Home > Store

CompTIA Advanced Security Practitioner (CASP) CAS-003 Complete Video Course and Practice Test

Register your product to gain access to bonus material or receive a coupon.

CompTIA Advanced Security Practitioner (CASP) CAS-003 Complete Video Course and Practice Test

Premium Edition Video

  • Your Price: $239.99
  • List Price: $299.99
  • About this video
  • The Premium Edition Video is a digital-only certification preparation product combining a video course with enhanced Pearson IT Certification Practice Tests.

    Your purchase will deliver:

    • Link to download the enhanced Pearson IT Certification Practice Test exam engine
    • Access code for question database
    • Access to the streaming video through your Account page after purchase
Try a free sample of this Complete Video Course

Description

  • Copyright 2018
  • Edition: 1st
  • Premium Edition Video
  • ISBN-10: 0-13-485562-0
  • ISBN-13: 978-0-13-485562-2

18+ Hours of Video Instruction

More than 18 hours of video instruction to prepare you for the new CASP CAS-003 exam.

Overview
The CompTIA Advanced Security Practitioner (CASP) CAS-003 Complete Video Course is an engaging, self-paced video training solution that provides learners with 18 hours of personal, visual instruction from expert trainer Michael J. Shannon. Through the use of topic-focused instructional videos, you will gain an in-depth understanding of each objective in the CompTIA CASP CAS-300 exam as well as a deeper understanding of advanced security principles.


This title covers every key topic in the exam, including risk management, enterprise security architecture, enterprise security operations, technical integration of enterprise security, research, development, and collaboration. Michael Shannon also includes demos throughout the training so you can see first hand how to approach real-world security problems. This is the perfect training solution to learn all of the advanced security topics that appear on the test and real security knowledge and skills to help you do your work as a security practitioner. Full of live trainer discussions, hands-on demos, lightboard elaborations, and deep-dive discussions, this course covers security in a way that is easy to access and even fun.

In addition to covering every objective in the CompTIA CASP CAS-003 exam this title includes a full practice exam, module quizzes so you can test yourself throughout your training, and hands-on performance-based exercises so you have everything you need.



Skill Level
CompTIA requires that anyone taking the CASP exam have 10 years of experience in IT administration, including at least 5 years of hands-on technical security experience.

 
Learn How To
* Integrate network and security components, concepts, and architectures
* Integrate security controls for host devices
* Integrate controls for mobile and small form factor devices
* Select software security controls
* Conduct security assessments
* Select the proper security assessment tools
* Implement incident response and recovery
* Integrate hosts, storage, and applications in the enterprise
* Integrate cloud and virtualization technologies in the enterprise
* Integrate and troubleshoot advanced AAA technologies
* Implement cryptographic techniques
* Secure communication and collaboration solutions
* Apply research methods for trend and impact analysis
* Implement security activities across the technology lifecycle
* Interact across diverse business units


Who Should Take This Course
* IT security professionals who have a minimum of 10 years of experience in IT administration, including at least 5 years of hands-on technical security experience
* Systems/network/application security professionals who are preparing for the CASP exam
* Any IT professional who wants to gain an advanced understanding of how to secure modern enterprises beyond the Security+ or SSCP certifications


Course Requirements
Recommended prerequisites: CompTIA Network+, Security+, CSA+, or equivalent experience


Lesson descriptions
Lesson 1, "Business and Industry Influences and Risks," covers risk management of new products, new technologies, and user behaviors as well as risks involved with new or changing business models and strategies.

Lesson 2, "Organizational Security Privacy Policies and Procedures," explores advanced organizational security and privacy policies.

Lesson 3, "Risk Mitigation Strategies and Controls," delves into advanced decisions based on confidentiality, integrity, and availability along with system-specific risk worst-case scenario analysis.

Lesson 4, "Risk Metric Scenarios for Enterprise Security," presents risk metric scenarios for enterprise security.

