Video description
Mastering CASP+ Security Architecture and Operations" is an extensive course designed for professionals seeking to deepen their knowledge in advanced security concepts and prepare for the CASP+ exam. The course journey begins with a thorough exploration of Security Architecture, covering crucial topics like network services, segmentation, and Zero Trust models, to build a robust security foundation. As you progress, you'll delve into Security Operations, learning to manage threats, vulnerabilities, and incident responses effectively.
The course then transitions into Security Engineering and Cryptography, where you'll learn about managed configurations, deployment scenarios, and hardening techniques. This section also covers cryptographic protocols, offering insights into PKI, hashing, and asymmetric algorithms. The Governance, Risk, and Compliance module further enriches your understanding by diving into risk assessments, vendor management, legal considerations, and disaster recovery planning.
Throughout this journey, you'll engage in practical scenarios and discussions, synthesizing theory and application. This course not only prepares you for the CASP+ exam but also equips you with skills transferrable to real-world IT security challenges.
What you will learn
- Analyze and implement secure network architectures.
- Synthesize threat management strategies.
- Apply vulnerability assessment methods and tools.
- Execute effective incident response and forensic analysis.
- Configure and deploy secure cloud technologies.
- Implement and troubleshoot cryptographic solutions.
Audience
This course is ideal for IT professionals, security analysts, network administrators, and anyone preparing for the CASP+ certification. It is suited for those looking to deepen their understanding of cybersecurity, improve their risk management skills, and stay updated with the latest in compliance and security architecture.
About the Authors
ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step.
Adam Gordon: Adam Gordon, our edutainer, brings over three decades of IT instruction experience in both private and public sectors. With a remarkable record of holding more than 160 IT certifications, he has played a pivotal role in training thousands of IT professionals throughout his illustrious career.
Mike Rodrick: Mike Rodrick, the host, boasts over 15 years of expertise in IT instruction. His journey includes a decade as a Microsoft Certified Trainer, and he joined the ITProTV Edutainer team in 2014. Mike's certifications include GIAC Security Essentials; Azure Fundamentals; Microsoft 365 Fundamentals; Cybersec First Responder; CompTIA ITF+, A+, Network+, Security+, Project+; MCP; MCT; MCDST; MCITP; MCTS; MCSA; MCSE; MCDBA; Certified Ethical Hacker; Certified Wireless Administrator; Certified Internet Web Professional.
Table of contents
-
Chapter 1 : Security Architecture
- Overview
- Services – Discussion
- Segmentation – Discussion
- Services Segmentation – Scenarios
- Deperimeterization/Zero Trust
- Merging of Networks
- Software-defined Networking (SDN)
- Infrastructure Design – Discussion
- Infrastructure Design – Scenarios
- Baselines Templates Software Assurance
- Integrating Enterprise Applications
- Security in the Development Lifecycle
- Securing Enterprise Architecture
- Authentication Authorization – Discussion
- Authentication Authorization – Scenarios
- Secure Cloud Virtualization
- Cryptography PKI
- Impact of Emerging Technologies
- Security Architecture - Key Points
-
Chapter 2 : Security Operations
- Perform Threat Management
- Indicators of Compromise Response
- Vulnerability Management Activities
- Vulnerability Assessment - Methods Tools
- Analyze Vulnerabilities – Vulnerabilities
- Analyze Vulnerabilities - Vulnerable Systems
- Analyze Vulnerabilities – Attacks
- Use Processes to Reduce Risk
- Triage Incident Response
- Forensic Concepts
- File Carving Binary Analysis
- Analysis Tools
- Live Collection Tools
- Security Operations - Key Points
-
Chapter 3 : Security Engineering and Cryptography
- Managed Configurations
- Deployment Scenarios
- Security Considerations
- Hardening Techniques
- Processes
- Mandatory Access Control
- Trustworthy Computing
- Compensating Controls
- Security Considerations – Embedded
- Security Considerations - ICS-SCADA
- Security Considerations – Protocols
- Security Considerations – Sectors
- Cloud Technology – Basics
- Cloud Technology - Advanced
- PKI – Basics
- PKI – Advanced
- Hashing Symmetric Algorithms
- Asymmetric Algorithms Protocols
- Troubleshoot Cryptography – Keys
- Security Engineering Cryptography - Key Points
- Troubleshoot Cryptography – Misconfigurations
-
Chapter 4 : Governance, Risk, and Compliance
- Risk Assessment
- Risk Handling Techniques
- Risk Types
- Risk Management Life Cycle
- Risk Tracking
- Policies and Security Practices
- Shared Responsibility Model – Cloud
- Performing Vendor Assessments
- Technical Considerations
- Data Considerations
- Regulations Accreditations Standards
- Legal Considerations
- Contract and Agreement Types
- Business Impact Analysis (BIA)
- Privacy Impact Assessment
- Disaster Recovery Business Continuity Planning
- Incident Response Plan
- Testing Plans
- Governance, Risk Compliance - Key Points
Product information
- Title: CompTIA CASP+ (CAS-004)
- Author(s):
- Release date: December 2023
- Publisher(s): Packt Publishing
- ISBN: 9781835887349
You might also like
video
CompTIA Security+ (SY0-701)
This course begins with core cybersecurity concepts, creating a solid base for in-depth security management study. …
video
CompTIA Security+ SY0-701
27+ Hours of Video Instruction Get the edge you need to successfully study for the CompTIA …
video
CompTIA Network+ N10-008
36 Hours of Video Instruction Overview CompTIA Network+ N10-008 Complete Video Course is a comprehensive training …
video
CompTIA Network+ (N10-008)
The course begins by grounding you in the OSI and TCP/IP models, network topologies, and types, …