mp4
    06:11
  • 05 - Shared responsibility model.mp4
    04:50
  • 06 - Viability and support.mp4
    10:50
  • 07 - Dependencies.mp4
    04:39
  • 08 - Considerations.mp4
    10:35
  • 09 - Supply chain.mp4
    05:59
  • Description


    The CASP+ (CompTIA Advanced Security Practitioner+) (CAS-004) certification is a vendor-neutral certification that validates your knowledge and ability to conduct advanced-level cybersecurity skills. This certification tests your ability to implement solutions within cybersecurity policies and frameworks. CASP+ (CAS-004) is an advanced-level cybersecurity certification covering technical skills in security architecture and senior security engineering. The CompTIA Advanced Security Practitioner+ exam focuses on security architecture and engineering, to validate a technical leader's ability to assess cyber readiness and design and implement the proper solutions. In this comprehensive course, expert cybersecurity trainer Jason Dion helps you prepare to earn this certification, covering in depth each topic you will need to understand for the exam.

    This course was created by Dion Training Solutions and Jason Dion. We are pleased to host this training in our library.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 257
    • duration 27:37:05
    • English subtitles has
    • Release Date 2024/12/06