Font size:

Advanced Security Practitioner Certification (CASP) is designed to provide students with an explanation and understanding of conceptualization of security topics as well as theoretical instruction/demonstrations in designing and engineering security solutions.

This training course prepares students for the CompTIA exam CAS-001. The CompTIA Advanced Security Practitioner (CASP) certification was developed in response to important industry demands such as a need for greater in-depth security knowledge, as well as practical security knowledge.

Benefits
  • Learn how to secure your network systems
  • Learn the concepts related to advanced security practices
  • Learn what authentication is, what the different authentication options are, and how to implement them in an environment
Session 1
  • Section A: Introduction
    • Security
    • Security Careers
    • CASP Certification
    • Knowledge Domains
    • CASP Prerequisites
    • Tools and Principles
  • Section B: Security Principles
    • CIA
    • Confidentiality
    • Integrity
    • Availability
    • AAA
    • Least Privilege
    • Defense in Depth
  • Section C: Security and the Enterprise
    • Security Interpretation
    • Interpreting Terminology
    • Requirements and Goals
    • Providing Guidance
  • Section D: Security Disciplines
    • Disciplines
    • Programmer
    • Database Administrator
    • Network Administrator
    • Management
    • Stakeholders
    • Additional Disciplines
  • Section E: Security and Change
    • Change Management
    • Security Concerns
    • Mergers and Integrations
    • Design Considerations
    • De-Merger Considerations
    • Network Segmentation
    • Merging Third Party Software
  • Section F: Technology Life Cycles
    • The SDLC
    • SDLC Visualized
    • SDLC Simplified
    • SRTM
    • SDLC Management
Session 2
  • Section A: Cryptography Essentials
    • Cryptography Defined
    • Steganography
    • Simple Encryption
    • Cryptography Concepts
    • Uses of Cryptography
    • Types of Encryption
    • Popular Encryption Applications
    • Implementing Encryption
  • Section B: Cryptographic Methods
    • Hashing
    • Digital Signatures
    • Code Signing
    • Non-Repudiation
    • Transport Encryption
  • Section C: Advanced Encryption
    • Entropy
    • Pseudo Random Numbers
    • Perfect Forward Secrecy
    • Confusion and Diffusion
    • Exclusive OR
    • Symmetric Encryption
    • Symmetric Algorithms
  • Section D: Public Key Infrastructure Essentials
    • Asymmetric Encryption
    • Public Key Cryptography
    • Certificates
    • Public Key Infrastructure
    • PKI Applications
  • Section E: Advanced PKI Concepts
    • OCSP and CRL
    • Certificate Issuance
    • Certificate Owners
    • Wildcard Certificates
  • Section F: Implementing a PKI
    • Installing AD CS
    • Configuring the Setup
    • Setup Type
    • CA Type
    • Private Key
    • Certificate Database
    • Request New Certificate
    • Updating Revocation List
    • Update PKI Properties
  • Section G: Encrypting Files/Drives
    • Using EFS
    • FEK
    • Backing Up EFS
    • Recovery Agents
    • BitLocker
Session 3
  • Section A: Authentication Essentials
    • Authentication
    • Weak Authentication Methods
    • Strong Authentication Methods
    • Authentication Credentials
    • Passwords and Human Nature
    • Password Cracking Methods
    • Choosing Secure Passwords
    • Authentication Systems
    • Credential Storage Options
    • Password Cracking Prevention
  • Section B: Advanced Authentication Tools
    • Single Sign-On
    • Federated Authentication
    • SOAP
    • XACML
    • SPML
    • Certificate-Based Authentication
    • Attestation
    • Driver Signing Information
  • Section C: Implementing Authentication
    • VMware Appliances
    • User-Specific Settings
    • Group Policy Settings
    • Account Lockout Settings
  • Section D: Host-Based Security
    • Viruses
    • Worms
    • Types of Viruses
    • Indications of Viral Infection
      Virus Phases
    • Trojans Defined
    • Malware Solutions
    • Host Hardening
    • Additional Host Controls
  • Section E: Storage Solutions
    • Storage Security
    • Secure Storage Management
    • RAID Levels
    • Snapshot
Session 4
  • Section A: Virtualization

    • Virtualization Methods
    • Virtualization Solutions
    • VDI
    • Virtualization Pros and Cons
  • Section B: Implementing Virtualization
    • Virtualization Vulnerabilities
    • Securing Virtual Infrastructures
    • Elastic Clouds
    • VMware Workstation
    • Creating a VM
    • Configuring a VM
  • Section C: VLAN Essentials
    • VLANs
    • VLAN Example
    • VLAN Tagging
    • VLAN Trunk Example
    • VLAN Trunking Protocol
    • VLAN Requirements
    • Network Segmentation
    • Flat Networks
    • Network Segmentation Example
    • Hierarchical Network Model
    • Access Layer Details
    • Distribution Layer Details
    • Core Layer Details
    • Hierarchical Design Example
  • Section D: Implementing VLANs
    • VLANs/Physical Design
    • VLAN Planning
    • Creating a VLAN on a Cisco Switch
  • Section E: Communication/Collaboration
    • VoIP
    • Analog to Digital
    • Sampling
    • Voice into Packets and Back
    • VoIP Implementation
    • VoIP Security
    • Unified Communications Security
    • Mobile Device Security
    • Collaboration Platforms
  • Section F: Securing Remote Communications
    • External Communications
    • Remote Access Solutions
    • Setting up Remote Access
  • Section G: Application Security Essentials
    • Web Applications
    • Web App Implementations
    • Web App Hacking Objectives
    • Anatomy of an Attack
    • Web App Threats
    • Cross-Site Scripting
    • Web App Attack Prevention
    • Specific Application Issues
    • Memory Attacks
Session 5
  • Section A: Application Security Solutions
    • Application Sandboxing
    • Security Framework
    • Fuzzing
    • Web Sessions
    • Web Processing
    • Webshag
  • Section B: Security by Design
    • Secure Design Considerations
    • IPv6
    • IPv6 Addressing
    • SCADA
    • Secure Data Flow
    • Network Design
    • Service Planning
  • Section C: Service Security
    • Secure DNS
    • Secure Directory Services
    • Secure Network Devices
    • Configuring Services
    • Configure Router Security
  • Section D: Security Assessment Methods
    • Vulnerability Assessment
    • Penetration Testing
    • Fingerprinting
    • Code Review
    • Social Engineering
    • Example Attacks
    • Dumpster Diving
    • Shoulder Surfing
    • Eavesdropping
    • Inside and Outside Attacks
    • Reverse Social Engineering
  • Section E: Network Scanning
    • Scanning Tools
    • Angry IP Scanner
    • Nmap/Zenmap
Session 6
  • Section A: Network Analysis
    • Analysis Tools
    • Wireshark
    • Advanced Assessment Tools
  • Secti
Register Now
Advanced Security Practitioner Certification (CASP) Online course
  • Course ID:
    260376
  • Duration:
    n/a
  • Price:
    $670