Existing User Login

New User? Create An Account

Request new password

We are iCollege

Established in 2003 under the parent company XpertSkills, iCollege is one of the most trusted marketplaces in E-Learning. Our dedication transcends mere content – we source learning products from only the best suppliers and vendors across the globe so you have the widest selection of educational courses designed to equip you for success.

Headquartered in stunning South Africa, our distributed company spans 3 continents with employees in the U.S., India, and of course, South Africa. Our customers call more than 120 countries home. We're proud to say iCollege is trusted by leading organizations in major tech hubs, including Silicon Valley, to train and equip employees to be the very best that they can be.

Whether partnering with Fortune 500 companies or being part of an individual's journey toward career growth, we are committed to the success of all who trust us as their source for education and training.

Contact Details:

Web: www.xpertskills.com
Skype: xpertskills
Mail: info@xpertskills.com

Physical Address:

Head Office - South Africa
16 Monte Carlo Crescent
Kyalami business Park
Johannesburg
South Africa 1684

You are here

CompTIA CASP+ (CAS-003)

EDUTAINMENT COURSE

CompTIA CASP+ (CAS-003)

Instructor-led, video based E-Learning course.
Overview

CompTIA Advanced Security Practitioner (CASP+) is the ideal certification for technical professionals who wish to remain immersed in technology as opposed to strictly managing resources.  CASP+ is the only hands-on,  performance-based certification for practitioners - not managers - at the advanced skill level of cybersecurity.   While cybersecurity managers help identify what cybersecurity policies and frameworks could be implemented,  CASP-certified professionals figure out how to implement solutions within those policies and frameworks.  The CASP+ certification validates advanced-level competency in risk management;  enterprise security operations and architecture;  research and collaboration;  and integration of enterprise security.

Objectives
  • Implement cryptographic techniques.
  • Implement security controls for mobile devices.
  • Use research and analysis to secure the enterprise.
  • Integrate advanced authentication and authorization techniques.
  • Support IT governance in the enterprise with an emphasis on managing risk.
  • Implement security controls for hosts.
  • Leverage collaboration tools and technology to support enterprise security.
  • Implement network security.
  • Implement security in the systems and software development lifecycle.
  • Integrate hosts, storage, networks, applications, virtual environments,  and cloud technologies in secure enterprise architecture.
  • Respond to and recover from security incidents.
  • Conduct security assessments.
Prerequisites

To be fit for this advanced course,  you should have at least a foundational knowledge of information security.  This includes,  but is not limited to:

  • Knowledge of computer networking concepts and implementations,  such as the TCP/IP model and configuration of routers and switches.
  • Knowledge of cryptographic concepts and common implementations,  such as Secure Sockets Layer/Transport Layer Security (SSL/TLS) and public key infrastructure (PKI).
  • Knowledge of identity and access management (IAM) concepts and common implementations,  such as authentication factors and directory services.
  • Knowledge of common security technologies used to safeguard the enterprise,  such as anti-malware solutions,  firewalls, and VPNs.
Target Audience

This course is designed for IT professionals who want to acquire the technical knowledge and skills needed to conceptualize,  engineer,  integrate,  and implement secure solutions across complex enterprise environments.  The target student should aspire to apply critical thinking and judgment across a broad spectrum of security disciplines to propose and implement sustainable security solutions that map to organizational strategies;  translate business needs into security requirements;  analyze risk impact,  and respond to security incidents. This course is also designed for students who are seeking the CompTIA Advanced Security Practitioner (CASP+) certification and who want to prepare for Exam CAS-003.  Students seeking CASP+ certification should have at least 10 years of experience in IT management,  with at least 5 years of hands-on technical security experience.

Instructor: ITProTV

ITProTV delivers the IT instruction that you need to advance or launch your IT career in a fun and creative way. With attractive studios and an interactive, talk-show style format, you'll watch more and learn more. From CompTIA, Cisco, and Microsoft to Security and Cloud Fundamentals, you can learn it all. Dive deep into one or master many with the friendly faces of IT training.

