Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA Advanced Security Practitioner Certification Series (CASP+) with Practice Exam
00 Introduction - Start Here ⬇️
➡️ WHERE TO BEGIN: Recommended Course Order
Did you watch these prerequisites?
01 Analyze Security Requirements
01 Services (39:02)
Exam Tip 01 (2:52)
02 Segmentation (22:43)
Exam Tip 02 (1:59)
03 Deperimeterization (11:14)
Exam Tip 03 (3:10)
04 Merging of Networks (12:00)
05 Software-defined Networking (7:25)
Source Files
02 Analyze Organizational Requirements
01 Scalability (2:53)
Exam Tip 01 (2:58)
02 Resiliency (12:57)
Exam Tip 02 (2:45)
03 Automation (7:10)
04 More Concepts (15:09)
Source Files
03 Integrate Software Applications
01 Baseline and Templates (18:25)
Exam Tip 01 (2:45)
02 Software Assurance (16:53)
Exam Tip 02 (2:48)
03 Considerations of Integrating Enterprise Applications (14:24)
04 Integrating Security into Development Life Cycle (17:16)
Source Files
04 Implement Data Security Techniques
01 Data Loss Prevention (11:00)
Exam Tip 01 (3:07)
02 Data Loss Detection (6:14)
03 Data Classification (2:49)
04 Obfuscation (8:47)
05 Data Life Cycle (8:38)
06 Data Storage (3:08)
Source Files
05 Analyze the Security Requirements for Authentication and Authorizatiion
01 Credential Management (10:10)
Exam Tip 01 (4:17)
02 Password Policies (12:30)
03 Federation (9:21)
04 Access Control (8:48)
05 Protocols (11:14)
06 Multifactor Authentication (5:56)
07 One-time Password (OTP) (15:23)
Source Files
06 Implement Secure Cloud and Virtualization Solutions
01 Virtualization Strategies (10:23)
Exam Tip 01 (3:29)
02 Deployment Models (4:54)
Exam Tip 02 (3:39)
03 Hosting Models (2:07)
04 Service Models (3:09)
05 Cloud Provider Limitations (1:29)
06 Storage Models (12:37)
07 More Concepts (7:37)
Source Files
07 Cryptographic and PKI
01 Cryptographic Concepts (9:53)
Exam Tip 01 (3:19)
02 Common Cryptography Usecases (16:09)
03 PKI Usecases (8:42)
Source Files
08 Impact of Emerging Technologies
01 Emerging Technologies (28:26)
01 Exam Tip (3:37)
02 Homomorphic (12:03)
03 Deep Learning (7:17)
Source Files
09 Perform Threat Management Activities
01 Intelligence Types (12:06)
01 Exam Tip (3:28)
02 Actor Types (15:58)
Source Files
10 Analyze Indicators of Compromise
01 Indicator Of Compromise (14:37)
01 Exam Tip (3:00)
02 Response (4:16)
Source Files
11 Perform Vulnerability Management Activities
01 Vulnerability Scans (4:17)
01 Exam Tip (3:08)
02 Scap (5:05)
03 Self Assessment (4:33)
04 Patch Management (2:05)
05 Information Sources (3:56)
Source Files
12 Use the Appropriate Vulnerability Assessment and Penetration Testing Methods
01 Methods (14:10)
01 Exam Tip (3:02)
02 Tools (17:41)
03 Dependency Management (2:16)
04 Requirements (4:44)
Source Files
13 Analyze Vulnerabilities and Recommend Risk Mitigations
01 Vulnerabilities (19:53)
01 Exam Tip (3:06)
02 Inherently (18:23)
03 Attacks (20:10)
Source Files
14 Use Processes to Reduce Risk
01 Proactive And Detection (4:20)
01 Exam Tip (2:48)
02 Security Data Analytics (3:27)
03 Preventive (3:14)
04 Application Control (4:02)
05 Security Automation (2:02)
06 Physical Security (2:26)
Source Files
15 Implement the Appropriate Response
01 Event Classifications (4:26)
01 Exam Tip (2:41)
