Description
This CompTIA Advanced Security Practitioner (CASP) – Video Training Course establishes knowledgeable professionals in the field of advanced security practices. At first, you will learn about enterprise security architecture, security technology, and resource technology. Then you will learn security design and solutions, application security design, managing risk, security policies, security procedures, and enterprise security integration. Finally, you will learn about security research and analysis, disaster recovery and business continuity, managing risk in projects, legal issues and judgment and decision-making. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers. This course will prepare you to pass the exam CompTIA Advanced Security Practitioner (CASP). So, if you are interested in getting this course, don’t delay to join now.
Benefits you will get?
- Affordable, engaging & premium-quality e-learning study materials
- Assessment through Tests and Quizzes and instant result
- Internationally recognized accredited qualification
- Access to course content on mobile, tablet or desktop from anywhere anytime
- Personalized learning – Learn at your own pace, time and place
- A vast array of fascinating subjects
- Regularly updated contents
- Dedicated support team working 24/7
Requirements:
- Anyone with any academic background can enroll into this course.
- A device with an active internet connection
Assessment:
We assess our learners through quizzes or multiple choice test. This test will be assessed automatically and immediately to give you an instant result.
Certification:
The PDF copy of Certificate of Completion can be claimed at the free of cost. If you need a hardcopy of this certificate, you have to pay an additional payment. The time for PDF certificate turnaround is 24 hours, and for the hardcopy, it is 3-7 working days.
Course Curriculum
The Enterprise Security Architecture | |||
The Basics of Enterprise Security | FREE | 01:00:00 | |
The Enterprise Structure | 00:21:00 | ||
Enterprise Security Requirements | 00:09:00 | ||
The Enterprise Security Technology | |||
Common Network Security Components and Technologies | 00:55:00 | ||
Communications and Collaboration Security | 00:40:00 | ||
Cryptographic Tools and Techniques | 00:56:00 | ||
Advanced Authentication | 00:14:00 | ||
Enterprise Resource Technology | |||
Enterprise Storage Security Issues | 01:18:00 | ||
Distributed, Shared, and Virtualized Computing | 00:26:00 | ||
Cloud Computing and Security | 00:10:00 | ||
Security Design and Solutions | |||
Network Security Design | 02:22:00 | ||
Conduct a Security Assessment | 00:55:00 | ||
Host Security | 01:19:00 | ||
Managing Risk in Projects | |||
Create a Risk Management Plan | 01:15:00 | ||
Identify Risks and Their Causes | 00:11:00 | ||
Analyze Risks | 00:19:00 | ||
Develop a Risk Response Plan | 00:07:00 | ||
Integrating Advanced Authentication and Authorization Techniques | |||
Implement Authentication | 00:19:00 | ||
Implement Advanced | 00:07:00 | ||
Implementing Cryptographic Techniques | |||
Describe Cryptographic Concepts | 00:19:00 | ||
Choose Cryptographic Techniques | 00:31:00 | ||
Choose Cryptographic Implementation | 00:07:00 | ||
Integrating Hosts, Storage, Networks, and Apps in a Secure Enterprise Architecture | |||
Implement Security Standards in the Enterprise | 00:13:00 | ||
Select Technical Deployment Models | 00:28:00 | ||
The Enterprise Structure | 00:21:00 | ||
Secure Enterprise Application Integration Enablers | 00:21:00 | ||
Security Research and Analysis | |||
Perform an Industry Trends and Impact Analysis | 00:41:00 | ||
Perform an Enterprise Security Analysis | 00:26:00 | ||
Disaster Recovery and Business Continuity | |||
BCP Fundamentals | 00:21:00 | ||
BCP Implementation | 00:10:00 | ||
DRP Fundamentals | 00:18:00 | ||
DRP Implementation | 00:03:00 | ||
Responding to and Recovering from Incidents | |||
Design Systems to Facilitate Incident Response | 00:14:00 | ||
Conduct Incident and Emergency Responses | 00:20:00 | ||
Legal Issues | |||
Computer Crime Laws and Regulations | 00:16:00 | ||
Computer Crime Incident Response | 00:17:00 | ||
Judgment and Decision-Making | |||
Develop Critical Thinking Skills | 00:12:00 | ||
Determine the Root of a Problem | 00:06:00 | ||
Use Judgment to Make Sound Decisions | 00:18:00 |
Course Reviews
No Reviews found for this course.