CompTIA CAS-001: Advanced Security Practitioner (CASP)


CompTIA CAS-001: Advanced Security Practitioner (CASP), Singapore elarning online course

Course Description

The CASP exam covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers, while managing risk.

Ace your certification examination with this preparation course!

- Learn of the examination outline before sitting for your certification
- Know and understand the topics that may be covered in your examinations
- Understand theory aspects of the examination


Course Objectives

  1. Cryptography
  2. Virtual Computing
  3. IPv6
  4. Firewall and VPN
  5. Single Sign-On
  6. Secure System Life Cycle


Related Courses

  • Certification at Your Fingertips - Microsoft 70-342: Advanced Solutions of Exchange Server 2013

    Certification at Your Fingertips - Microsoft 70-342: Advanced Solutions of Exchange Server 2013

    SGD $299.00

    Course Description

    This course covers the following topics in order to prepare students for the Microsoft 70-342 Advanced Solutions of Exchange Server 2013 exam: how to configure, manage, and migrate unified messaging, how to design, configure, and manage site resiliency, how to design, configure, and manage advanced security, how to configure and manage compliance, archiving, and discovery solutions, and how to implement and manage coexistence, hybrid scenarios, migration, and federation. Ace your certification examination with this preparation course! - Learn of the examination outline before sitting for your certification  - Know and understand the topics that may be covered in your examinations - Understand theory aspects of the examination

    Read more...

  • Certification at Your Fingertips - Microsoft 70 -685 Pro: Windows 7, Enterprise Desktop Support Technician

    Certification at Your Fingertips - Microsoft 70 -685 Pro: Windows 7, Enterprise Desktop Support Technician

    SGD $589.00

    Course Description

    Practice Lab  This course comes with a Remote Practice Environment, a virtual remote environment; where you are able to practically apply the skills you have learned on the respective server, systems and networks. With this platform, get one step ahead in your preparation for your certification exams! Whether it’s Cisco, Microsoft or VMware, our Practice Lab unifies access to all of these vendors through a web browser interface. Pre-configured hardware layouts with accompanying lab guides for fast, convenient access to gain hands on experience. With step-by-step instructions covering thousands of practical tasks across Cisco, Microsoft, VMware and CompTIA exam titles, the Practice Lab makes studying for an exam or learning new technologies an engaging experience. What this course prepares you for: This course covers the following topics in order to prepare students for the Microsoft 70-685 Pro: Windows 7, Enterprise Desktop Support Technician exam: Identifying cause of and resolving desktop application issues, identifying cause of and resolving networking issues, managing and maintaining systems that run Windows 7 client, supporting mobile users. and identifying cause of and resolving security issues. Be fully prepared for the examinations with the correct knowledge and skills in order to ace the examination.   Ace your certification examination with this preparation course! - Learn of the examination outline before sitting for your certification  - Know and understand the topics that may be covered in your examinations - Understand both practical and theory aspects of the examination - Apply the practical skills through the Remote Practice Environment

    Read more...

  • Certification at Your Fingertips - Certified Information Systems Security Pro (CISSP)

    Certification at Your Fingertips - Certified Information Systems Security Pro (CISSP)

    SGD $299.00

    Course Description

    Developed and maintained by the International Information Systems Security Certification Consortium (ISC)2, CISSP is a premium, vendor-neutral certification that recognizes mastery of an international standard for information security and understanding of a Common Body of Knowledge (CBK). The CISSP course provides you with the knowledge and skills to pass the CISSP certification, after which you'll have the ability to manage, operate, develop and plan an effective network security infrastructure. This certification gives students the opportunity to demonstrate their level of competence with the various domains of the compendium of best practices for information security. Ace your certification examination with this preparation course! - Learn of the examination outline before sitting for your certification  - Know and understand the topics that may be covered in your examinations - Understand theory aspects of the examination

    Read more...