02 Incident Response (4:45)
03 Playbooks (4:36)
04 Appropriate Response (2:41)
Source Files
16 Explain the Importance of Forensics Concepts
01 Forensic Process (2:26)
01 Exam Tip (2:57)
02 Integrity Preservation (2:58)
03 Forensic Concepts (4:14)
Source Files
17 Use Forensic Analysis Tools
01 File Carving Tools (2:41)
01 Exam Tip (2:34)
02 Binary Analysis Tools (6:11)
03 Analysis Tools (3:46)
04 Imaging Tools (2:20)
05 Hashing Utilities (2:01)
Source Files
18 Apply Secure Configurations to Enterprise Mobility
01 Managed Configurations (17:22)
01 Exam Tip (2:46)
02 Deployment Scenarios (6:27)
03 Security Considerations (12:03)
Source Files
19 Configure and Implement Endpoint Security Controls
01 Hardening Techniques (13:18)
01 Exam Tip (2:53)
02 Processes (3:26)
03 Mandatory Access Control (3:09)
04 Trustworthy Computing (8:39)
05 Compensating Controls (4:04)
Source Files
20 Explain Security Considerations Impacting Specific Sectors
01 Embedded (4:45)
01 Exam Tip (3:06)
02 SCADA (5:27)
03 Protocols (4:16)
04 Sectors (4:21)
Source Files
21 Explain Cloud Technology Adoption
01 Exam Tip (2:20)
01 Cloud Technology Adoption (24:39)
02 Logs (4:20)
03 Backup And Recovery (3:12)
04 Storage Configurations (1:57)
Source Files
22 Implement the Appropriate PKI Solutions
01 PKI Hierarchy (3:05)
01 Exam Tip (2:49)
02 Certificate Types (3:57)
03 Certificate Usage, Profiles And Templates (5:22)
04 Extensions (1:45)
05 PKI Solutions Concepts (35:33)
Source Files
23 Implement the Appropriate Cryptographic Protocols and Algorithms
01 Hashing (3:56)
01 Exam Tip (2:40)
02 Symmetric Algorithms (4:07)
03 Asymetric Algorithms (2:58)
04 Protocols (2:46)
05 Elliptic Curve Cryptography (5:58)
06 Key Stretching (2:01)
07 Cryptographic Concepts (3:08)
Source Files
24 Troubleshoot Issues with Cryptographic Implementations
01 Implementation And Configuration Issues (22:28)
01 Exam Tip (2:44)
02 Keys (14:15)
Source Files
25 Apply the Appropriate Risk Strategies
01 Risk Assessment (27:48)
01 Exam Tip (2:31)
02 Risk Handling Techniques (3:35)
03 Risk Types (2:27)
04 Risk Management Lifecycle (3:54)
05 Risk Tracking (7:09)
06 Risk Appetite Vs Tolerance (3:26)
07 Policies And Security Practices (6:45)
Source Files
26 Importance of Managing and Mitigating Vendor Risks
01 Shared Responsibility Model (2:33)
01 Exam Tip (2:47)
02 Vendor Viability (2:58)
03 Third-Party Dependencies (4:57)
04 Technical Considerations (1:14)
05 Mitigating Vendor Risks (28:37)
Source Files
27 Explain Compliance Frameworks and Legal Considerations
01 Data Considerations (15:28)
01 Exam Tip (2:46)
02 Geographic Considerations (1:22)
03 Regulations (2:33)
04 Legal Considerations (2:14)
05 Contract And Agreement Types (2:27)
06 Organizational Impacts (4:41)
Source Files
28 Explain the Importance of Business Continuity
01 Business Impact Analysis (5:41)
01 Exam Tip (3:03)
02 Disaster Recovery Plan (5:14)
03 Incident Response Plan (3:07)
04 Testing Plans (14:10)
05 Privacy Impact Assessment (4:36)
Source Files
Test Your Knowledge
Practice Exam
04 Technical Considerations
Lesson content will be unlocked within 30 minutes.
Teachable is working on this bug.
No further action will be required on your part
.
Thank you for your patience