  1. SUPPORTING IT GOVERNANCE AND RISK MANAGEMENT
1
Start
Overview
2
Start
So You Want To Setup a Lab
3
Start
Begin At The Beginning - Confidentiality
4
Start
Begin At The Beginning - Availability
5
Start
Governance And Risk Management: Overview
6
Start
Governance and Risk Management Risk Vocabulary
7
Start
Governance and Risk Management Risk Management
8
Start
Governance And Risk Management: Risk Analysis
9
Start
Assess Risks: What is a Security Framework
11
Start
Assess Risks: System Specific Risk Analysis
12
Start
Assess Risks: Risk Determination
13
Start
Assess Risks System Specific Risk Analysis
14
Start
Risk Mitigation: What Is A Aggregate CIA Score
15
Start
Risk Mitigation: What Are The CVSS And CVE
16
Start
Risk Mitigation: Risk Responses
17
Start
Risk Management Documentation: Best Practices
18
Start
Risk Management Documentation: BCP
19
Start
Risk Management Documentation: What Is A BIA
20
Start
Risk Management Documentation: Downtime
21
Start
Risk Management Documentation: Documents
22
Start
I.T. Governance And Risk Management - Key Points
  1. RESPONDING TO AND RECOVERING FROM INCIDENTS
10
Start
Assess Risks ESA Framework Assessment Process
173
Start
Incident Response Facilitators
174
Start
Incident Response Facilitators Part 2
175
Start
E-Discovery
176
Start
Incident Response Review Questions
177
Start
What is COOP
178
Start
CSIRTs and Common Tools
179
Start
Evidence Collection and Handling
180
Start
Types of Evidence
181
Start
Five Rules Of Evidence 5 B's
182
Start
Principles of Criminalistics
183
Start
Investigation Process
184
Start
Forensic Analysis of Compromised Systems
185
Start
What is the Order of Volatility
186
Start
Conducting Forensic Analysis with Autopsy
187
Start
Responding To Incidents - Key Points
  1. LEVERAGING COLLABORATION TO SUPPORT SECURITY
23
Start
Collaboration: GRC And Controls
24
Start
Collaboration: What Is An SCA
25
Start
Collaboration: Solutions
27
Start
Leveraging Collaboration - Key Points
  1. IMPLEMENTING SECURITY IN THE SYSTEMS AND SOFTWARE DEVELOPMENT LIFECYCLE
26
Start
What about Clickjacking and Cookie Hijacking
109
Start
Development Methodologies
110
Start
What are the SDLC Phases
111
Start
Security Requirements Traceability Matrix SRTM
112
Start
Common Software Development Approaches
113
Start
Common Software Development Methods
114
Start
What about Validation and Acceptance Testing
115
Start
SDLC Review Questions
116
Start
Secure vs Insecure Direct Object References
117
Start
Error Exception Handling Try...Catch Statements
118
Start
What is Privilege Escalation
119
Start
Overflows and Canaries
120
Start
Races and Exhaustion
121
Start
What is SQL Injection
122
Start
What is a Cross-Site Scripting XSS Attack
123
Start
Cross-Site Request Forgery XSRF/CSRF Attack
124
Start
What is security by
125
Start
Input Validation Fuzzing Application Sandboxing
126
Start
WS-Security DAM and Software Assurance Tech
127
Start
Implementing Security In The SDLC - Key Points
  1. USING RESEARCH AND ANALYSIS TO SECURE THE ENTERPRISE
28
Start
Research And Analysis: Industry Trends
29
Start
Research And Analysis: Artificial Intelligence
30
Start
Research and Analysis Requirements for Contracts
31
Start
Analyze Scenarios to Secure the Enterprise
32
Start
Using Research And Analysis - Key Points
  1. INTEGRATING ADVANCED AUTHENTICATION AND AUTHORIZATION TECHNIQUES
33
Start
Authentication and Access Control
34
Start
Authentication Factors and Controls
35
Start
Authentication Types
36
Start
Centralized Remote Authentication Services
37
Start
Deep Dive: RADIUS
38
Start
What Is Authorization/OAuth2.0
38
Start
Deep Dive: 802.1X
40
Start
What is XACML
41
Start
Trusts Models and Kerberos
42
Start
Trust Models and Kerberos Part 2
43
Start
Directory Services and LDAP
44
Start
Hands On: Establishing Peer Trusts
45
Start
Authentication And Authorization Review Questions
46
Start
Advanced Identity Concepts and Vocabulary
47
Start
Identity Federation Methods
48
Start
Advanced Identity Review Questions
49
Start
Authentication And Authorization: Key Points
  1. IMPLEMENTING CRYPTOGRAPHIC TECHNIQUES
50
Start
Encryption
51
Start
Hashing
52
Start
Digital Signatures
53
Start
Blockchain and Bitcoin
54
Start
Hands On: Configuring A Blockchain
55
Start
Public Key Infrastructure PKI - Design
56
Start
Public Key Infrastructure PKI - Concepts
57
Start
Cryptography Concepts
58
Start
Stream Vs. Block Ciphers
59
Start
Implement Cryptography
60
Start
Implementing Cryptographic Techniques - Key Points
