Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Master in CompTIA CASP+ (CAS-004) Certification Offer
New section
1. Overview (4:54)
2. Services - Discussion (28:43)
3. Segmentation - Discussion (21:10)
4. Services & Segmentation - Scenarios (27:22)
5. DeperimeterizationZero Trust (17:30)
6. Merging of Networks (21:46)
7. Software-defined Networking (SDN) (18:38)
8. Infrastructure Design - Discussion (25:34)
9. Infrastructure Design - Scenarios (22:32)
10. Baselines & Templates & Software Assurance (25:41)
11. Integrating Enterprise Applications (10:38)
12. Security in the Development Lifecycle (25:08)
13. Securing Enterprise Architecture (26:23)
14. Authentication & Authorization - Discussion (24:11)
15. Authentication & Authorization - Scenarios (20:32)
16. Secure Cloud & Virtualization (26:05)
17. Cryptography & PKI (25:52)
18. Impact of Emerging Technologies (27:10)
19. Security Architecture - Key Points (14:59)
20. Perform Threat Management (24:51)
21. Indicators of Compromise & Response (27:35)
22. Vulnerability Management Activities (22:21)
23. Vulnerability Assessment - Methods & Tools (27:15)
24. Analyze Vulnerabilities - Vulnerabilities (26:29)
25. Analyze Vulnerabilities - Vulnerable Systems (24:42)
26. Analyze Vulnerabilities - Attacks (28:12)
27. Use Processes to Reduce Risk (25:13)
28. Triage & Incident Response (23:07)
29. Forensic Concepts (21:02)
30. File Carving & Binary Analysis (27:35)
31. Analysis Tools (27:28)
32. Live Collection Tools (24:49)
33. Security Operations - Key Points (15:57)
34. Managed Configurations (27:16)
35. Deployment Scenarios (12:57)
36. Security Considerations (24:34)
37. Hardening Techniques (22:06)
38. Processes (25:10)
39. Mandatory Access Control (15:04)
40. Trustworthy Computing (27:18)
41. Compensating Controls (9:35)
42. Security Considerations - Embedded (15:58)
43. Security Considerations - ICS-SCADA (22:07)
44. Security Considerations - Protocols (24:46)
45. Security Considerations - Sectors (8:45)
46. Cloud Technology - Basics (26:18)
47. Cloud Technology - Advanced (26:31)
48. PKI - Basics (28:04)
49. PKI - Advanced (27:17)
50. Hashing & Symmetric Algorithms (27:29)
51. Asymmetric Algorithms & Protocols (28:22)
52. Troubleshoot Cryptography - Keys (13:26)
53. Security Engineering & Cryptography - Key Points (12:23)
54. Troubleshoot Cryptography - Misconfigurations (17:37)
55. Risk Assessment (26:50)
56. Risk Handling Techniques (17:51)
57. Risk Types (15:46)
58. Risk Management Life Cycle (20:57)
59. Risk Tracking (25:20)
60. Policies and Security Practices (23:55)
61. Shared Responsibility Model - Cloud (15:41)
62. Performing Vendor Assessments (19:42)
63. Technical Considerations (15:33)
64. Data Considerations (25:42)
65. Regulations Accreditations & Standards (28:14)
66. Legal Considerations (16:48)
67. Contract and Agreement Types (14:12)
68. Business Impact Analysis (BIA) (25:05)
69. Privacy Impact Assessment (10:20)
70. Disaster Recovery & Business Continuity Planning (15:23)
71. Incident Response Plan (16:29)
72. Testing Plans (26:12)
73. Governance, Risk & Compliance - Key Points (16:16)
Teach online with
19. Security Architecture - Key Points
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock