CompTIA CAS-001: Advanced Security Practitioner (CASP)


CompTIA CAS-001: Advanced Security Practitioner (CASP), Singapore elarning online course

Course Description

The CASP exam covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers, while managing risk.

Ace your certification examination with this preparation course!

- Learn of the examination outline before sitting for your certification
- Know and understand the topics that may be covered in your examinations
- Understand theory aspects of the examination


Course Objectives

  1. Cryptography
  2. Virtual Computing
  3. IPv6
  4. Firewall and VPN
  5. Single Sign-On
  6. Secure System Life Cycle


Related Courses

  • 1st step to certification: Troubleshooting and Maintaining Cisco IP Networks (642-832 TSHOOT)

    1st step to certification: Troubleshooting and Maintaining Cisco IP Networks (642-832 TSHOOT)

    SGD $45.00

    Course Description

    The Cisco 642-832 exam is one of the three required exams for the Cisco CCNP Certification. Passing this exam in conjunction with the ROUTE and SWITCH exams will earn you the CCNP (Cisco Certified Network Professional) certification, which is an excellent validation that you are knowledgable about the most current Cisco software and best practices. This course will teach you the basics of troubleshooting and walk you through several scenarios to put these methods to the test. Be fully prepared for your certifications exams!- Learn of the examination outline before sitting for your certification - Know and understand the topics that may be covered in your examinations- Learn and understand the chapters for each tailored certification - Go through past questions to have a feel of the examinationsThis course is SkillsFuture Credit Eligible.

    Read more...

  • CompTIA Cloud Overview

    CompTIA Cloud Overview

    SGD $299.00

    Course Description

    The CompTIA Cloud Essential certification is applicable to a wide range of IT professionals. This course is geared towards IT professionals currently in or looking for positions as IT consultants, IT technical services, IT relationship managers, IT architects, consultants and business process owners analysts.This course is the first step on a training path that leads to a technical career in cloud computing. Ace your certification examination with this preparation course! - Learn of the examination outline before sitting for your certification  - Know and understand the topics that may be covered in your examinations - Understand theory aspects of the examination

    Read more...

  • Database Fundamentals (98-364)

    Database Fundamentals (98-364)

    SGD $40.00

    Course Description

    Database administration, design and development continue to be some of the most sought-after skills in Information Technology, but where do you start to learn such a big topic? In this course, Mark Long teaches you the fundamentals about Microsoft's SQL Server database management system to help you take the first step on a path to becoming part of this exciting field. Mark has worked with SQL Server for almost 20 years and brings his experience along to present database fundamentals in an easy to understand manner to get you started. This course will also help you prepare to take Microsoft's 98-364 Database Fundamentals MTA exam so you can become Microsoft certified right away.Be fully prepared for your certifications exams!- Learn of the examination outline before sitting for your certification - Know and understand the topics that may be covered in your examinations- Learn and understand the chapters for each tailored certification - Go through past questions to have a feel of the examinations

    Read more...


Content

CompTIA CAS-001: Advanced Security Practitioner (CASP)

