CASP CompTIA Advanced Security Practitioner (2016)

Watch CASP CompTIA Advanced Security Practitioner (2016)

  • 2015
  • 2 Seasons

CASP CompTIA Advanced Security Practitioner (2016) is a training course offered by Wiley, designed for experienced IT professionals who wish to build and enhance their skills in cybersecurity. The course focuses on the implementation of advanced security solutions within the organization's infrastructure, with an emphasis on risk management and mitigation.

CASP stands for CompTIA Advanced Security Practitioner, which is a vendor-neutral certification that has been designed to test the knowledge and skills of the candidates in relation to enterprise security operations. The course is designed to provide the knowledge and skills required to architects, engineers, and security professionals to successfully design, plan, and implement security solutions for their organization.

The CASP certification is ideal for IT professionals who have a minimum of 10 years of experience in IT administration, with at least five years of hands-on technical security experience. The course is also suitable for mid-level to senior-level security professionals, who are seeking to enhance their skills and knowledge in the field of cybersecurity.

CASP CompTIA Advanced Security Practitioner (2016) is divided into five modules, each addressing a specific aspect of enterprise security operations. The course starts with a module on enterprise security architecture, which covers the design, development, and implementation of secure enterprise systems. The module also focuses on various security models and their implementation.

The second module of the course focuses on risk management, which covers the identification, assessment, and mitigation of security risks that are specific to the organization. The module also covers the development of security policies and the management of security incidents within the organization.

The third module of the course is on research and analysis, which provides an overview of various security tools and techniques that are commonly used in the security operations of an organization. The module also covers the technical aspects of conducting security audits and assessments, as well as the different approaches to researching and analyzing security threats.

The fourth module of the course is on integration of computing, communication, and business disciplines, which covers the integration of security solutions with the overall business strategy of the organization. The module also provides an overview of various communication technologies that are commonly used in the security operations of an organization.

The fifth and final module of the course is on enterprise security operations, which covers the implementation, monitoring, and management of various security solutions within the organization. The module also provides an overview of various security standards and regulatory frameworks that are commonly used in enterprise security operations.

Overall, CASP CompTIA Advanced Security Practitioner (2016) is a comprehensive course that provides the knowledge and skills required to design, implement, and manage security solutions within an organization. The course is designed for experienced IT professionals who wish to enhance their skills in the field of cybersecurity, and it provides a solid foundation for the CASP certification.

