Font size:

CompTIA CASP CAS-002 video collection

200 videos    $99.00
Title Author Info
Active Directory 2 minutes
ActiveX Dan LaChance 4 minutes
Advanced Authentication 3 minutes
Advanced Authorization 4 minutes
Advanced Configuration of Network Devices Glen E. Clarke 7 minutes
Assessment; Sandboxing; and Debugging Steven Crawford 6 minutes
Asset Control & Data Ownership and Handling 4 minutes
Attestation and Identity Propagation 2 minutes
Auditing and Continuous Monitoring 3 minutes
Baselining of Networking and Security Components Glen E. Clarke 6 minutes
Benchmarks and Baselines Steven Crawford 4 minutes
Best Practices & New Technologies for Security Systems Steven Crawford 8 minutes
BIOS and Unified Extensible Firmware Interface Glen E. Clarke 3 minutes
Black Box; White Box; and Gray Box Testing Steven Crawford 4 minutes
Building Automation; Physical; and Industrial Controls Glen E. Clarke 3 minutes
Business Continuity Planning Glen E. Clarke 14 minutes
Chain of Trust and Root of Trust Steven Crawford 4 minutes
Change Management; Operations; and Maintenance Dan LaChance 2 minutes
CIA Aggregate Scores Glen E. Clarke 7 minutes
CIA Decisions; Requirements; and Policies Glen E. Clarke 4 minutes
Clickjacking Dan LaChance 2 minutes
Client-Side Attacks; Vulnerabilities; and Threats Steven Crawford 3 minutes
Client-Side Processing vs. Server-Side Processing Dan LaChance 3 minutes
Cloud and Virtualization Considerations and Options 2 minutes
Cloud Managed Networks Glen E. Clarke 4 minutes
Code Signing and Digital Signatures Steven Crawford 3 minutes
Collaboration and Guidance Dan LaChance 2 minutes
Collaboration Sites Dan LaChance 2 minutes
Command Shell Restrictions Glen E. Clarke 3 minutes
Commissioning; Reuse; and Disposal Dan LaChance 2 minutes
Complex Network Security Solutions for Data Flow Glen E. Clarke 3 minutes
Computer Emergency Response Team Steven Crawford 5 minutes
Conferencing and Messaging Solutions Dan LaChance 4 minutes
Continuity of Operation Plan 2 minutes
Continuous Improvement and Monitoring Glen E. Clarke 2 minutes
Conventions; Threat Actors; & Threat Intelligence Steven Crawford 9 minutes
CRM; ERP; and GRC 2 minutes
Cross-Site Request Forgery Dan LaChance 2 minutes
Cross-Site Scripting Dan LaChance 2 minutes
Cryptographic Applications Implementations and Key Escrow Steven Crawford 4 minutes
Data Aggregation and Isolation 1 minutes
Data Loss Prevention and Patch Management Glen E. Clarke 7 minutes
Data Recovery and Reconstitution 4 minutes
Data Retention; Legal Holds; and Data Recovery 6 minutes
Data Warehousing and Archiving Steven Crawford 6 minutes
Database Activity Monitor Glen E. Clarke 2 minutes
Database and Network Administrators Dan LaChance 2 minutes
Dedicated Interfaces and Out-of-Band NICs Glen E. Clarke 5 minutes
Deduplication and Dynamic Disk Pools Steven Crawford 3 minutes
Desktop Sharing; Remote Assistance; and Presence Dan LaChance 3 minutes
Detection and Collection 4 minutes
Device Tracking Technologies Dan LaChance 3 minutes
DNS; CMDB; and CMS 4 minutes
DRM; Watermarking; and GPG Steven Crawford 4 minutes
Encryption Types Dan LaChance 4 minutes
Endpoint Security Software Glen E. Clarke 6 minutes
End-User Cloud Storage and Business Integration Steven Crawford 7 minutes
Entropy; Diffusion; and Confusion Steven Crawford 2 minutes
Error & Exception Handling and Privilege Escalation Dan LaChance 4 minutes
ESB; SOA; and Directory Services 3 minutes
Existing Security Controls Steven Crawford 4 minutes
Exploitation Tools Steven Crawford 5 minutes
Extreme Planning and Worst Case Scenarios Glen E. Clarke 2 minutes