Content

CompTIA CAS-001: Advanced Security Practitioner (CASP)

+
Content
  • Module 1: Underlying Security Models
    • 1.0 Course Guide
    • 1.1 Underlying Security Models Part 1
    • 1.2 Underlying Security Models Part 2
    • 1.3 Underlying Security Models Part 3
    • 1.4 Underlying Security Models Part 4
    • 1.5 Underlying Security Models Part 5
    • 1.6 Underlying Security Models Part 6
    • 1.7 Underlying Security Models Part 7
    • 1.8 General Security Part 1
    • 1.9 General Security Part 2
  • Module 2: Selecting Security
    • 2.0 Selecting Security Products Part 1
    • 2.1 Selecting Security Products Part 2
    • 2.2 Selecting Security Products Part 3
    • 2.3 Control Selection Process Part 1
    • 2.4 Control Selection Process Part 2
  • Module 3: Cryptography
    • 3.0 Cryptography Symmetric and Asymmetric Part 1
    • 3.1 Cryptography Symmetric and Asymmetric Part 2
    • 3.2 Cryptography Symmetric and Asymmetric Part 3
    • 3.3 Cryptography Symmetric and Asymmetric Part 4
    • 3.4 Cryptography Message Integrity Controls Part 1
    • 3.5 Cryptography Message Integrity Controls Part 2
    • 3.6 Cryptography Message Integrity Controls Part 3
    • 3.7 Cryptography Digital Signatures Part 1
    • 3.8 Cryptography Digital Signatures Part 2
    • 3.9 Cryptography PKI and PGP Part 1
    • 3.10 Cryptography PKI and PGP Part 2
    • 3.11 Cryptography PKI and PGP Part 3
    • 3.12 Cryptography PKI and PGP Part 4
  • Module 4: Storage
    • 4.0 Storage Part 1
    • 4.1 Storage Part 2
    • 4.2 Storage Part 3
    • 4.3 Storage Part 4
  • Module 5: Virtual Computing
    • 5.0 Virtual Computing
    • 5.1 Cloud Computing Part 1
    • 5.2 Cloud Computing Part 2
    • 5.3 Cloud Computing Part 3
    • 5.4 Cloud Computing Part 4
    • 5.5 Cloud Computing Part 5
  • Module 6: IPv6
    • 6.0 IPV6 Part 1
    • 6.1 IPV6 Part 2
  • Module 7: Remote Access Security
    • 7.0 Remote Access Security Part 1
    • 7.1 Remote Access Security Part 2
  • Module 8: Domain Name System
    • 8.0 Domain Name System Part 1
    • 8.1 Domain Name System Part 2
    • 8.2 Domain Name System Part 3
    • 8.3 Domain Name System Part 4
    • 8.4 Domain Name System Part 5
    • 8.5 Domain Name System Part 6
    • 8.6 Domain Name System Part 7
    • 8.7 Domain Name System Part 8
  • Module 9: Directory Services
    • 9.0 Directory Services
  • Module 10: Firewall and VPN
    • 10.0 Firewall and VPN Part 1
    • 10.1 Firewall and VPN Part 2
    • 10.2 Firewall and VPN Part 3
    • 10.3 Firewall and VPN Part 4
    • 10.4 Firewall Policy Part 1
    • 10.5 Firewall Policy Part 2
    • 10.6 Firewall Policy Part 3
    • 10.7 Firewall Policy Part 4
  • Module 11: Security Configuration Management
    • 11.0 Security Configuration Management Part 1
    • 11.1 Security Configuration Management Part 2
    • 11.2 Security Configuration Management Part 3
  • Module 12: Network Infrastructure Security
    • 12.0 Network Infrastructure Security Part 1
    • 12.1 Network Infrastructure Security Part 2
    • 12.2 Network Infrastructure Security Part 3
    • 12.3 Network Infrastructure Security Part 4
  • Module 13: Secure Web Services
    • 13.0 Secure Web Services Part 1
    • 13.1 Secure Web Services Part 2
    • 13.2 OWASP top Ten Part 1
    • 13.3 OWASP top Ten Part 2
    • 13.4 OWASP top Ten Part 3
    • 13.5 OWASP top Ten Part 4
    • 13.6 OWASP top Ten Part 5
  • Module 14: Buffer Overflows
    • 14.0 Buffer Overflows Part 1
