Companies Home Search Profile

CompTIA CASP+ (CAS-004)

Focused View

26:20:36

19 View
  • 1. Overview.mp4
    04:54
  • 2. Services - Discussion.mp4
    28:43
  • 3. Segmentation - Discussion.mp4
    21:10
  • 4. Services & Segmentation - Scenarios.mp4
    27:22
  • 5. DeperimeterizationZero Trust.mp4
    17:30
  • 6. Merging of Networks.mp4
    21:45
  • 7. Software-defined Networking (SDN).mp4
    18:38
  • 8. Infrastructure Design - Discussion.mp4
    25:33
  • 9. Infrastructure Design - Scenarios.mp4
    22:32
  • 10. Baselines & Templates & Software Assurance.mp4
    25:41
  • 11. Integrating Enterprise Applications.mp4
    10:38
  • 12. Security in the Development Lifecycle.mp4
    25:08
  • 13. Securing Enterprise Architecture.mp4
    26:23
  • 14. Authentication & Authorization - Discussion.mp4
    24:10
  • 15. Authentication & Authorization - Scenarios.mp4
    20:31
  • 16. Secure Cloud & Virtualization.mp4
    26:05
  • 17. Cryptography & PKI.mp4
    25:52
  • 18. Impact of Emerging Technologies.mp4
    27:10
  • 19. Security Architecture - Key Points.mp4
    14:59
  • 20. Perform Threat Management.mp4
    24:51
  • 21. Indicators of Compromise & Response.mp4
    27:35
  • 22. Vulnerability Management Activities.mp4
    22:21
  • 23. Vulnerability Assessment - Methods & Tools.mp4
    27:15
  • 24. Analyze Vulnerabilities - Vulnerabilities.mp4
    26:29
  • 25. Analyze Vulnerabilities - Vulnerable Systems.mp4
    24:42
  • 26. Analyze Vulnerabilities - Attacks.mp4
    28:11
  • 27. Use Processes to Reduce Risk.mp4
    25:13
  • 28. Triage & Incident Response.mp4
    23:07
  • 29. Forensic Concepts.mp4
    21:02
  • 30. File Carving & Binary Analysis.mp4
    27:35
  • 31. Analysis Tools.mp4
    27:28
  • 32. Live Collection Tools.mp4
    24:49
  • 33. Security Operations - Key Points.mp4
    15:57
  • 34. Managed Configurations.mp4
    27:16
  • 35. Deployment Scenarios.mp4
    12:57
  • 36. Security Considerations.mp4
    24:34
  • 37. Hardening Techniques.mp4
    22:06
  • 38. Processes.mp4
    25:10
  • 39. Mandatory Access Control.mp4
    15:04
  • 40. Trustworthy Computing.mp4
    27:18
  • 41. Compensating Controls.mp4
    09:35
  • 42. Security Considerations - Embedded.mp4
    15:58
  • 43. Security Considerations - ICS-SCADA.mp4
    22:07
  • 44. Security Considerations - Protocols.mp4
    24:46
  • 45. Security Considerations - Sectors.mp4
    08:45
  • 46. Cloud Technology - Basics.mp4
    26:17
  • 47. Cloud Technology - Advanced.mp4
    26:31
  • 48. PKI - Basics.mp4
    28:04
  • 49. PKI - Advanced.mp4
    27:17
  • 50. Hashing & Symmetric Algorithms.mp4
    27:29
  • 51. Asymmetric Algorithms & Protocols.mp4
    28:21
  • 52. Troubleshoot Cryptography - Keys.mp4
    13:26
  • 53. Security Engineering & Cryptography - Key Points.mp4
    12:23
  • 54. Troubleshoot Cryptography - Misconfigurations.mp4
    17:37
  • 55. Risk Assessment.mp4
    26:50
  • 56. Risk Handling Techniques.mp4
    17:51
  • 57. Risk Types.mp4
    15:46
  • 58. Risk Management Life Cycle.mp4
    20:57
  • 59. Risk Tracking.mp4
    25:20
  • 60. Policies and Security Practices.mp4
    23:55
  • 61. Shared Responsibility Model - Cloud.mp4
    15:41
  • 62. Performing Vendor Assessments.mp4
    19:42
  • 63. Technical Considerations.mp4
    15:33
  • 64. Data Considerations.mp4
    25:42
  • 65. Regulations Accreditations & Standards.mp4
    28:14
  • 66. Legal Considerations.mp4
    16:48
  • 67. Contract and Agreement Types.mp4
    14:12
  • 68. Business Impact Analysis (BIA).mp4
    25:05
  • 69. Privacy Impact Assessment.mp4
    10:20
  • 70. Disaster Recovery & Business Continuity Planning.mp4
    15:23
  • 71. Incident Response Plan.mp4
    16:29
  • 72. Testing Plans.mp4
    26:12
  • 73. Governance, Risk & Compliance - Key Points.mp4
    16:16
  • CASP004-ADISH.zip
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    We created ITProTV [ITPro] because it is the IT training we wanted to have ourselves — engaging, conversational, affordable, and convenient.
    • language english
    • Training sessions 73
    • duration 26:20:36
    • Release Date 2024/04/26

    Courses related to CISSP - Certified Information Systems Security Professional

    Courses related to Cyber Security

    Courses related to Network Security

    Courses related to Information Security

    Courses related to Cyber Security Awareness