Autoplay
Autocomplete
HTML5
Flash
Player
Speed
Previous Lecture
Complete and continue
CompTIA Advanced Security Practitioner (CASP) CAS-003
Introduction
CompTIA Security+ SY0-501: Introduction (1:23)
Module 1: Risk Management
Introduction (0:25)
Lesson 1: Business and Industry Influences and Risks
Learning Objectives (0:41)
1.1 Risk Management of New Initiatives (14:28)
1.2 Business and Industry Policies (11:28)
1.3 Internal and External Influences (5:40)
1.4 Impacts of De-perimiterization (3:57)
Lesson 2: Organizational Security Privacy Policies and Procedures
Learning Objectives (0:44)
2.1 Policy and Process Life Cycle Management (4:52)
2.2 Partnering with HR, Legal, and the C-Suite (6:04)
2.3 Common Business Documentation (10:50)
2.4 Security Requirements for Contracts (3:33)
2.5 General Principles for Sensitive Information (9:41)
2.6 Developing Standard Policies and Security Practices (18:28)
Lesson 3: Risk Mitigation Strategies and Controls
Learning Objectives (0:45)
3.1 CIA-based Decisions for the Organization (14:58)
3.2 System-specific Worst-case Analysis (15:24)
3.3 Risk Determination (17:29)
3.4 Translating Risk into Business Terms (13:57)
3.5 Risk Treatment (6:22)
3.6 Risk Management Process: Overview (6:29)
3.7 Risk Management Process: OCTAVE and ISO/IEC 31000:2009 Methodologies (9:10)
3.8 Risk Management Process: Key Terminology (3:15)
3.9 Business Continuity Planning (12:53)
3.10 IT Governance and Frameworks (10:09)
3.11 Enterprise Resilience and Continual Improvement (8:43)
Lesson 4: Risk Metric Scenarios for Enterprise Security
Learning Objectives (0:53)
4.1 Reviewing Control Effectiveness (17:30)
4.2 Reverse Engineering and Deconstruction (6:08)
4.3 Collecting and Analyzing Metrics (9:30)
4.4 Prototypes, Benchmarks, and Baselines (9:32)
4.5 Analyzing Cyber Defense Trends (5:01)
4.6 Analyzing Solution Metrics for Business Needs (13:33)
4.7 Analyzing Solution Metrics for Business Needs: Cisco and Palo Alto Solutions (5:45)
Module 2: Enterprise Security Architecture
Introduction (0:29)
Lesson 5: Integrating Network and Security Components, Concepts, and Architectures
Learning Objectives (0:55)
5.1 Physical and Virtual Network and Security Devices: Switches, Routers, and Firewalls (6:14)
5.2 Physical and Virtual Network and Security Devices: Zone-based Policy Firewall Demo (21:25)
5.3 Application and Protocol-aware Technologies: PAN, WAF, DAM, NIDS/NIPS (15:47)
5.4 Application and Protocol-aware Technologies: WLAN Controllers, UTM, NAP/NAC, SIEM, Load Balancers, HAIPE/INE Devices, HSMs (13:35)
5.5 Advanced Network Design: Cryptographic Solutions (9:40)
5.6 Advanced Network Design: Clientless SSL VPN Demo (16:12)
5.7 Advanced Network Design: Networking Solutions (16:05)
5.8 Complex Solutions for Data Flow (12:15)
5.9 Secure Configuration and SDN (11:17)
5.10 Network Management and Montioring Tools (9:22)
5.11 Advanced Configuration of Infrastucture Devices: Configuration and Zoning (14:22)
5.12 Advanced Configuration of Infrastructure Devices: Routing Protocol Security Exercise (18:45)
5.13 Advanced Configuration of Infrastructure Devices: Network-enabled Service and System Security Concerns (8:12)
Lesson 6: Integrating Security Controls for Host Devices
Learning Objectives (0:32)
6.1 Implementing Trusted O/S (11:25)
6.2 Endpoint Security Software (14:34)
6.3 Hardening Hosts: Administrative Controls (11:38)
6.4 Hardening Hosts: Peripheral Protection (10:56)
6.5 Boot Loader Protections (6:01)
6.6 Terminal Services and Application Delivery Services (7:26)
Lesson 7: Integrating Controls for Mobile and Small Form Factor Devices
Learning Objectives (0:29)
7.1 Enterprise Mobility Management: MDM (7:23)
7.2 Enterprise Mobility Management: MAM (12:06)
7.3 Mobility Security and Privacy Concerns: Data Storage (6:24)
7.4 Mobility Security and Privacy Concerns: Peripherals (16:18)
7.5 Mobility Security and Privacy Concerns: Authentication (6:25)
7.6 Wearable Technology (4:53)
Lesson 8: Selecting Software Security Controls
Learning Objectives (0:37)
8.1 Application Security Design Considerations (1:32)
8.2 Specific Application Issues: Attacks and Exploits (13:13)
8.3 Specific Application Issues: Common Vulnerabilities (9:12)
8.4 Specific Application Issues: Sandboxing and Firewalls (14:01)
8.5 Client-side Processing vs. Server-side Processing (4:07)
8.6 O/S and Firmware Vulnerabilities (6:35)
Module 3 Enterprise Security Operations
Introduction (0:22)
Lesson 9: Conducting Security Assessments
Learning Objectives (0:25)
9.1 Security Assessment Methods: Strategies (12:15)
9.2 Security Assessment Methods: Techniques (10:42)
9.4 Security Assessment Types: Exercises (7:16)
9.3 Security Assessment Types: Testing and Assessment (9:24)
Lesson 10: Selecting the Proper Security Assessment Tools
Learning Objectives (0:26)
10.1 Scanners (5:43)
10.2 Additional Security Assessment Tools: Overview (11:12)
10.3 Additional Security Assessment Tools: Creating a Phishing Campaign (6:51)
10.4 Types of Host Tools: Scanners and Crackers (9:34)
10.5 Types of Host Tools: Monitoring and Analysis (5:32)
10.6 Physical Security Tools (4:27)
Lesson 11: Implementing Incident Response and Recovery
Learning Objectives (0:30)
11.1 E-discovery (5:37)
11.2 Data Breach Procedures (10:59)
11.3 Facilitating Incident Detection and Response (8:22)
11.4 Incident and Emergency Response (11:41)
11.5 Business Continuity and Disaster Recovery (8:02)
11.6 Incident Response Support Tools (15:10)
11.7 Incident or Breach Severity (9:06)
11.8 Post-incident Response (2:29)
Module 4 Technical Integration of Enterprise Security
Introduction (0:34)
Lesson 12: Integrating Hosts, Storage, and Applications in the Enterprise
Learning Objectives (0:51)
12.1 Adapting Data Flow Security (13:16)
12.2 Data Flow Security Standards (6:06)
12.3 Interoperability Issues (3:25)
12.4 Resilience Issues (6:17)
12.5 Data Security Considerations (4:06)
12.6 Resource Provisioning and De-provisioning (8:20)
12.7 Merger and Acquisition Design Considerations (4:15)
12.8 Logical Network Segmentation and Diagramming (7:56)
12.9 Security Issues with Enterprise Application Integration (7:44)
Lesson 13: Integrating Cloud and Virtualization Technologies in the Enterprise
Learning Objectives (0:40)
13.1 Technical Deployment Models: Cloud/Virtualization Considerations and Hosting Options (12:12)
13.2 Technical Deployment Models: Cloud Service Models (17:15)
13.3 Pros and Cons of Virtualization (13:16)
13.4 Cloud Augmented Security Services (10:16)
13.5 Host Comingling Vulnerabilities (6:57)
13.6 Data Security Considerations (4:06)
Lesson 14: Integrating and Troubleshooting Advanced AAA Technologies
Learning Objectives (0:24)
14.1 Authentication (10:12)
14.2 Authorization (6:28)
14.3 Attestation, Proofing, and Propagation (4:27)
14.4 Federation Services (4:56)
14.5 Trust Models (15:32)
Lesson 15: Implementing Cryptographic Techniques
Learning Objectives (0:32)
15.1 Cryptographic Techniques: Hashing and Signing (17:57)
15.2 Cryptographic Techniques: Data Protection (12:13)
15.3 Cryptographic Techniques: Encryption in Action (10:16)
15.4 Implementing Cryptography: SSH and SSL/TLS (10:53)
15.5 Implementing Cryptography: Application and Implementation (10:37)
15.6 Implementing Crytography: Certificate Services (11:08)
Lesson 16: Secure Communication and Collaboration Solutions
Learning Objectives (0:30)
16.1 Remote Access (12:40)
16.2 Unified Collaboration Tools (6:23)
Module 5 Research, Development and Collaboration
Introduction (0:29)
Lesson 17: Applying Research Methods for Trend and Impact Analysis
Learning Objectives (0:30)
17.1 Ongoing Research and Threat Intelligence (8:37)
17.2 Emerging Tools and Global IA (6:05)
Lesson 18: Implementing Security Activities Across the Technology Life Cycle
Learning Objectives (0:34)
18.1 Systems Development Life Cycle (3:39)
18.2 Software Development Life Cycle: Frameworks and Code Security (5:38)
18.3 Software Development Life Cycle: Testing and Documentation (4:32)
18.4 Adapting Solutions for Emerging Disruptive Trends (7:13)
18.5 Asset Management and Inventory Control (3:18)
Lesson 19: Interacting Across Diverse Business Units
Learning Objectives (0:44)
19.1 Interpreting Data from Other Disciplines (9:09)
19.2 Forming Guidance, Collaboration, and Other Committees (6:45)
Summary
CASP: Summary (1:04)
CASP_04_14_03
5.6 Advanced Network Design: Clientless SSL VPN Demo
Lecture content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock