Course Details

Previous Page


CompTIA CASP CAS-002: Research, Analysis and Assessment


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number



Overview/Description
Research and testing are the backbone of introducing new technologies and devices into your network. It is important to make sure none of the new changes will compromise network security. In this course, you'll learn about research methods to determine industry trends and their impact to the enterprise.You will also explore methods of securing an enterprise environment, and you will select methods or tools appropriate to conduct an assessment and analyze the results. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Advanced Security Practitioner (CAS-002) certification exam.

Target Audience
Security candidates looking to certify their technical knowledge and skills required to conceptualize, engineer, integrate, and implement secure solutions across complex environments

Prerequisites
None

Expected Duration (hours)
2.5

Lesson Objectives

CompTIA CASP CAS-002: Research, Analysis and Assessment

  • start the course
  • identify the best practices and new technologies for dealing with new systems
  • identify how client-side attacks, vulnerabilities, and threats affect network security
  • define how zero-day and emergent threats can affect network security
  • define how end-user cloud storage and business integration can affect network security
  • identify the role of the CERT team and what members should be on it
  • define how conventions, threats actors, and threat intelligence are used to create network security
  • define the role RFPs, RFQs, FRIs, and agreements play in network security
  • identify how benchmarks and baselines are used to create network security
  • define how prototypes and testing are used to create network security
  • define how cost benefit analysis is used when creating network security plans
  • identify how metrics collection and analysis is used when creating network security plans
  • identify how trend data and cyber defense are used when creating network security
  • define the role existing security controls play when creating network security
  • identify how reverse engineering can be used in order to create network security
  • define how performance, latency, scalability, and capability affect network security
  • define how usability, maintainability, availability, and recovery affect network security
  • identify how lessons learned and after-action reports are used to reinforce network security
  • define how judgment calls are used when network security issues arise
  • define how network analysis tools are used when securing network environments
  • identify how exploitation tools can be used both to test and exploit network environments
  • define how passive reconnaissance and intelligence gathering tools can be used to test network environments
  • define how assessment, sandboxing, and debugging can be used to test the security of network environments
  • identify how penetration testing can be used to ensure security in network environments
  • identify the differences between black box, white box, and gray box testing techniques
  • define how reconnaissance, fingerprinting, and social engineering can be used to test the security of network environments
  • Understand basic security, mitigation and prevention techniques
  • Course Number:
    sp_capr_a07_it_enus