Course Details

Previous Page


CompTIA CASP CAS-002: Application Vulnerabilities and Security Controls


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number



Overview/Description
Vulnerabilities within applications, either through improper coding or new attack vectors, can leave an organization open to attack. In this course, you'll learn about various application vulnerabilities and attacks, along with the controls and security mechanisms that can be used to aid in stopping those attacks. Finally you will look at various browser extension issues that you may face while securing your network environment. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Advanced Security Practitioner (CAS-002) certification exam.

Target Audience
Security candidates looking to certify their technical knowledge and skills required to conceptualize, engineer, integrate, and implement secure solutions across complex environments

Prerequisites
None

Expected Duration (hours)
1.7

Lesson Objectives

CompTIA CASP CAS-002: Application Vulnerabilities and Security Controls

  • start the course
  • define how web application security design is used to secure network environments
  • define how insecure direct object references can compromise network security
  • define how cross-site scripting can compromise network security
  • define how cross-site request forgery can compromise network security
  • define how Clickjacking can compromise network security
  • define how SQL injection can compromise network security
  • define how session management and input validation can be used to ensure network security
  • define how error and exception handling, along with privilege escalation, are issues that must be dealt with in network security
  • define how fuzzing and fault injection are issues that must be dealt with in network security
  • define the importance of proper storage of sensitive data in network environments
  • define how memory leaks and buffer and integer overflows can damage network security
  • define how race conditions, resource exhaustion, and geo-tagging can affect network security
  • define industry accepted application security frameworks
  • define how web services security affects network security
  • define how client-side processing affects network security in comparison to server-side processing
  • define secure coding standards and how they can be used to increase network security
  • define how ActiveX issues can affect network security
  • define how java applet issues can affect network security
  • define how Flash issues can affect network security
  • define how Ajax issues can affect network security
  • define how HTML5 issues can affect network security
  • define how SOAP issues can affect network security
  • define how JavaScript and state management can affect network security
  • To differentiate application vulnerabilities and select appropriate security controls
  • Course Number:
    sp_capr_a04_it_enus