Facilities and Physical Security Managers Dan LaChance 2 minutes
Federation 3 minutes
Forensic Analysis of a Compromised System 6 minutes
Fuzzing and Fault Injection Dan LaChance 2 minutes
Hash Matching in Cloud Environments Glen E. Clarke 5 minutes
Host Based Firewalls and Log Monitoring Glen E. Clarke 6 minutes
HTML5 Dan LaChance 3 minutes
Human Resources and Emergency Response Dan LaChance 1 minutes
HVAC Controllers and Sensors Glen E. Clarke 3 minutes
IA; ISA; MOU; and SLA 2 minutes
Impact of De-Perimeterization Glen E. Clarke 7 minutes
Implications of Cryptographic Methods and Design Steven Crawford 7 minutes
Incident Response and Forensic Tasks 7 minutes
Industry-Accepted Application Security Frameworks Dan LaChance 2 minutes
INE; SIEM; and HSM Glen E. Clarke 2 minutes
Reconnaissance; Fingerprinting; and Social Engineering Steven Crawford 6 minutes
Strength vs. Performance vs. Feasibility to Implement vs. Interoperability Steven Crawford 2 minutes
System Specific Risk Analysis Glen E. Clarke 6 minutes
System; Audit; and Review Logs 5 minutes
Telephony Dan LaChance 4 minutes
Testing and Agile; Waterfall; and Spiral Methodologies Dan LaChance 3 minutes
The CIA Triad and Non-Repudiation Steven Crawford 5 minutes
The Virtual Desktop Infrastructure Glen E. Clarke 3 minutes
Third Party Information Security Glen E. Clarke 2 minutes
TPM; VTPM; and HSM Glen E. Clarke 2 minutes
Training and Awareness and Employment Termination 5 minutes
Transport and Data at Rest Encryption Steven Crawford 2 minutes
Transport Encryption Glen E. Clarke 8 minutes
Trend Data and Cyber Defense Steven Crawford 3 minutes
Trusted OS Glen E. Clarke 4 minutes
Unified Threat Management Glen E. Clarke 2 minutes
Usability; Maintainability; Availability; and Recovery Steven Crawford 3 minutes
User Policies Dan LaChance 2 minutes
Virtual and Cloud Storage Steven Crawford 4 minutes
VM Escape Glen E. Clarke 2 minutes
NAS; SAN; and vSAN Steven Crawford 4 minutes
Network Access Control Glen E. Clarke 4 minutes
Network Analysis Tools Steven Crawford 12 minutes
Network Authentication Methods and 802.1x Glen E. Clarke 8 minutes
Network Management and Monitoring Tools Glen E. Clarke 4 minutes
Network Secure Segmentation and Delegation 3 minutes
Networking and Security Components Glen E. Clarke 14 minutes
NIPS and NIDS Glen E. Clarke 4 minutes
Object Tracking and Containment Technologies Dan LaChance 2 minutes
OLA; NDA; and BPA 4 minutes
Order of Volatility 2 minutes
Over-the-Air Technologies Dan LaChance 3 minutes
Passive Reconnaissance and Intelligence Gathering Tools Steven Crawford 4 minutes
Performance; Latency; Scalability; and Capability Steven Crawford 2 minutes
Peripheral Restrictions Dan LaChance 4 minutes
Policies; Processes; and Procedures for Change 3 minutes
Privacy Principles and PII 2 minutes
Privilege Elevation and Data Remnants Glen E. Clarke 5 minutes
Prototypes and Testing Steven Crawford 3 minutes
Pseudo Number Generation and Perfect Forward Secrecy Steven Crawford 2 minutes
RA; SOA; and BIA 2 minutes
Race Conditions; Resource Exhaustion; and Geo-Tagging Dan LaChance 5 minutes
RADIUS 2 minutes
Remote Desktop Protocol and Virtual Network Computing Glen E. Clarke 5 minutes
Remote Desktop Services and App-V   Glen E. Clarke 3 minutes
Resources Provisioning and De-Provisioning 2 minutes
Response and Disclosure 3 minutes
Return on Investment and Total Cost of Ownership Glen E. Clarke 2 minutes
Reverse Engineering Solutions Steven Crawford 3 minutes
RFPs; RFQs; FRIs; and Agreements Steven Crawford 3 minutes
Risk Appetite Strategies Glen E. Clarke 4 minutes
Risk Management Processes Glen E. Clarke 5 minutes