  1. IMPLEMENTING SECURITY CONTROLS FOR HOSTS
61
Start
Host Concepts and Vocabulary
62
Start
Product Evaluation Models - TCSEC
63
Start
Product Evaluation Models - ITSEC
64
Start
Product Evaluation Models - Common Criteria
65
Start
What is a Trusted OS
66
Start
Types of Security Models
67
Start
Bell-LaPadula
68
Start
Biba
69
Start
Clark-Wilson and Others
70
Start
Access Control Concepts
71
Start
Role-Based Access Control (RBAC)
72
Start
Other Access Control Models
73
Start
Endpoint Security
74
Start
Host Review Questions
75
Start
Hardening Hosts Concepts and Vocabulary
76
Start
Peripherals
77
Start
Full Disk Encryption
78
Start
Hands-On: Hardening Windows Hosts, AppLocker
79
Start
Virtualization Concepts and Vocabulary
80
Start
Common VM Vulnerabilities
81
Start
Boot Loader Concepts and Vocabulary
82
Start
Hands-On: Creating Securing VM Using Virtualbox
83
Start
Hands-On: Protecting Boot Loaders
84
Start
Implementing Security Controls Hosts Key Points
  1. SECURITY CONTROLS FOR MOBILE DEVICES
85
Start
Mobile Deployment Models
86
Start
MDM Concepts and Vocabulary
87
Start
MDM Concepts and Vocabulary Part 2
88
Start
Storage
89
Start
Concepts and Vocabulary
90
Start
Concepts and Vocabulary Part 2
91
Start
Security Controls For Mobile Devices - Key Points
172
Start
Concepts And Vocabulary
  1. IMPLEMENTING NETWORK SECURITY
92
Start
What is a SIEM system
93
Start
Network Security Concepts and Vocabulary
94
Start
Hands-On Deploy Network Security Platform OPNsense
95
Start
SoC, BASs, ICS and SCADA
96
Start
Network-Enabled Devices Review Questions
97
Start
Remote Access and IPv6
98
Start
Network Authentication
99
Start
Network Topologies and SDN
100
Start
Optimizing Resource Placement
101
Start
Advanced Network Design Review Questions
102
Start
Network Security Controls Concepts Vocabulary
103
Start
VLANS and Network Data Flow
104
Start
DPI and HTTPS Inspection
105
Start
Network Device Configurations
106
Start
NAC and Alerting
107
Start
Hands On: Implementing Network Monitoring Ntopng
108
Start
Implementing Network Security - Key Points
  1. INTEGRATING ASSETS IN A SECURE ENTERPRISE ARCHITECTURE
128
Start
Integrate Best Practices in Enterprise Security
129
Start
Technical Deployment Models: What Is A Model
130
Start
Technical Deployment Models: What Is Cloud
131
Start
Cloud Security Services in the Enterprise
132
Start
Secure Design: Vocabulary And Concepts
133
Start
Secure Design: Vocabulary And Concepts Part 2
134
Start
Secure Design: Review Questions
135
Start
Data Security: Owners, Processors And Sovereignty
136
Start
Data Security: Data Flow Security
137
Start
Data Security: Data Remanence
138
Start
Data Security: Provisioning And Deprovisioning
139
Start
Data Security: Review Questions
140
Start
Enterprise Applications: What are They
141
Start
Enterprise Applications: Directory Svcs, DNS
142
Start
Enterprise Applications: Directory Svsc, DNS Pt.2
143
Start
Enterprise Applications: Hands On With DNS RRs
144
Start
DNSSEC, Zone Transfers And TSIGs
145
Start
DNSSEC, Zone Transfers And TSIG Part 2
146
Start
Integrating Assets - Key Points
147
Start
DNSSEC, Zone Transfers And TSIG Part 3
149
Start
Hands on With DNSSEC
150
Start
Enterprise Applications: Configuration Management
  1. CONDUCTING SECURITY ASSESSMENTS
148
Start
Security Assessments: Types
151
Start
Security Assessments: Application Code Review
152
Start
Going Deeper: Vulnerability Scanning
153
Start
Going Deeper: Testing Software
154
Start
Software Testing Types
155
Start
Software Testing Types Part 2
156
Start
Logs, Memory And Debugging
157
Start
Social Engineering
158
Start
OSINT, Self-Assessments And Teaming
159
Start
Security Assessments - Review Questions
160
Start
Vulnerability Scanner (Nikto)
161
Start
Port Scanner (Zenmap)
162
Start
Protocol Analyzer (Wireshark)
163
Start
Network Enumerator (Zenmap)
164
Start
Password Cracker (John The Ripper)
165
Start
Using a Fuzzer in Kali Linux
166
Start
HTTP Interceptor (Burp Suite)
167
Start
Exploitation Framework (Social-Engineer Toolkit)
168
Start
Log Analysis In Kali (Grep And Cut)
169
Start
OpenSCAP
170
Start
Reverse Engineering (Strace)
171
Start
Conducting Security Assessments - Key Points
EDUTAINMENT COURSE
?Instructor-led, video based E-Learning course.
USD 19
  • 23:30:00
    Hours of learning
  • Receive a Certificate of Excellence on successful completion
  • Presented by highly qualified, industry leading experts
  • 12 Months access
  • 10-Day money-back guarantee
Back to Top