Cyber Security Training Catalog – CompTIA Advanced Security Practitioner (CASP) (Exam CAS-002)!

Overview: The CompTIA Security+ (SY0-401) certification establishes knowledgeable professionals in the field of corporate security, one of the fastest-growing fields in IT. Even in a troubled economy, most businesses plan to at least maintain or optimally increase their investment in IT security. CompTIA Security+ is an international, vendor-neutral certification that demonstrates competency in network infrastructure, system security, organizational security and access control. CompTIA Security+ is the certification globally trusted to validate foundational, vendor- neutral IT security knowledge and skills. As a benchmark for best practices in IT security, this certification covers the essential principles for network security and risk management – making it an important stepping stone of an IT security career. Recommended experience for this certification includes CompTIA Network+ and two years of experience in IT administration with a security focus. No prerequisites required.

$150.00Read more

Course Modules

(Duration: 1h 29m)

  1. Workbook (Pdf)
  2. Topic A: The Basics of Enterprise Security
  3. The Enterprise
  4. Enterprise Security
  5. Business Goals and Security
  6. Common Enterprise Security Principles
  7. Enterprise Threat Intelligence
  8. What to Protect?
  9. Defense in Depth
  10. Common Components of an Enterprise Security Solutions
  11. Policies, Standards, and Procedures
  12. Enterprise Policy Types
  13. Topic B: The Enterprise Structure
  14. Organizational Structures
  15. The Management Team
  16. Network Administrator
  17. The DBA
  18. Programmers
  19. Stakeholders
  20. Finance
  21. Human Resources
  22. Physical Security and Facilities Roles
  23. Discipline Collaboration
  24. Topic C: Enterprise Security Requirements
  25. Legal Compliance
  26. PII
  27. Privacy Requirements
  28. Organizational Security Requirements
  29. Lesson 01 Review
  30. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 2h 45m)

  1. Workbook (Pdf)
  2. Topic A: Common Network Security Components and Technologies
  3. Common Enterprise Security Components
  4. VoIP Integration
  5. IPv6 Migration and Integration
  6. VLAN Integration
  7. DNS Security Techniques
  8. Secure Directory Services
  9. NIDS
  10. NIPS
  11. The NIPS Process
  12. ESB
  13. The ESB Process
  14. DAM
  15. Topic B: Communications and Collaboration Security
  16. UC Security
  17. UC Attacks
  18. UC Components
  19. Traffic Prioritization (QoS)
  20. Security Solutions for Data Flow
  21. VoIP Security
  22. The VoIP Implementation Process
  23. VoIP Implementation Considerations
  24. Remote Access Security
  25. VPN Solutions
  26. External Communications Security
  27. Collaboration Platform Security Issues
  28. Demo- Least Privilege
  29. Common Mobile Devices
  30. Enterprise Security Methods for Mobile Devices
  31. Topic C: Cryptographic Tools and Techniques
  32. Cryptography in the Enterprise
  33. Considerations for Cryptography in the Enterprise
  34. Demo- File Encryption
  35. Cryptographic Methods and Design
  36. Basic Approaches to Encryption
  37. Transport Encryption Methods
  38. Security Implications for Encryption
  39. Digital Signature Techniques
  40. Advanced PKI Components
  41. Code Signing
  42. Attestation
  43. Entropy
  44. PRNG
  45. PFS
  46. Confusion and Diffusion
  47. Topic D: Advanced Authentication
  48. Advanced Authentication Within the Enterprise
  49. Certificate-Based Authentication
  50. SAML
  51. SPML
  52. XACML
  53. SOAP
  54. WSS
  55. Lesson 02 Review
  56. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 1h 45m)

