From the course: CompTIA Advanced Security Practitioner (CASP+) (CAS-004) Cert Prep
Welcome
From the course: CompTIA Advanced Security Practitioner (CASP+) (CAS-004) Cert Prep
Welcome
- Welcome to this course on the CompTIA Advanced Security Practitioner certification, better known as the CASP+ certification. This certification is considered an advanced level certification for technical professionals who wish to remain immersed in technology as opposed to strictly moving into a more managerial career. Now, the CASP+ certification validates your advanced level competency in risk management, enterprise security operations and architecture, research and collaboration, and the integration of enterprise security in your organizational networks. This certification covers the technical knowledge and skills that are required to conceptualize, engineer, integrate, and implement secure solutions across complex environments in the support of a more resilient enterprise. Now, this certification is designed for advanced level security professionals with at least five years of broad hands-on security experience, or those who have been working in the IT realm as a technician for at least 10 years. Now, prior to taking the CASP+ exam, it is recommended that you have already completed your Security+, CySA+, and PenTest+ exams, but that is a recommendation, and not a strict requirement. On the CASP+ exam, knowledge from these exams is considered assumed knowledge, so we're not going to be reteaching all of that content here. Instead, we're going to be building upon that foundational knowledge of computer security, security analysis, and penetration testing throughout this course. But don't worry, we're also going to review any areas specific to the CASP+ exam that you may need to know about throughout this course. Now, before we begin studying for the exam, I want to give you my four tips for success in this course that are going to help you better study for your exam. Now, first, we provide closed captions for every video in this course that's captioned by a real human to ensure a high level of accuracy. That way, you can follow along. Now, many of my students who speak English as their second language really love having these closed captions available so they can read along as I'm teaching. To turn them on, just click on the CC button in the bottom of your video player. There's also a transcript available with each video that you can access and search for specific keywords or phrases within that video if you need to. Also, when it comes to speaking, some people say that I speak too fast, and others say I speak too slow. Either way, you can control the speed of instruction by adjusting your playback speed. If I happen to be talking too fast for you, you can slow me down to .75, or 75%. If I'm talking too slowly for you, you can speed me up by putting me at 1.5x, or 150%. Either way, faster or slower, the choice is yours so that you can learn most effectively. Now, next, I want to point out that we have all the information that I'm going to teach to you in this course available as a downloadable study guide in PDF format. In lesson two of the course, you can download it, print it out, and then use it to take notes on or highlight and circle things as we cover the information in this course. This PDF is a great tool for offline studying before you take your final exam, as well, because you're going to be able to easily see all your notes in one place. Finally, I want you to know that we have a Facebook group set up specifically to help you succeed with this and your other certification exams. If you have any questions, or you get stuck on something, or maybe you just want to talk to other students who are studying for the same exam, you can do all of this by going to facebook.com/groups/diontraining. If you join the group on Facebook, we have people ready to answer your questions anytime of the day or night, because we have thousands and thousands of students there. If you join the group on Facebook, we have people ready to answer any questions you might have, as well as having other students who are there to help you, as well. Currently, we have over 25,000 students in our group, so if you have a question about the CASP+ exam or any of the course content, I guarantee somebody is going to be there to answer that for you quickly. Now, if you don't have Facebook and you need help, you can always email me at support@diontraining.com. When you do this, your message will come in, get logged, and it'll get routed to either me or one of my assistants to respond to during normal working hours. All right, let's get started learning all about the CASP+ exam and Domain 1: Security Architecture. (gentle buzzing)
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
Securing networks6m 48s
-
Switches7m 27s
-
(Locked)
Routers8m 27s
-
(Locked)
Wireless and mesh3m 23s
-
(Locked)
Firewalls11m 30s
-
(Locked)
Proxies6m 59s
-
(Locked)
Gateways4m 39s
-
(Locked)
IDS and IPS6m 29s
-
(Locked)
Network access control2m 56s
-
(Locked)
Remote access8m 59s
-
(Locked)
Unified communication19m 8s
-
(Locked)
Cloud vs. on-premises4m 49s
-
(Locked)
DNSSEC4m 16s
-
(Locked)
Load balancer6m 48s
-
-
-
Securing architectures1m 16s
-
Traffic mirroring4m 23s
-
(Locked)
Network sensors11m 46s
-
(Locked)
Host sensors6m 15s
-
(Locked)
Layer 2 segmentation5m 14s
-
(Locked)
Network segmentation13m 14s
-
(Locked)
Server segmentation10m 51s
-
(Locked)
Zero trust6m 37s
-
(Locked)
Merging networks5m 32s
-
(Locked)
Software-defined networking5m 27s
-
-
-
Cloud and virtualization1m 6s
-
Cloud deployment models4m 34s
-
(Locked)
Cloud service models5m 7s
-
(Locked)
Deployment considerations4m 57s
-
(Locked)
Provider limitations2m 59s
-
(Locked)
Extending controls5m 6s
-
(Locked)
Provisioning and deprovision2m 59s
-
(Locked)
Storage models5m 22s
-
(Locked)
Virtualization7m 56s
-
-
-
Authentication and authorization1m 44s
-
Access control4m 47s
-
(Locked)
Credential management4m 27s
-
(Locked)
Password policies8m 2s
-
(Locked)
Multifactor authentication8m 25s
-
(Locked)
Authentication protocols10m
-
(Locked)
Federation7m 2s
-
(Locked)
Root of trust4m 24s
-
(Locked)
Attestation2m 14s
-
(Locked)
Identity proofing3m 33s
-
-
-
Emerging technology4m 18s
-
Artificial intelligence and machine learning8m 55s
-
(Locked)
Deep learning8m 58s
-
(Locked)
Big data4m 40s
-
(Locked)
Blockchain distributed consensus5m 36s
-
(Locked)
Passwordless authentication5m 17s
-
(Locked)
Homomorphic encryption3m 37s
-
(Locked)
Virtual and augmented reality4m 32s
-
(Locked)
3D printing3m 3s
-
(Locked)
Quantum computing5m 34s
-
-
-
(Locked)
Threat and vulnerability management1m 56s
-
(Locked)
Threat intelligence6m 19s
-
(Locked)
Threat hunting6m 43s
-
(Locked)
Intelligence collection11m 9s
-
(Locked)
Threat actors9m 21s
-
(Locked)
Threat management frameworks12m 45s
-
(Locked)
Vulnerability management activities11m 44s
-
(Locked)
Security Content Automation Protocol7m 21s
-
(Locked)
-
-
(Locked)
Analyzing vulnerabilities1m 22s
-
(Locked)
Race conditions4m 58s
-
(Locked)
Buffer overflows12m 27s
-
(Locked)
Authentication and references5m 56s
-
(Locked)
Ciphers and certificates10m 46s
-
(Locked)
Improper headers6m 9s
-
(Locked)
Software composition9m 49s
-
(Locked)
Vulnerable web applications11m 45s
-
(Locked)
-
-
(Locked)
Attacking vulnerabilities1m 15s
-
(Locked)
Directory traversals9m 48s
-
(Locked)
Cross-Site Scripting (XSS)8m 59s
-
(Locked)
Cross-site request forgery (CSRF)7m 15s
-
(Locked)
SQL injections7m 5s
-
(Locked)
XML injections6m 29s
-
(Locked)
Other injection attacks4m 21s
-
(Locked)
Authentication bypass6m 45s
-
(Locked)
VM attacks4m 52s
-
(Locked)
Network Attacks11m 3s
-
(Locked)
Social engineering7m 15s
-
(Locked)
-
-
(Locked)
Enterprise mobility2m 36s
-
(Locked)
Enterprise mobility management9m 36s
-
(Locked)
WPA37m 20s
-
(Locked)
Connectivity options8m 48s
-
(Locked)
Security configurations8m 8s
-
(Locked)
DNS protection3m 15s
-
(Locked)
Deployment options4m 38s
-
(Locked)
Reconnaissance concerns8m
-
(Locked)
Mobile security7m 50s
-
(Locked)
-
-
(Locked)
Endpoint security controls2m 24s
-
(Locked)
Device hardening8m 30s
-
(Locked)
Patching4m 41s
-
(Locked)
Security settings5m 41s
-
(Locked)
Mandatory access controls (MAC)6m 44s
-
(Locked)
Secure boot5m 49s
-
(Locked)
Hardware encryption4m 48s
-
(Locked)
Endpoint protections9m 54s
-
(Locked)
Logging and monitoring6m 14s
-
(Locked)
Resiliency6m 4s
-
(Locked)
-
-
(Locked)
Cloud technologies2m 37s
-
(Locked)
Business continuity and disaster recovery7m 51s
-
(Locked)
Cloud encryption5m 23s
-
(Locked)
Serverless computing8m 54s
-
(Locked)
Software-defined networking (SDN)6m 52s
-
(Locked)
Log collection and analysis4m 22s
-
(Locked)
Cloud application security broker6m 16s
-
(Locked)
Cloud misconfigurations10m 57s
-
(Locked)
-
-
(Locked)
Asymmetric algorithms2m 11s
-
(Locked)
Using asymmetric algorithms9m 28s
-
(Locked)
SSL, TLS, and cipher suites8m 21s
-
(Locked)
S/MIME and SSH7m 27s
-
(Locked)
EAP5m 39s
-
(Locked)
IPSec14m 34s
-
(Locked)
Elliptic curve cryptography (ECC)3m 33s
-
(Locked)
Forward secrecy3m 35s
-
(Locked)
Authenticated encryption with associated data (AEAD)1m 53s
-
(Locked)
Key stretching4m 30s
-
(Locked)
-
-
(Locked)
Public key infrastructure4m 30s
-
(Locked)
PKI components10m 18s
-
(Locked)
Digital certificates7m 44s
-
(Locked)
Using digital certificates5m 40s
-
(Locked)
Trust models4m 28s
-
(Locked)
Certificate management2m 44s
-
(Locked)
Certificate validity: CRL and OCSP3m 48s
-
(Locked)
Protecting web traffic3m 30s
-
(Locked)
Troubleshooting certificates5m 22s
-
(Locked)
Troubleshooting keys3m 35s
-
(Locked)