Filter by Source
No sources available
Seasons
Module 5: Lesson 28: Communication and Professionalism
28. Module 5: Lesson 28: Communication and Professionalism
April 18, 2016
Now we come to the last lesson of the course. Your communication skills and demeanor will make you or break you in the IT field. Even the most knowledgeable technician will be reprimanded if there is a lack of professionalism. Remember to always provide clear communications with your customers and treat them in a professional manner.
Module 5: Lesson 27: Incident Response and Prohibited Content
27. Module 5: Lesson 27: Incident Response and Prohibited Content
April 18, 2016
When incidents occur, they need to be approached carefully and methodically, and should be documented every step of the way. Special care should be taken when it comes to content. It might be prohibited, or it might require special licensing. In this lesson, we'll talk about incident response and the step-by-step procedure you can implement to make that task go smoothly.
Module 5: Lesson 26: Environmental Concerns
26. Module 5: Lesson 26: Environmental Concerns
April 18, 2016
Your operational procedures should also encompass the environment. Products such as toner cartridges and batteries need to be disposed of properly. HVAC systems need to be used correctly and maintained periodically. Power issues should be planned for early on. Dirty and dusty environments should be considered carefully if computers need to operate within them.
Module 5: Lesson 25: Safety Procedures
25. Module 5: Lesson 25: Safety Procedures
April 18, 2016
Safety should always be foremost on your mind. When installing, configuring, or troubleshooting systems, always remember to implement safety procedures whenever possible. This lesson covers ESD Prevention, such as with an anti-static strap, Equipment Grounding, Toxic Waste Handling, and Personal Safety.
Module 4: Lesson 23: Troubleshooting Mobile OS Issues
23. Module 4: Lesson 23: Troubleshooting Mobile OS Issues
April 18, 2016
Now, we'll turn our attention to the mobile device. Troubleshooting mobile devices in some ways is very similar to troubleshooting desktop computers. The methodologies are the same, however, the potential culprits you will find can differ. And the tools used to solve problems can be different as well.
Module 4: Lesson 21: Troubleshooting Operating System Problems
21. Module 4: Lesson 21: Troubleshooting Operating System Problems
April 18, 2016
As we have mentioned before, troubleshooting ability is vital. Above all else, your job as a technician will be to fix problems. This lesson focuses in on repairing issues within operating systems. We'll start with a review ofthe comp TIA a plus six step troubleshooting theory. Then we'll move into the types of failures you can expect to see in Windows.
Module 3: Lesson 20: SOHO Security
20. Module 3: Lesson 20: SOHO Security
April 18, 2016
The small office home office environment often has the most vulnerabilities. This lesson is designed to show you, in a hands-on manner, how to protect SOHO networks. It all starts with the SOHO router, that four or eight port all in one networking device that you use to connect everything together. All the computers, the internet, you name it.
Module 3: Lesson 19: Data Disposal and Destruction
19. Module 3: Lesson 19: Data Disposal and Destruction
April 18, 2016
In this lesson, we briefly discuss the ways that you can wipe drives of their data securely, in an effort to recycle them. We'll also talk about physical destruction of hard drives, from a security standpoint, mind you. And why you might need to actually destroy your company's equipment.
Module 3: Lesson 18: Workstation Security - Best Practices
18. Module 3: Lesson 18: Workstation Security - Best Practices
April 18, 2016
Let's get back into the mindset of the security administrator and discuss some best practices when it comes to Windows security. When apply these practices in Windows whenever possible. While this lesson focuses on Windows, a lot of the concepts can be applied to other operating systems, such as OS 10 and Linux.
Module 3: Lesson 17: Windows Security Settings
17. Module 3: Lesson 17: Windows Security Settings
April 18, 2016
Let's get into the Window's operating system and demonstrate some actual ways to protect the OS. We'll begin with securing users and groups, such as the administrator account, and the standard user group, then we'll show how to secure shared folders, and describe how NTFSpermissions function.
Module 3: Lesson 16: Common Security Methods
16. Module 3: Lesson 16: Common Security Methods
April 18, 2016
Now let's get into more of the methods that IT people use to protect their systems. We'll begin with physical security, such as locks, biometrics, ID badges, and smart cards. Then we'll discuss and demonstrate digital security methods such as AV software, firewalls, and authentication.
Module 3: Lesson 15: Security Threats and Vulnerabilities
15. Module 3: Lesson 15: Security Threats and Vulnerabilities
April 18, 2016
You should always consider the security of your operating system, applications, data, and physical hardware. All systems are inherently vulnerable. Especially if they connect to other systems and the internet and if they use removable media. There are a vast number of potential threats based on a system's vulnerabilities.
