Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA Advanced Security Practitioner Certification Series (CASP+) with Practice Exam
00 Introduction - Start Here ⬇️
➡️ WHERE TO BEGIN: Recommended Course Order
Did you watch these prerequisites?
01 Analyze Security Requirements
01 Services (39:02)
Exam Tip 01 (2:52)
02 Segmentation (22:43)
Exam Tip 02 (1:59)
03 Deperimeterization (11:14)
Exam Tip 03 (3:10)
04 Merging of Networks (12:00)
05 Software-defined Networking (7:25)
Source Files
02 Analyze Organizational Requirements
01 Scalability (2:53)
Exam Tip 01 (2:58)
02 Resiliency (12:57)
Exam Tip 02 (2:45)
03 Automation (7:10)
04 More Concepts (15:09)
Source Files
03 Integrate Software Applications
01 Baseline and Templates (18:25)
Exam Tip 01 (2:45)
02 Software Assurance (16:53)
Exam Tip 02 (2:48)
03 Considerations of Integrating Enterprise Applications (14:24)
04 Integrating Security into Development Life Cycle (17:16)
Source Files
04 Implement Data Security Techniques
01 Data Loss Prevention (11:00)
Exam Tip 01 (3:07)
02 Data Loss Detection (6:14)
03 Data Classification (2:49)
04 Obfuscation (8:47)
05 Data Life Cycle (8:38)
06 Data Storage (3:08)
Source Files
05 Analyze the Security Requirements for Authentication and Authorizatiion
01 Credential Management (10:10)
Exam Tip 01 (4:17)
02 Password Policies (12:30)
03 Federation (9:21)
04 Access Control (8:48)
05 Protocols (11:14)
06 Multifactor Authentication (5:56)
07 One-time Password (OTP) (15:23)
Source Files
06 Implement Secure Cloud and Virtualization Solutions
01 Virtualization Strategies (10:23)
Exam Tip 01 (3:29)
02 Deployment Models (4:54)
Exam Tip 02 (3:39)
03 Hosting Models (2:07)
04 Service Models (3:09)
05 Cloud Provider Limitations (1:29)
06 Storage Models (12:37)
07 More Concepts (7:37)
Source Files
07 Cryptographic and PKI
01 Cryptographic Concepts (9:53)
Exam Tip 01 (3:19)
02 Common Cryptography Usecases (16:09)
03 PKI Usecases (8:42)
Source Files
08 Impact of Emerging Technologies
01 Emerging Technologies (28:26)
01 Exam Tip (3:37)
02 Homomorphic (12:03)
03 Deep Learning (7:17)
Source Files
09 Perform Threat Management Activities
01 Intelligence Types (12:06)
01 Exam Tip (3:28)
02 Actor Types (15:58)
Source Files
10 Analyze Indicators of Compromise
01 Indicator Of Compromise (14:37)
01 Exam Tip (3:00)
02 Response (4:16)
Source Files
11 Perform Vulnerability Management Activities
01 Vulnerability Scans (4:17)
01 Exam Tip (3:08)
02 Scap (5:05)
03 Self Assessment (4:33)
04 Patch Management (2:05)
05 Information Sources (3:56)
Source Files
12 Use the Appropriate Vulnerability Assessment and Penetration Testing Methods
01 Methods (14:10)
01 Exam Tip (3:02)
02 Tools (17:41)
03 Dependency Management (2:16)
04 Requirements (4:44)
Source Files
13 Analyze Vulnerabilities and Recommend Risk Mitigations
01 Vulnerabilities (19:53)
01 Exam Tip (3:06)
02 Inherently (18:23)
03 Attacks (20:10)
Source Files
14 Use Processes to Reduce Risk
01 Proactive And Detection (4:20)
01 Exam Tip (2:48)
02 Security Data Analytics (3:27)
03 Preventive (3:14)
04 Application Control (4:02)
05 Security Automation (2:02)
06 Physical Security (2:26)
Source Files
15 Implement the Appropriate Response
01 Event Classifications (4:26)
01 Exam Tip (2:41)
02 Incident Response (4:45)
03 Playbooks (4:36)
04 Appropriate Response (2:41)
Source Files
16 Explain the Importance of Forensics Concepts
01 Forensic Process (2:26)
01 Exam Tip (2:57)
02 Integrity Preservation (2:58)
03 Forensic Concepts (4:14)
Source Files
17 Use Forensic Analysis Tools
01 File Carving Tools (2:41)
01 Exam Tip (2:34)
02 Binary Analysis Tools (6:11)
03 Analysis Tools (3:46)
04 Imaging Tools (2:20)
05 Hashing Utilities (2:01)
Source Files
18 Apply Secure Configurations to Enterprise Mobility
01 Managed Configurations (17:22)
01 Exam Tip (2:46)
02 Deployment Scenarios (6:27)
03 Security Considerations (12:03)
Source Files
19 Configure and Implement Endpoint Security Controls
01 Hardening Techniques (13:18)
01 Exam Tip (2:53)
02 Processes (3:26)
03 Mandatory Access Control (3:09)
04 Trustworthy Computing (8:39)
05 Compensating Controls (4:04)
Source Files
20 Explain Security Considerations Impacting Specific Sectors
01 Embedded (4:45)
01 Exam Tip (3:06)
02 SCADA (5:27)
03 Protocols (4:16)
04 Sectors (4:21)
Source Files
21 Explain Cloud Technology Adoption
01 Exam Tip (2:20)
01 Cloud Technology Adoption (24:39)
02 Logs (4:20)
03 Backup And Recovery (3:12)
04 Storage Configurations (1:57)
Source Files
22 Implement the Appropriate PKI Solutions
01 PKI Hierarchy (3:05)
01 Exam Tip (2:49)
02 Certificate Types (3:57)
03 Certificate Usage, Profiles And Templates (5:22)
04 Extensions (1:45)
05 PKI Solutions Concepts (35:33)
Source Files
23 Implement the Appropriate Cryptographic Protocols and Algorithms
01 Hashing (3:56)
01 Exam Tip (2:40)
02 Symmetric Algorithms (4:07)
03 Asymetric Algorithms (2:58)
04 Protocols (2:46)
05 Elliptic Curve Cryptography (5:58)
06 Key Stretching (2:01)
07 Cryptographic Concepts (3:08)
Source Files
24 Troubleshoot Issues with Cryptographic Implementations
01 Implementation And Configuration Issues (22:28)
01 Exam Tip (2:44)
02 Keys (14:15)
Source Files
25 Apply the Appropriate Risk Strategies
01 Risk Assessment (27:48)
01 Exam Tip (2:31)
02 Risk Handling Techniques (3:35)
03 Risk Types (2:27)
04 Risk Management Lifecycle (3:54)
05 Risk Tracking (7:09)
06 Risk Appetite Vs Tolerance (3:26)
07 Policies And Security Practices (6:45)
Source Files
26 Importance of Managing and Mitigating Vendor Risks
01 Shared Responsibility Model (2:33)
01 Exam Tip (2:47)
02 Vendor Viability (2:58)
03 Third-Party Dependencies (4:57)
04 Technical Considerations (1:14)
05 Mitigating Vendor Risks (28:37)
Source Files
27 Explain Compliance Frameworks and Legal Considerations
01 Data Considerations (15:28)
01 Exam Tip (2:46)
02 Geographic Considerations (1:22)
03 Regulations (2:33)
04 Legal Considerations (2:14)
05 Contract And Agreement Types (2:27)
06 Organizational Impacts (4:41)
Source Files
28 Explain the Importance of Business Continuity
01 Business Impact Analysis (5:41)
01 Exam Tip (3:03)
02 Disaster Recovery Plan (5:14)
03 Incident Response Plan (3:07)
04 Testing Plans (14:10)
05 Privacy Impact Assessment (4:36)
Source Files
Test Your Knowledge
Practice Exam
03 Asymetric Algorithms
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock