CompTIA CASP+: CAS-003: CompTIA Advanced Security Practitioner (CASP+)

https://www.skillsoft.com/channel/comptia-casp-c28e4271-2c23-11e7-83d1-dba0327abefc?certificationexam=95149 https://www.skillsoft.com/channel/comptia-casp-c28e4271-2c23-11e7-83d1-dba0327abefc?certificationexam=95150
  • 18 Courses | 11h 55m 15s
  • 3 Books | 39h 28m
  • 14 Courses | 16h 35m 52s
Likes 113
 
Prepare to become CASP+ certified by acquiring master-level cybersecurity knowledge.

GETTING STARTED

Business and Industry Influences and Risks

  • Playable
    1. 
    Risk Management of New Initiatives
    2m 30s
    NOW PLAYING
  • Playable
    2. 
    New or Changing Business Models and Strategies
    7m 41s
    UP NEXT

GETTING STARTED

CompTIA CASP+: Assessing & Managing Risk

  • Playable
    1. 
    Course Overview
    1m 37s
    NOW PLAYING
  • Playable
    2. 
    Risk Management
    6m 44s
    UP NEXT

COURSES INCLUDED

Business and Industry Influences and Risks
Explore various business and industry influences along with their associated security risks.
10 videos | 41m has Assessment available Badge
Organizational Security and Privacy Policies
Explore various critical security and privacy policies and procedures that represent the organizational requirements.
10 videos | 34m has Assessment available Badge
Risk Mitigation Strategies and Controls
Discover how to execute risk mitigation strategies and controls in a given scenario.
11 videos | 51m has Assessment available Badge
Risk Metric Scenarios for Enterprise Security
Analyzing risk metric situations is important to help improve enterprise security. Explore different risk metric scenarios.
10 videos | 29m has Assessment available Badge
Integrating Network and Security Components, Concepts, and Architectures
Discover integration of network and security components, concepts, and architectures.
12 videos | 1h 19m has Assessment available Badge
Integrating Security Controls for Host Devices
Discover enterprise security architecture and examine integration of security controls for host devices to meet security requirements. In this course, you will learn how to implement trusted operating systems, explain least functionality, and describe endpoint security software. You will then review host-based IDS and IPS, and see how to harden host systems, wireless peripherals, and physical host peripherals. You will also examine scripting and replication, boot loader programs, terminal services, and application delivery services. Finally, you will see how to integrate controls for host devices.
11 videos | 40m has Assessment available Badge
Integrating Controls for Mobile & Small Form Factor Devices
Analyze ways to integrate security controls for mobile and small form factor devices to meet security requirements.
10 videos | 43m