Module 2: Lesson 13: Mobile Device Connectivity
13. Module 2: Lesson 13: Mobile Device Connectivity
April 18, 2016
What's a mobile device without connectivity? For most people, a paperweight with a pretty screen. The typical user needs to have connectivity to the internet via 4G LTE and wifi plus connectivity via Bluetooth. Then there's the all-important applications such as email and web browsing to consider.
Module 2: Lesson 12: Mobile OS Features
12. Module 2: Lesson 12: Mobile OS Features
April 18, 2016
Android and iOS have been battling it out for years, but as a technician, you need to know both operating systems plus mobile Windows operating systems in order to be successful. So, if you have any favorites, try to remember that technology is neutral and that different people will use different technologies for different things. Know it all so that you can be a powerhouse technician.
Module 2: Lesson 11: Servers and Networked Hosts
11. Module 2: Lesson 11: Servers and Networked Hosts
April 18, 2016
We've discussed the cloud and virtualization but what does all this technology usually boil down to? Servers. Whether physical or virtual, local or remote, servers are what makes the internet what it is and servers are what provide data to the masses. But what is a server? A server is a more powerful computer than your typical client.
Module 2: Lesson 10: The Cloud
10. Module 2: Lesson 10: The Cloud
April 18, 2016
We referred to the Cloud several times in the last lesson. Now in this lesson, we'll discuss it in more depth. The Cloud is essentially anything that a user can connectto on the internet. It consists of servers and services, software, applications, infrastructure and platforms. A basic example is web based email.
Module 2: Lesson 9: Client-side Virtualization
9. Module 2: Lesson 9: Client-side Virtualization
April 18, 2016
Did you ever want to run a different operating system within your current one? That's what virtualization is all about. You can run Windows 7 within Windows 8, or Windows Server within Windows 7. You can run apps and web browsers as virtual machines. Just about anything can be run virtually. But in this lesson, we'll focus on how guest operating systemsare run on a host computer.
Module 2: Lesson 8: OS X and Linux
8. Module 2: Lesson 8: OS X and Linux
April 18, 2016
Hey, it's not all about Windows. Yes, Windows has a huge majority of the desktop operating system market, but there are other operating systems to consider, including Apple's OS X and Linux. Macs are used by all kinds of people including audio-video editors, photographers, graphic designers, CAD technicians, musicians.
Module 1: Lesson 7: Preventative Maintenance for Windows
7. Module 1: Lesson 7: Preventative Maintenance for Windows
April 18, 2016
You know that saying, an ounce of prevention is worth a pound of cure. Some problems are almost guaranteed to happen. And when they do, you might spend hours fixing them properly. But, you might be able to spend 10 or 15 minutes at an early stage of the life cycle of a system and prevent those problem from happening.
Module 1: Lesson 6: Windows Networking
6. Module 1: Lesson 6: Windows Networking
April 18, 2016
Computer networking is a big portion of the A+ exam. This lesson focuses on what you need to know to become a proficient networker with Windows operating systems. Remember that the goal here is connectivity. Connections from one client to another. From clients to servers and from clients out to the internet.
Module 1: Lesson 5: Command Prompt Tools
5. Module 1: Lesson 5: Command Prompt Tools
April 18, 2016
The command line interface, or CLI, is the other place where admins make their abode. You can do basic things in the CLI and extremely advanced configurations as well. In some cases, the graphical user interface, or GUI, has no solution for you and the CLI, the command line, is the only place you can go.
Module 1: Lesson 4: Windows Features and Tools
4. Module 1: Lesson 4: Windows Features and Tools
April 18, 2016
Now we'll dig deeper into Windows and get into some more complex features and tools. At this point we're transcending beyond the mere user level and are moving into the realm of the administrator, or just admin for short. We'll begin where administrators live with administrative tools. This is an entire group of advanced utilities you will use to configure Windows
Module 1: Lesson 3: Windows Control Panel Utilities
3. Module 1: Lesson 3: Windows Control Panel Utilities
April 18, 2016
Different versions of Windows appear to be different from a graphical user interface standpoint, but really, they are all quite similar. One of the unifying features in Windows is the control panel. This is where you configure Windows to your liking. It has many programs represented by icons that you will use on a daily basis.
Module 1: Lesson 2: Installing Windows
2. Module 1: Lesson 2: Installing Windows
April 18, 2016
A computer isn't much without an operating system. There are several options when it comes to operating system selection, but by far, Windows is the most common. This lesson digs into how to install Windows to a desktop or a laptop computer. We begin with the boot methods you can select for your installation such as DVD-ROM, USB, over the network and so on.
Description
  • Premiere Date
    January 1, 2015