Lesson 5, "Integrating Network and Security Components, Concepts, and Architectures," reviews physical and virtual network and security devices along with application and protocol-aware technologies.

Lesson 6, "Integrating Security Controls for Host Devices," reviews trusted operating systems and endpoint security software.

Lesson 7, "Integrating Controls for Mobile and Small Form Factor Devices," covers enterprise mobility management, security implications, and privacy concerns of a wide array of mobile and cloud-connected devices, plus a survey of wearable technology.

Lesson 8, "Selecting Software Security Controls," examines application security design considerations along with specific application issues.

Lesson 9, "Conducting Security Assessments," examines a wide number of security assessments and types, including reconnaissance, fingerprinting, white-black-and-gray box testing as well as red and blue team penetration testing.

Lesson 10, "Selecting the Proper Security Assessment Tools," reviews network tool types like various scanners and host tool types, such as file integrity monitoring and log analysis tools along with physical security tools.

Lesson 11, "Implementing Incident Response and Recovery," covers e-discovery and data breaches along with facilitating incident detection and response.

Lesson 12, "Integrating Hosts, Storage, and Applications in the Enterprise," shows the concepts of adapting data flow security to meet changing business needs and different types of standards.

Lesson 13, "Integrating Cloud and Virtualization Technologies in the Enterprise," examines technical deployment models like outsourcing/insourcing/managed services/and partnership.

Lesson 14, "Integrating and Troubleshooting Advanced AAA Technologies," covers the topics of authentication and authorization, attestation, identity proofing and propagation, federations, and trust models.

Lesson 15, "Implementing Cryptographic Techniques," explores advanced cryptographic techniques such as digital signatures, code signing, and perfect forward secrecy.

Lesson 16, "Secure Communication and Collaboration Solutions," covers remote access and unified collaboration tools, unified communication, presence, telephony and VOIP integration, and social media.

Lesson 17, "Applying Research Methods for Trend and Impact Analysis," looks at performing ongoing research, threat intelligence investigation, researching security implications of emerging business tools, and global information assurance industry and communities.

Lesson 18, "Implementing Security Activities Across the Technology Life Cycle," reviews the systems development life cycle and software development life cycle.

Lesson 19, "Interacting Across Diverse Business Units," interprets security requirements and goals to communicate with stakeholders from other disciplines, such as sales staff, HR, and legal.


About Pearson Video Training
Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Prentice Hall, Sams, and Que Topics include IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
 

Sample Content

Table of Contents

Module 1: Risk Management
Lesson 1: Business and Industry Influences and Risks
Lesson 2: Organizational Security Privacy Policies and Procedures
Lesson 3: Risk Mitigation Strategies and Controls
Lesson 4: Risk Metric Scenarios for Enterprise Security
Module 2: Enterprise Security Architecture
Lesson 5: Integrating Network and Security Components, Concepts, and Architectures
Lesson 6: Integrating Security Controls for Host Devices
Lesson 7: Integrating Controls for Mobile and Small Form Factor Devices
Lesson 8: Selecting Software Security Controls
Module 3: Enterprise Security Operations
Lesson 9: Conducting Security Assessments
Lesson 10: Selecting the Proper Security Assessment Tools
Lesson 11: Implementing Incident Response and Recovery
Module 4: Technical Integration of Enterprise Security
Lesson 12: Integrating Hosts, Storage, and Applications in the Enterprise
Lesson 13: Integrating Cloud and Virtualization Technologies in the Enterprise
Lesson 14: Integrating and Troubleshooting Advanced AAA Technologies
Lesson 15: Implementing Cryptographic Techniques
Lesson 16: Secure Communication and Collaboration Solutions
Module 5: Research, Development and Collaboration
Lesson 17: Applying Research Methods for Trend and Impact Analysis
Lesson 18: Implementing Security Activities Across the Technology Life Cycle
Lesson 19: Interacting Across Diverse Business Units
Summary

Updates

Submit Errata

More Information

Unlimited one-month access with your purchase
Free Safari Membership