  1. Workbook (Pdf)
  2. Topic A: Enterprise Storage Security Issues
  3. Common Enterprise Storage Technologies
  4. NAS Security Implications
  5. SAN Security Implications
  6. vSAN Security Implications
  7. Virtual Storage
  8. Security Implications of Virtual Storage
  9. Cloud Storage
  10. Security Implications of Cloud Stotage
  11. Data Warehousing
  12. Security Implications of Data Warehousing
  13. Data Archiving
  14. Security Implications of Data Archiving
  15. iSCSI Security Implications
  16. iSCSI
  17. Security Implications of iSCSI
  18. FCoE Security Implications
  19. FCoE
  20. Security Implications of FCoE
  21. vSAN
  22. Security Implications of vSAN
  23. LUN
  24. LUN Masking in the Security Architecture
  25. Redundancy
  26. Dynamic Disk Pools
  27. LUN Masking and Mapping
  28. HBA Allocations
  29. Multipath
  30. Offsite and Multisite Replication
  31. Additional Storage Security Implications
  32. Snapshots
  33. Deduplication
  34. Guidelines for Ensuring Secure Storage Management
  35. Topic B: Distributed, Shared, and Virtualized Computing
  36. Why Virtualization?
  37. Advantages of Virtualization
  38. VLANs
  39. VMs
  40. VDI
  41. Terminal Services
  42. Virtualization Vulnerabilities
  43. Vulnerabilities of Hosting VMs for Multiple Companies
  44. Virtual Environment Security Methods
  45. Topic C: Cloud Computing and Security
  46. Cloud Computing
  47. Cloud Computing Service Models
  48. Cloud Storage Considerations
  49. Security Vulnerabilities of Cloud Computing
  50. Secure Use of Cloud Computing Within the Enterprise
  51. Lesson 03 Review
  52. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 4h 37m)

  1. Workbook (Pdf)
  2. Topic A: Network Security Design
  3. Network Design Types and Techniques
  4. Network Design Considerations
  5. Data Network Types
  6. A Data Network Topology
  7. Data Network Topology Types
  8. A Network Diagram
  9. Data Network Media Types
  10. Network Transmission Methodologies
  11. Physical Security
  12. Building Layout
  13. Facilities Management
  14. Unified Threat Management
  15. NIDS
  16. NIPS
  17. Inline Network Encryptor
  18. Security Information and Event Management
  19. SIEM Capabilities
  20. Network-Attached HSM
  21. Application and Protocol Aware Technologies
  22. Virtual Networking and Security Components
  23. Device Placement
  24. Guidelines for Analyzing Network Security Components and Devices
  25. Guidelines for Analyzing Network Security Components and Devices (Cont.)
  26. Building Automation Systems
  27. Hardware Attacks
  28. Environmental Threats and Vulnerabilities
  29. Sensors
  30. Physical Access Control Systems
  31. Scientific and Industrial Equipment
  32. A/V Systems
  33. IP Video
  34. Network Attacks
  35. SCADA
  36. Secure Infrastructure Design
  37. Storage Integration Considerations
  38. Guidelines for Analyzing Network-Enabled Devices
  39. Remote Access
  40. IPv6 and Associated Transitional Technologies
  41. Network Authentication
  42. 802.1X
  43. Software-Defined Networking
  44. Cloud-Managed Networks
  45. Guidelines for Analyzing Advanced Network Design
  46. Network Baselining
  47. Configuration Lockdown
  48. Change Monitoring
  49. Availability Controls
  50. ACLs
  51. DMZ
  52. Separation of Critical Assets
  53. Data Flow Enforcement
  54. Network Device Configuration
  55. Network Access Control
  56. Critical Infrastructure and Industrial Control Systems
  57. Network Management and Monitoring Tools
  58. Guidelines for Configuring Controls for Network Security
  59. Topic B: Conduct a Security Assessment
  60. Malware Sandboxing
  61. Memory Dumping
  62. Runtime Debugging
  63. Vulnerability Assessment
  64. Penetration Testing
  65. Hacking Steps
  66. Penetration Testing Techniques
  67. Fingerprinting
  68. Types of Social Engineering
  69. Vulnerability Scanners
  70. Port Scanners
  71. Protocol Analyzers
  72. Network Enumerators
  73. Password Crackers
  74. Fuzzers
  75. HTTP Interceptors
  76. Exploitation Tools and Frameworks
  77. Passive Reconaissance and Intelligence Gathering Tools
  78. Code Review Methods
  79. A Social Engineering Test
  80. Security Assessment Tools
  81. How to Conduct a Security Assessment
  82. Topic C: Host Security
  83. Host-Based Security Controls
  84. Host-Based Firewalls
  85. Firewall Rules
  86. Demo – Firewalls
  87. TPM
  88. Trusted OS
  89. Endpoint Security
  90. Endpoint Security Software
  91. Guidelines for Selecting Host Hardware and Software
  92. Security and Group Policy Implementations
  93. Standard Operating Environment
  94. Command Shell Restrictions
  95. Patch Management
  96. Out-of-Band Communication
  97. Peripheral Restrictions
  98. Communications Protocols Used by Peripherals
  99. Full Disk Encryption
  100. Trusted OS (Cont.)
  101. Endpoint Security (Cont.)
  102. Anti-Malware Software
  103. Host Hardening
  104. Guidelines for Hardening Hosts
  105. Operating System Security
  106. Host Hardening Action Steps
  107. Asset Management
  108. HIDS
  109. HIPS
  110. Host Monitoring
  111. Virtualization Platforms
  112. Hypervisors
  113. Container-Based Virtualization
  114. VDI
  115. Security Implications of VDI
  116. Terminal Services
  117. Application Delivery Services
  118. vTPM
  119. VM Vulnerabilities
  120. Guidelines for Virtualizing Servers and Desktops
  121. Cloud Services
  122. Cloud Security Services
  123. Hash Matching
  124. Content Filtering
  125. Guidelines for Implementing Cloud Augmented Security Services
  126. BIOS
  127. UEFI
  128. Secure Boot
  129. Measured Launch
  130. IMA
  131. Lesson 04 Review
  132. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 1h 53m)

  1. Workbook (Pdf)
  2. Topic A: Create a Risk Management Plan
  3. Risk
  4. Risk Exposure
  5. Risk Analysis Methods
  6. Risks Facing an Enterprise
  7. Project Buffer
  8. Classification of Risks
  9. Business Risk vs. Insurable Risk
  10. Risk Tolerance
  11. Probability Scale
  12. Impact Scale
  13. RBS
  14. Enterprise Security Architecture Frameworks
  15. ESA Framework Assessment Process
  16. New Products and Technologies
  17. New and Changing Business Models
  18. Partnership Model
  19. Outsourcing Model
  20. Cloud Model
  21. Mergers
  22. Demergers and Divestitures
  23. Integration of Diverse Industries
  24. Third-Party Providers
  25. Internal and External Influences
  26. De-perimeterization
  27. Risk Determinations
  28. Guidelines for Assessing Risk
  29. Classes of Information
  30. Classification of Information Types into CIA Levels
  31. Stakeholder Input for CIA Decisions
  32. Technical Controls
  33. Aggregate CIA Score
  34. Extreme Scenario Planning and Worst Case Scenarios
  35. System-Specific Risk Analysis
  36. Risk Response Techniques
  37. Risk Management Processes
  38. Continuous Monitoring and Improvement
  39. Risk Management
  40. The Risk Management Plan
  41. Components of a Risk Management Plan
  42. How to Create a Risk Management Plan
  43. IT Governance
  44. Guidelines for Mitigating Risk
  45. Policy Development
  46. Process and Procedure Development
  47. Best Practices to Incorporate in Security Policies and Procedures
  48. Legal Compliance and Advocacy
  49. General Privacy Principles
  50. Topic B: Identify Risks and Their Causes
  51. Triggers
  52. Information Gathering Techniques
  53. Documentation Reviews
  54. SWOT Analysis
  55. Risk Analysis
  56. Risk Register
  57. Components of a Risk Register
  58. Risk Categories
  59. How to Identify Risks and Their Causes
  60. Topic C: Analyze Risks
  61. Qualitative Risk Analysis
  62. Quantitative Risk Analysis
  63. Risk Probability and Impact Assessment
  64. The Probability and Impact Risk Rating Matrix
  65. The Ongoing Risk Assessment Process
  66. Project Risk Ranking
  67. Data Collection and Representation Techniques
  68. Basics of Probability
  69. Probability Distribution
  70. Quantitative Analysis Methods
  71. Qualitative Analysis Methods
  72. Risk Data Quality Assessment
  73. Risk Urgency Assessment
  74. Simulation
  75. Monte Carlo Analysis
  76. How to Analyze Risks
  77. Topic D: Develop a Risk Response Plan
  78. Negative Risks
  79. Negative Risk Strategies
  80. Positive Risks
  81. Positive Risk Strategies
  82. Contingency Plan
  83. The BCP
  84. DRP
  85. Contingency Reserve
  86. Risk-Related Contract Decisions
  87. How to Develop a Risk Response Plan
  88. Lesson 05 Review
  89. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 27m)