+
Content
  • Module 1: Underlying Security Models
    • 1.0 Course Guide
    • 1.1 Underlying Security Models Part 1
    • 1.2 Underlying Security Models Part 2
    • 1.3 Underlying Security Models Part 3
    • 1.4 Underlying Security Models Part 4
    • 1.5 Underlying Security Models Part 5
    • 1.6 Underlying Security Models Part 6
    • 1.7 Underlying Security Models Part 7
    • 1.8 General Security Part 1
    • 1.9 General Security Part 2
  • Module 2: Selecting Security
    • 2.0 Selecting Security Products Part 1
    • 2.1 Selecting Security Products Part 2
    • 2.2 Selecting Security Products Part 3
    • 2.3 Control Selection Process Part 1
    • 2.4 Control Selection Process Part 2
  • Module 3: Cryptography
    • 3.0 Cryptography Symmetric and Asymmetric Part 1
    • 3.1 Cryptography Symmetric and Asymmetric Part 2
    • 3.2 Cryptography Symmetric and Asymmetric Part 3
    • 3.3 Cryptography Symmetric and Asymmetric Part 4
    • 3.4 Cryptography Message Integrity Controls Part 1
    • 3.5 Cryptography Message Integrity Controls Part 2
    • 3.6 Cryptography Message Integrity Controls Part 3
    • 3.7 Cryptography Digital Signatures Part 1
    • 3.8 Cryptography Digital Signatures Part 2
    • 3.9 Cryptography PKI and PGP Part 1
    • 3.10 Cryptography PKI and PGP Part 2
    • 3.11 Cryptography PKI and PGP Part 3
    • 3.12 Cryptography PKI and PGP Part 4
  • Module 4: Storage
    • 4.0 Storage Part 1
    • 4.1 Storage Part 2
    • 4.2 Storage Part 3
    • 4.3 Storage Part 4
  • Module 5: Virtual Computing
    • 5.0 Virtual Computing
    • 5.1 Cloud Computing Part 1
    • 5.2 Cloud Computing Part 2
    • 5.3 Cloud Computing Part 3
    • 5.4 Cloud Computing Part 4
    • 5.5 Cloud Computing Part 5
  • Module 6: IPv6
    • 6.0 IPV6 Part 1
    • 6.1 IPV6 Part 2
  • Module 7: Remote Access Security
    • 7.0 Remote Access Security Part 1
    • 7.1 Remote Access Security Part 2
  • Module 8: Domain Name System
    • 8.0 Domain Name System Part 1
    • 8.1 Domain Name System Part 2
    • 8.2 Domain Name System Part 3
    • 8.3 Domain Name System Part 4
    • 8.4 Domain Name System Part 5
    • 8.5 Domain Name System Part 6
    • 8.6 Domain Name System Part 7
    • 8.7 Domain Name System Part 8
  • Module 9: Directory Services
    • 9.0 Directory Services
  • Module 10: Firewall and VPN
    • 10.0 Firewall and VPN Part 1
    • 10.1 Firewall and VPN Part 2
    • 10.2 Firewall and VPN Part 3
    • 10.3 Firewall and VPN Part 4
    • 10.4 Firewall Policy Part 1
    • 10.5 Firewall Policy Part 2
    • 10.6 Firewall Policy Part 3
    • 10.7 Firewall Policy Part 4
  • Module 11: Security Configuration Management
    • 11.0 Security Configuration Management Part 1
    • 11.1 Security Configuration Management Part 2
    • 11.2 Security Configuration Management Part 3
  • Module 12: Network Infrastructure Security
    • 12.0 Network Infrastructure Security Part 1
    • 12.1 Network Infrastructure Security Part 2
    • 12.2 Network Infrastructure Security Part 3
    • 12.3 Network Infrastructure Security Part 4
  • Module 13: Secure Web Services
    • 13.0 Secure Web Services Part 1
    • 13.1 Secure Web Services Part 2
    • 13.2 OWASP top Ten Part 1
    • 13.3 OWASP top Ten Part 2
    • 13.4 OWASP top Ten Part 3
    • 13.5 OWASP top Ten Part 4
    • 13.6 OWASP top Ten Part 5
  • Module 14: Buffer Overflows
    • 14.0 Buffer Overflows Part 1
    • 14.1 Buffer Overflows Part 2
  • Module 15: SQL Injection
    • 15.0 SQL Injection Part 1
    • 15.1 SQL Injection Part 2
  • Module 16: Access Control
    • 16.0 Access Control Part 1
    • 16.1 Access Control Part 2
  • Module 17: Single Sign-On
    • 17.0 Single Sign-On Part 1
    • 17.1 Single Sign-On Part 2
    • 17.2 Single Sign-On Part 3
  • Module 18: Risk Assessment
    • 18.0 Risk Assessment Part 1
    • 18.1 Risk Assessment Part 2
  • Module 19: Testing and Assessment
    • 19.0 Testing and Assessment Part 1
    • 19.1 Testing and Assessment Part 2
    • 19.2 Testing and Assessment Part 3
  • Module 20: Common Vulnerability
    • 20.0 Common Vulnerability Scoring System Part 1
    • 20.1 Common Vulnerability Scoring System Part 2
    • 20.2 Common Vulnerability Scoring System Part 3
    • 20.3 Common Vulnerability Scoring System Part 4
  • Module 21: Common Criteria
    • 21.0 Common Criteria Part 1
    • 21.1 Common Criteria Part 2
    • 21.2 Common Criteria Part 3
    • 21.3 Common Criteria Part 4
    • 21.4 Common Criteria Part 5
  • Module 22: Personally Identifiable Information
    • 22.0 Personally Identifiable Information Part 1
    • 22.1 Personally Identifiable Information Part 2
  • Module 23: Risk Management
    • 23.0 Risk Management Part 1
    • 23.1 Risk Management Part 2
    • 23.2 Risk Management Part 3
  • Module 24: Frameworks
    • 24.0 Frameworks Part 1
    • 24.1 Frameworks Part 2
    • 24.2 Frameworks Part 3
    • 24.3 Frameworks Part 4
  • Module 25: Interconnecting Systems
    • 25.0 Interconnecting Systems Part 1
    • 25.1 Interconnecting Systems Part 2
  • Module 26: Security Services
    • 26.0 Security Services Part 1
    • 26.1 Security Services Part 2
    • 26.2 Security Services Part 3
    • 26.3 Security Services Part 4
  • Module 27: Continuous Monitoring
    • 27.0 Continuous Monitoring Part 1
    • 27.1 Continuous Monitoring Part 2
    • 27.2 Continuous Monitoring Part 3
    • 27.3 Continuous Monitoring Part 4
  • Module 28: Incident Handling
    • 28.0 Incident Handling Part 1
    • 28.1 Incident Handling Part 2
    • 28.2 Incident Handling Part 3
    • 28.3 Incident Handling Part 4
  • Module 29: Forensic & Incident Response
    • 29.0 Forensic and Incident Response Part 1
    • 29.1 Forensic and Incident Response Part 2
    • 29.2 Forensic and Incident Response Part 3
  • Module 30: Requirements Processing
    • 30.0 Requirements Processing Part 1
    • 30.1 Requirements Processing Part 2
    • 30.2 Requirements Processing Part 3
  • Module 31: Standards Bodies
    • 31.0 Standards Bodies
  • Module 32: Secure System Life Cycle
    • 32.0 Secure System Life Cycle Part 1
    • 32.1 Secure System Life Cycle Part 2
    • 32.2 Secure System Life Cycle Part 3
  • Module 33: Email
    • 33.0 Email
  • Module 34: Mobile and BYOD
    • 34.0 Mobile and BYOD Part 1
    • 34.1 Mobile and BYOD Part 2
  • Module 35: Voiceover IP
    • 35.0 Voice over IP
  • Module 36: Physical Facilities Assessment Process
    • 36.0 Physical Facilities Assessment Process Part 1
    • 36.1 Physical Facilities Assessment Process Part 2
  • Module 37: Security Requirements Traceability Matrix
    • 37.0 Security Requirements Traceability Matrix
SGD $299.00
(Price excludes GST)
GET ACCESS NOW
Convince your boss email
This site is best viewed using the latest versions of Google Chrome, Apple Safari, Mozilla FireFox, Microsoft Internet Explorer 11 and Edge which supports HTML5/Webkit technologies.