CompTIA CASP+ (CAS-004)

Video description

Mastering CASP+ Security Architecture and Operations" is an extensive course designed for professionals seeking to deepen their knowledge in advanced security concepts and prepare for the CASP+ exam. The course journey begins with a thorough exploration of Security Architecture, covering crucial topics like network services, segmentation, and Zero Trust models, to build a robust security foundation. As you progress, you'll delve into Security Operations, learning to manage threats, vulnerabilities, and incident responses effectively.

The course then transitions into Security Engineering and Cryptography, where you'll learn about managed configurations, deployment scenarios, and hardening techniques. This section also covers cryptographic protocols, offering insights into PKI, hashing, and asymmetric algorithms. The Governance, Risk, and Compliance module further enriches your understanding by diving into risk assessments, vendor management, legal considerations, and disaster recovery planning.

Throughout this journey, you'll engage in practical scenarios and discussions, synthesizing theory and application. This course not only prepares you for the CASP+ exam but also equips you with skills transferrable to real-world IT security challenges.

What you will learn

  • Analyze and implement secure network architectures.
  • Synthesize threat management strategies.
  • Apply vulnerability assessment methods and tools.
  • Execute effective incident response and forensic analysis.
  • Configure and deploy secure cloud technologies.
  • Implement and troubleshoot cryptographic solutions.

Audience

This course is ideal for IT professionals, security analysts, network administrators, and anyone preparing for the CASP+ certification. It is suited for those looking to deepen their understanding of cybersecurity, improve their risk management skills, and stay updated with the latest in compliance and security architecture.

About the Authors

ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step.

Adam Gordon: Adam Gordon, our edutainer, brings over three decades of IT instruction experience in both private and public sectors. With a remarkable record of holding more than 160 IT certifications, he has played a pivotal role in training thousands of IT professionals throughout his illustrious career.

Mike Rodrick: Mike Rodrick, the host, boasts over 15 years of expertise in IT instruction. His journey includes a decade as a Microsoft Certified Trainer, and he joined the ITProTV Edutainer team in 2014. Mike's certifications include GIAC Security Essentials; Azure Fundamentals; Microsoft 365 Fundamentals; Cybersec First Responder; CompTIA ITF+, A+, Network+, Security+, Project+; MCP; MCT; MCDST; MCITP; MCTS; MCSA; MCSE; MCDBA; Certified Ethical Hacker; Certified Wireless Administrator; Certified Internet Web Professional.

Table of contents

  1. Chapter 1 : Security Architecture
    1. Overview
    2. Services – Discussion
    3. Segmentation – Discussion
    4. Services Segmentation – Scenarios
    5. Deperimeterization/Zero Trust
    6. Merging of Networks
    7. Software-defined Networking (SDN)
    8. Infrastructure Design – Discussion
    9. Infrastructure Design – Scenarios
    10. Baselines Templates Software Assurance
    11. Integrating Enterprise Applications
    12. Security in the Development Lifecycle
    13. Securing Enterprise Architecture
    14. Authentication Authorization – Discussion
    15. Authentication Authorization – Scenarios
    16. Secure Cloud Virtualization
    17. Cryptography PKI
    18. Impact of Emerging Technologies
    19. Security Architecture - Key Points
  2. Chapter 2 : Security Operations
    1. Perform Threat Management
    2. Indicators of Compromise Response
    3. Vulnerability Management Activities
    4. Vulnerability Assessment - Methods Tools
    5. Analyze Vulnerabilities – Vulnerabilities
    6. Analyze Vulnerabilities - Vulnerable Systems
    7. Analyze Vulnerabilities – Attacks
    8. Use Processes to Reduce Risk
    9. Triage Incident Response
    10. Forensic Concepts
    11. File Carving Binary Analysis
    12. Analysis Tools
    13. Live Collection Tools
    14. Security Operations - Key Points
  3. Chapter 3 : Security Engineering and Cryptography
    1. Managed Configurations
    2. Deployment Scenarios
    3. Security Considerations
    4. Hardening Techniques
    5. Processes
    6. Mandatory Access Control
    7. Trustworthy Computing
    8. Compensating Controls
    9. Security Considerations – Embedded
    10. Security Considerations - ICS-SCADA
    11. Security Considerations – Protocols
    12. Security Considerations – Sectors
    13. Cloud Technology – Basics
    14. Cloud Technology - Advanced
    15. PKI – Basics
    16. PKI – Advanced
    17. Hashing Symmetric Algorithms
    18. Asymmetric Algorithms Protocols
    19. Troubleshoot Cryptography – Keys
    20. Security Engineering Cryptography - Key Points
    21. Troubleshoot Cryptography – Misconfigurations
  4. Chapter 4 : Governance, Risk, and Compliance
    1. Risk Assessment
    2. Risk Handling Techniques
    3. Risk Types
    4. Risk Management Life Cycle
    5. Risk Tracking
    6. Policies and Security Practices
    7. Shared Responsibility Model – Cloud
    8. Performing Vendor Assessments
    9. Technical Considerations
    10. Data Considerations
    11. Regulations Accreditations Standards
    12. Legal Considerations
    13. Contract and Agreement Types
    14. Business Impact Analysis (BIA)
    15. Privacy Impact Assessment
    16. Disaster Recovery Business Continuity Planning
    17. Incident Response Plan
    18. Testing Plans
    19. Governance, Risk Compliance - Key Points

Product information

  • Title: CompTIA CASP+ (CAS-004)
  • Author(s): ACI Learning, Adam Gordon, Mike Rodrick
  • Release date: December 2023
  • Publisher(s): Packt Publishing
  • ISBN: 9781835887349