  1. Workbook (Pdf)
  2. Topic A: Implement Authentication and Authorization Technologies
  3. Authentication
  4. Certificate-Based Authentication
  5. SSO
  6. Authorization
  7. OAuth
  8. The OAuth Process
  9. XACML
  10. SPML
  11. Trust Models
  12. RADIUS Configurations
  13. LDAP
  14. Active Directory
  15. Kerberos
  16. Guidelines for Implementing Authentication and Authorization
  17. Topic B: Implement Advanced Identity Management
  18. Attestation
  19. Identity Propagation
  20. Identity Federation
  21. Identity Federation Methods
  22. Guidelines for Implementing Advanced Identity Management
  23. Lesson 06 Review
  24. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 57m)

  1. Workbook (Pdf)
  2. Topic A: Describe Cryptographic Concepts
  3. Confidentiality
  4. Integrity
  5. Non-repudiation
  6. Entropy
  7. Confusion
  8. Diffusion
  9. Chain of Trust
  10. Root of Trust
  11. Steganography
  12. Advanced PKI Concepts
  13. Topic B: Choose Cryptographic Techniques
  14. Cryptographic Applications
  15. Cryptographic Methods
  16. Block Cipher Modes
  17. Cryptographic Design Considerations
  18. Transport Encryption
  19. Transport Encryption Protocols
  20. Data at Rest Encryption
  21. Hashing
  22. Hash Functions
  23. Key Stretching
  24. Digital Signatures
  25. Code Signing
  26. Pseudorandom Number Generation
  27. Perfect Forward Secrecy
  28. Guidelines for Choosing Cryptographic Techniques
  29. Topic C: Choose Cryptographic Implementations
  30. DRM
  31. Digital Watermarking
  32. SSL/TLS
  33. SSH
  34. PGP and GPG
  35. S/MIME
  36. Guidelines for Choosing Cryptographic Implementations
  37. Lesson 07 Review
  38. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 1h 11m)

  1. Workbook (Pdf)
  2. Topic A: Implement Security Standards in the Enterprise
  3. Standards
  4. Categories of Standards
  5. Interoperability Issues
  6. Data Flow Security
  7. Guidelines for Implementing Standards in the Enterprise
  8. Topic B: Select Technical Deployment Models
  9. Deployment Models
  10. Cloud and Virtualization and Hosting Options
  11. Elastic Cloud Computing
  12. Data Remnants in the Cloud
  13. Data Aggregation
  14. Data Isolation
  15. Resource Provisioning and De-provisioning
  16. Virtual Machine Vulnerabilities
  17. Virtual Environment Security
  18. Virtual Environment Security (Cont.)
  19. Network Segmentation
  20. Network Delegation
  21. Mergers and Acquisitions
  22. Guidelines for Selecting Technical Deployment Models
  23. Topic C: Secure the Design of the Enterprise Infrastructure
  24. Infrastructure Design Security
  25. Deployment Diagrams
  26. Storage Integration
  27. Guidelines for Securing the Design of the Enterprise Infrastructure
  28. Topic D: Secure Enterprise Application Integration Enablers
  29. Customer Relationship Management
  30. Enterprise Resource Planning
  31. Governance, Risk, and Compliance
  32. Enterprise Service Bus
  33. Service Oriented Architecture
  34. Directory Services
  35. Domain Name System
  36. Configuration Management Database
  37. Content Management System
  38. Guidelines for Securing Enterprise Application Integration Enablers
  39. Lesson 08 Review
  40. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 1h 07m)

  1. Workbook (Pdf)
  2. Topic A: Perform an Industry Trends and Impact Analysis
  3. Industry Best Practices
  4. Demo – Security Research
  5. Research Methods
  6. Technology Evolution
  7. New Technologies, Security Systems, and Services
  8. New Security Technology Types
  9. Global IA Industry and Community
  10. Security Requirements for Contracts
  11. Guidelines for Determining Industry Trends and Effects on the Enterprise
  12. Situational Awareness
  13. Situational Awareness Considerations
  14. Emerging Business Tools
  15. Social Media as an Emerging Business Tool
  16. Mobile Devices as Emerging Business Tools
  17. Emerging Security Issues
  18. The Global Impact Analysis Industry
  19. Security Requirements for Business Contracts
  20. How to Perform an Industry Trends Impact Analysis
  21. Topic B: Perform an Enterprise Security Analysis
  22. Benchmarking
  23. Network Traffic Analysis
  24. Types of Network Traffic Analysis
  25. Prototyping and Testing
  26. Cost-Benefit Analysis
  27. Security Analysis Strategies
  28. Security Solution Analysis
  29. Lessons Learned Review
  30. How to Perform an Enterprise Security Analysis
  31. Review Existing Security
  32. Reverse Engineering
  33. Solution Attributes
  34. After-Action Report
  35. Guidelines for Analyzing Scenarios to Secure the Enterprise
  36. Lesson 09 Review
  37. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 1h 9m)

  1. Workbook (Pdf)
  2. Topic A: BCP Fundamentals
  3. BCPs
  4. BCP Development Phases
  5. NIST Contingency Planning Steps
  6. NFPA Business Planning Framework
  7. Disruptive Events
  8. BIA
  9. BIA Organizational Goals
  10. BIA Process
  11. Critical Business Process
  12. Vulnerability Assessments
  13. MTD
  14. RPO
  15. RTO
  16. RPO/RTO Optimization
  17. Topic B: BCP Implementation
  18. Program Coordinators
  19. Advisory Committee-BCP Team
  20. BCP Team Responsibilities
  21. BCP Contents
  22. Business Plan Evaluations
  23. Business Plan Testing
  24. Business Plan Maintenance
  25. Business Continuity Process
  26. Topic C: DRP Fundamentals
  27. DRP
  28. Disaster Recovery Strategy
  29. Disaster Recovery Priority Levels
  30. Disaster Recovery Response Approaches
  31. Backup Strategies
  32. Data Restoration Strategies
  33. Alternate Sites
  34. Topic D: DRP Implementation
  35. Recovery Team
  36. Salvage Team
  37. Disaster Recovery Evaluation and Maintenance
  38. Disaster Recovery Testing
  39. Disaster Recovery Process
  40. Lesson 10 Review
  41. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 35m)

  1. Workbook (Pdf)
  2. Topic A: Design Systems to Facilitate Incident Response
  3. Internal and External Violations
  4. Security Violations and System Design
  5. System, Audit, and Security Logs
  6. Guidelines for Designing Systems to Facilitate Incident Response
  7. Topic B: Conduct Incident and Emergency Responses E-Discovery E-Discovery Policy
  8. Data Breach
  9. Data Breach Response
  10. Chain of Custody
  11. Forensic Analysis of Compromised Systems
  12. COOP- Continuity of Operations
  13. Order of Volatility
  14. Guidelines for Conducting Incident and Emergency Responses
  15. Lesson 11 Review
  16. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 35m)

  1. Workbook (Pdf)
  2. Topic A: Computer Crime Laws and Regulations
  3. Common Law
  4. Statutory Law
  5. Types of Statutory Offenses
  6. Administrative Law
  7. Intellectual Property Law
  8. Information Privacy Law
  9. Computer Crime Law
  10. Compliance
  11. Liability
  12. Internal and External Audits
  13. Governmental Oversight Resources
  14. Topic B: Computer Crime Incident Response
  15. Computer Crime
  16. The Computer Criminal Incident Response Process
  17. The Evidence Life Cycle
  18. Evidence Collection Techniques
  19. Evidence Types
  20. Chain of Evidence
  21. Rules of Evidence
  22. Surveillance Techniques
  23. Search and Seizure
  24. Computer Forensics
  25. Lesson 12 Review
  26. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 40m)

  1. Workbook (Pdf)
  2. Topic A: Develop Critical Thinking Skills
  3. Intellectual Autonomy
  4. Humility
  5. Objectivity
  6. Focus on the Argument
  7. Clarity
  8. Defining Your Argument
  9. Intellectual Honesty
  10. Logical Fallacies
  11. Assessing Arguments Logically
  12. How to Employ Critical Thinking Skills
  13. Topic B: Determine the Root of a Problem
  14. Obstacles to Analysis
  15. Occam’s Razor
  16. Techniques for Applying Occam’s Razor
  17. Theme Analysis
  18. The Four Guidelines Technique
  19. How to Determine the Root of a Problem
  20. Topic C: Use Judgment to Make Sound Decisions
  21. Analyzing Problems
  22. Analytical vs. Creative Thinking
  23. Barriers to Creative Thinking
  24. Brainstorming
  25. Rules of Brainstorming
  26. Evaluating Brainstorming Ideas
  27. A Fishbone Diagram
  28. A Pareto Chart
  29. A Histogram
  30. A Cost-Benefit Analysis
  31. Phases in Cost-Benefit Analysis
  32. A Prioritization Matrix
  33. A Trade-Off Method
  34. A Decision Tree
  35. An Ease and Effect Matrix
  36. A PMI Analysis Table
  37. How to Use Judgment to Make Sound Decisions
  38. Lesson 13 Review
  39. Course Closure
  40. Review Quiz (Number of attempts allowed: Unlimited)
This course includes
  • about 19.9 hours on-demand video
  • 13 downloadable Pdf Workbooks
  • Unlimited time access (During Membership)
  • Access on mobile and Desktop
  • Certificate of Completion

Course Features Include:

  • Expert Lectures
    Learn on-demand from top instructors who are industry subject matter experts. Our highly certified expert instructors possess a superior understanding of the subject matter in their fields and have the ability to convey this knowledge in an effective, engaging, and professional manner to a wide audience.

  • Certificates of Completion
    Upon completion of a series of courses you can earn a certificate of completion from Career Academy. Certificates of Completion will display your full name, course completed, as well as the date of completion. Students have the ability to print this out or save it digitally to showcase your accomplishment.

  • PowerPoint Visuals:
    Many of the in-depth theories and processes discussed in our courses can be learned most efficiently through the detailed PowerPoint slides presented. These visuals are accompanied by an instructor voice-over to provide our students with a clear, efficient, and complete presentation of concepts.

  • Professional Development Activities
    Students are provided access to professional development activity files which allow for an individual to test out course theories and apply the knowledge they earned from the course.

  • Review Quizzes
    Once a course is completed, test your knowledge by taking our course review quiz! Students have the ability to retake any review quizzes as many times as they wish to ensure they understand the material or to improve upon their scores.

  • Mobile Access
    With our universal course player, you can learn from your computer, tablet as well as mobile devices. Keep up with your training on the go!

Trusted by Aspiring IT Professionals, Corporations and
Government agencies
for more than a Decade

Get unlimited online access learn anywhere, anytime using your computer or mobile device!