CompTIA CASP+ (CAS-004)
Focused View
26:20:36
19 View
1. Overview.mp4
04:54
2. Services - Discussion.mp4
28:43
3. Segmentation - Discussion.mp4
21:10
4. Services & Segmentation - Scenarios.mp4
27:22
5. DeperimeterizationZero Trust.mp4
17:30
6. Merging of Networks.mp4
21:45
7. Software-defined Networking (SDN).mp4
18:38
8. Infrastructure Design - Discussion.mp4
25:33
9. Infrastructure Design - Scenarios.mp4
22:32
10. Baselines & Templates & Software Assurance.mp4
25:41
11. Integrating Enterprise Applications.mp4
10:38
12. Security in the Development Lifecycle.mp4
25:08
13. Securing Enterprise Architecture.mp4
26:23
14. Authentication & Authorization - Discussion.mp4
24:10
15. Authentication & Authorization - Scenarios.mp4
20:31
16. Secure Cloud & Virtualization.mp4
26:05
17. Cryptography & PKI.mp4
25:52
18. Impact of Emerging Technologies.mp4
27:10
19. Security Architecture - Key Points.mp4
14:59
20. Perform Threat Management.mp4
24:51
21. Indicators of Compromise & Response.mp4
27:35
22. Vulnerability Management Activities.mp4
22:21
23. Vulnerability Assessment - Methods & Tools.mp4
27:15
24. Analyze Vulnerabilities - Vulnerabilities.mp4
26:29
25. Analyze Vulnerabilities - Vulnerable Systems.mp4
24:42
26. Analyze Vulnerabilities - Attacks.mp4
28:11
27. Use Processes to Reduce Risk.mp4
25:13
28. Triage & Incident Response.mp4
23:07
29. Forensic Concepts.mp4
21:02
30. File Carving & Binary Analysis.mp4
27:35
31. Analysis Tools.mp4
27:28
32. Live Collection Tools.mp4
24:49
33. Security Operations - Key Points.mp4
15:57
34. Managed Configurations.mp4
27:16
35. Deployment Scenarios.mp4
12:57
36. Security Considerations.mp4
24:34
37. Hardening Techniques.mp4
22:06
38. Processes.mp4
25:10
39. Mandatory Access Control.mp4
15:04
40. Trustworthy Computing.mp4
27:18
41. Compensating Controls.mp4
09:35
42. Security Considerations - Embedded.mp4
15:58
43. Security Considerations - ICS-SCADA.mp4
22:07
44. Security Considerations - Protocols.mp4
24:46
45. Security Considerations - Sectors.mp4
08:45
46. Cloud Technology - Basics.mp4
26:17
47. Cloud Technology - Advanced.mp4
26:31
48. PKI - Basics.mp4
28:04
49. PKI - Advanced.mp4
27:17
50. Hashing & Symmetric Algorithms.mp4
27:29
51. Asymmetric Algorithms & Protocols.mp4
28:21
52. Troubleshoot Cryptography - Keys.mp4
13:26
53. Security Engineering & Cryptography - Key Points.mp4
12:23
54. Troubleshoot Cryptography - Misconfigurations.mp4
17:37
55. Risk Assessment.mp4
26:50
56. Risk Handling Techniques.mp4
17:51
57. Risk Types.mp4
15:46
58. Risk Management Life Cycle.mp4
20:57
59. Risk Tracking.mp4
25:20
60. Policies and Security Practices.mp4
23:55
61. Shared Responsibility Model - Cloud.mp4
15:41
62. Performing Vendor Assessments.mp4
19:42
63. Technical Considerations.mp4
15:33
64. Data Considerations.mp4
25:42
65. Regulations Accreditations & Standards.mp4
28:14
66. Legal Considerations.mp4
16:48
67. Contract and Agreement Types.mp4
14:12
68. Business Impact Analysis (BIA).mp4
25:05
69. Privacy Impact Assessment.mp4
10:20
70. Disaster Recovery & Business Continuity Planning.mp4
15:23
71. Incident Response Plan.mp4
16:29
72. Testing Plans.mp4
26:12
73. Governance, Risk & Compliance - Key Points.mp4
16:16
More details
User Reviews
Rating
average 0
Focused display

ITProTV
View courses ITProTVWe created ITProTV [ITPro] because it is the IT training we wanted to have ourselves — engaging, conversational, affordable, and convenient.
- language english
- Training sessions 73
- duration 26:20:36
- Release Date 2024/04/26