Sales Staff and Programmers Dan LaChance 2 minutes
Sandboxing and Content Filtering in Cloud Environments Glen E. Clarke 5 minutes
SCADA and Industrial Control Systems Glen E. Clarke 1 minutes
Secure Boot and Measured Launch Glen E. Clarke 3 minutes
Secure Coding Standards Dan LaChance 2 minutes
Secure Data Flows to Meet Changing Business Needs Dan LaChance 2 minutes
Secure Infrastructure Design 3 minutes
Secure Use of On-demand Cloud Computing 2 minutes
Securing Virtual Environments 3 minutes
Securing Virtualized Servers Dan LaChance 3 minutes
Security Concerns of Integrating Diverse Industries Glen E. Clarke 4 minutes
Security Group Policy Implementations Glen E. Clarke 9 minutes
Security Requirements Traceability Matrix Dan LaChance 2 minutes
Security Zones Glen E. Clarke 6 minutes
Session Management and Input Validation Dan LaChance 5 minutes
Snapshots Steven Crawford 3 minutes
Software-Defined Network Glen E. Clarke 2 minutes
SQL Injection Dan LaChance 4 minutes
SSL; SSH; S/MIME Steven Crawford 9 minutes
Standard Operating Environment Configuration Baselines Glen E. Clarke 3 minutes
Steganography Steven Crawford 2 minutes
Storage Integration 2 minutes
Storage of Sensitive Data Dan LaChance 3 minutes
Vulnerabilities Associated with Virtual Machines 2 minutes
Web and NextGen Firewalls Glen E. Clarke 4 minutes
Web Application Security Design Considerations Dan LaChance 3 minutes
Web Services Security Dan Lachance 3 minutes
Wild Cards; OCSP; and CRL Steven Crawford 2 minutes
Zero Day Mitigation and Emergent Threats Steven Crawford 2 minutes
Information Classification Glen E. Clarke 5 minutes
Insecure Direct Object References   Dan LaChance 2 minutes
Integrity Measurement Architecture Glen E. Clarke 2 minutes
Internal and External Influences Glen E. Clarke 7 minutes
Internal and External Violations 5 minutes
Interoperability Issues 2 minutes
IP Video and A/V Controls Glen E. Clarke 2 minutes
IPv6 and Associated Transitional Technologies   Glen E. Clarke 12 minutes
iSCSI and FCoE Steven Crawford 3 minutes
Issuance and Object Support Steven Crawford 3 minutes
IT Governance Glen E. Clarke 3 minutes
Java Applets Dan LaChance 4 minutes
JavaScript and State Management Dan LaChance 3 minutes
Judgment Calls Steven Crawford 5 minutes
Key Stretching and Hashing Steven Crawford 6 minutes
Legal Compliance and Advocacy 2 minutes
Lessons Learned and After-Action Reports Steven Crawford 3 minutes
Lightweight Direct Access Protocol 2 minutes
Likelihood of Threat Glen E. Clarke 3 minutes
Live VM Migration Glen E. Clarke 3 minutes
Logical and Physical Deployment Diagrams 2 minutes
LUN Masking and HBA Allocation Steven Crawford 3 minutes
Magnitude of Impact Glen E. Clarke 13 minutes
Management and Data Interfaces Glen E. Clarke 5 minutes
Management and Finance Dan LaChance 2 minutes
Memory Leaks & Buffer and Integer Overflows Dan LaChance 3 minutes
Mergers; Acquisitions; and Divestitures 3 minutes
Mesh Networks Glen E. Clarke 4 minutes
Metrics Collection and Analysis Steven Crawford 5 minutes
Mitigation 4 minutes
Multipath and Offsite or Multisite Replication Steven Crawford 3 minutes
SOAP Dan LaChance 2 minutes
Virtual Private Networks Glen E. Clarke 10 minutes
Access Control Lists Glen E. Clarke 3 minutes
Standards Dan LaChance 2 minutes
NFS and CIFS Steven Crawford 3 minutes
AJAX Dan LaChance 3 minutes
Flash Dan LaChance 3 minutes
Risk Management Glen E. Clarke 5 minutes
Chain of Custody 2 minutes
Penetration Testing Steven Crawford 7 minutes
Register Now
CompTIA CASP CAS-002 video collection
  • Course ID:
    262965
  • Duration:
    n/a
  • Price:
    $99