    • 14.1 Buffer Overflows Part 2
  • Module 15: SQL Injection
    • 15.0 SQL Injection Part 1
    • 15.1 SQL Injection Part 2
  • Module 16: Access Control
    • 16.0 Access Control Part 1
    • 16.1 Access Control Part 2
  • Module 17: Single Sign-On
    • 17.0 Single Sign-On Part 1
    • 17.1 Single Sign-On Part 2
    • 17.2 Single Sign-On Part 3
  • Module 18: Risk Assessment
    • 18.0 Risk Assessment Part 1
    • 18.1 Risk Assessment Part 2
  • Module 19: Testing and Assessment
    • 19.0 Testing and Assessment Part 1
    • 19.1 Testing and Assessment Part 2
    • 19.2 Testing and Assessment Part 3
  • Module 20: Common Vulnerability
    • 20.0 Common Vulnerability Scoring System Part 1
    • 20.1 Common Vulnerability Scoring System Part 2
    • 20.2 Common Vulnerability Scoring System Part 3
    • 20.3 Common Vulnerability Scoring System Part 4
  • Module 21: Common Criteria
    • 21.0 Common Criteria Part 1
    • 21.1 Common Criteria Part 2
    • 21.2 Common Criteria Part 3
    • 21.3 Common Criteria Part 4
    • 21.4 Common Criteria Part 5
  • Module 22: Personally Identifiable Information
    • 22.0 Personally Identifiable Information Part 1
    • 22.1 Personally Identifiable Information Part 2
  • Module 23: Risk Management
    • 23.0 Risk Management Part 1
    • 23.1 Risk Management Part 2
    • 23.2 Risk Management Part 3
  • Module 24: Frameworks
    • 24.0 Frameworks Part 1
    • 24.1 Frameworks Part 2
    • 24.2 Frameworks Part 3
    • 24.3 Frameworks Part 4
  • Module 25: Interconnecting Systems
    • 25.0 Interconnecting Systems Part 1
    • 25.1 Interconnecting Systems Part 2
  • Module 26: Security Services
    • 26.0 Security Services Part 1
    • 26.1 Security Services Part 2
    • 26.2 Security Services Part 3
    • 26.3 Security Services Part 4
  • Module 27: Continuous Monitoring
    • 27.0 Continuous Monitoring Part 1
    • 27.1 Continuous Monitoring Part 2
    • 27.2 Continuous Monitoring Part 3
    • 27.3 Continuous Monitoring Part 4
  • Module 28: Incident Handling
    • 28.0 Incident Handling Part 1
    • 28.1 Incident Handling Part 2
    • 28.2 Incident Handling Part 3
    • 28.3 Incident Handling Part 4
  • Module 29: Forensic & Incident Response
    • 29.0 Forensic and Incident Response Part 1
    • 29.1 Forensic and Incident Response Part 2
    • 29.2 Forensic and Incident Response Part 3
  • Module 30: Requirements Processing
    • 30.0 Requirements Processing Part 1
    • 30.1 Requirements Processing Part 2
    • 30.2 Requirements Processing Part 3
  • Module 31: Standards Bodies
    • 31.0 Standards Bodies
  • Module 32: Secure System Life Cycle
    • 32.0 Secure System Life Cycle Part 1
    • 32.1 Secure System Life Cycle Part 2
    • 32.2 Secure System Life Cycle Part 3
  • Module 33: Email
    • 33.0 Email
  • Module 34: Mobile and BYOD
    • 34.0 Mobile and BYOD Part 1
    • 34.1 Mobile and BYOD Part 2
  • Module 35: Voiceover IP
    • 35.0 Voice over IP
  • Module 36: Physical Facilities Assessment Process
    • 36.0 Physical Facilities Assessment Process Part 1
    • 36.1 Physical Facilities Assessment Process Part 2
  • Module 37: Security Requirements Traceability Matrix
    • 37.0 Security Requirements Traceability Matrix
SGD $299.00
(Price excludes GST)
GET ACCESS NOW
Convince your boss email
This site is best viewed using the latest versions of Google Chrome, Apple Safari, Mozilla FireFox, Microsoft Internet Explorer 11 and Edge which supports HTML5/Webkit technologies.