Get 10% Discount on Your Purchase When You Sign Up for Email

Passguide Products

Enter Your Email Address to Receive Your 10%
OFF
Discount Code Plus... Our Exclusive Weekly Deals

* We value your privacy. We will not rent or sell your email address
Loading...
CompTIA Advanced Security Practitioner (CASP+) CAS-004 Video Course

CAS-004: CompTIA Advanced Security Practitioner (CASP+) CAS-004

Your CompTIA CAS-004 exam is just around the corner, right? So, it's high time to find an effective preparation tool! Our training course is what you really need! This is a series of videos led by the experienced IT instructors who will provide you with a detailed overview of the CAS-004 certification test. Ace your CompTIA CAS-004 at the first attempt and obtain the CompTIA Advanced Security Practitioner (CASP+) CAS-004 credential with ease.

# of Students
144
# of Lectures
271
Course Length
5 h
Course Rating
5.0
Price $27.49
Today $24.99

Curriculum for CAS-004 Video Course

Data Considerations (Domain 4)

  Video Name Time
  1. Data Considerations (OBJ 4.3) 1:00
  2. Data Security (OBJ. 4.3) 4:00
  3. Data Classification (OBJ. 4.3) 3:00
  4. Data Types (OBJ. 4.3) 5:00
  5. Data Retention (OBJ. 4.3) 7:00
  6. Data Destruction (OBJ. 4.3) 3:00
  7. Data Ownership (OBJ. 4.3) 6:00
  8. Data Sovereignty (OBJ. 4.3) 3:00
  Video Name Time
  1. Risk Management (OBJ 4.1) 2:00
  2. Risk Strategies (OBJ. 4.1) 5:00
  3. Risk Management Lifecycle (OBJ. 4.1) 12:00
  4. Risk Types (OBJ. 4.1) 3:00
  5. Risk Handling (OBJ. 4.1) 9:00
  6. Risk Tracking (OBJ. 4.1) 5:00
  7. Risk Assessment (OBJ. 4.1) 18:00
  8. When Risk Management Fails (OBJ. 4.1) 4:00
  Video Name Time
  1. Policies and Frameworks (OBJ. 4.1 & 4.3) 1:00
  2. Policies (OBJ. 4.1) 12:00
  3. Frameworks (OBJ. 4.1) 5:00
  4. Regulations (OBJ. 4.3) 8:00
  5. Standards (OBJ. 4.3) 6:00
  6. Contracts and Agreements (OBJ. 4.3) 9:00
  7. Legal Considerations (OBJ. 4.3) 7:00
  8. Integrating Industries (OBJ. 4.3) 3:00
  Video Name Time
  1. Business Continuity (OBJ 4.4) 1:00
  2. Business Continuity Plan (OBJ 4.4) 14:00
  3. Business Impact Analysis (OBJ 4.4) 14:00
  4. Privacy Impact Assessment (OBJ 4.4) 4:00
  5. Incident Response Plan (OBJ 4.4) 11:00
  6. Testing Plans (OBJ 4.4) 7:00
  Video Name Time
  1. Risk Strategies (OBJ 4.1) 2:00
  2. Asset Value (OBJ 4.1) 4:00
  3. Access Control (OBJ 4.1) 6:00
  4. Aggregating Risk (OBJ 4.1) 3:00
  5. Scenario Planning (OBJ 4.1) 8:00
  6. Security Controls (OBJ 4.1) 9:00
  7. Security Solutions (OBJ 4.1) 9:00
  8. Cost of a Data Breach (OBJ 4.1) 6:00
  Video Name Time
  1. Vendor Risk (OBJ 4.2) 4:00
  2. Business Models (OBJ 4.2) 11:00
  3. Influences (OBJ 4.2) 7:00
  4. Organizational Changes (OBJ 4.2) 6:00
  5. Shared Responsibility Model (OBJ 4.2) 5:00
  6. Viability and Support (OBJ 4.2) 11:00
  7. Dependencies (OBJ 4.2) 5:00
  8. Considerations (OBJ 4.2) 11:00
  9. Supply Chain (OBJ 4.2) 6:00
  Video Name Time
  1. Securing Networks (OBJ 1.1) 7:00
  2. Switches (OBJ 1.1) 7:00
  3. Routers (OBJ 1.1) 8:00
  4. Wireless and Mesh (OBJ 1.1) 3:00
  5. Firewalls (OBJ 1.1) 12:00
  6. Configuring Firewalls (OBJ 1.1) 7:00
  7. Proxies (OBJ 1.1) 7:00
  8. Gateways (OBJ 1.1) 5:00
  9. IDS and IPS (OBJ 1.1) 6:00
  10. Network Access Control (NAC) (OBJ 1.1) 3:00
  11. Remote Access (OBJ 1.1) 9:00
  12. Unified Communications (OBJ 1.1) 19:00
  13. Cloud vs On-premise (OBJ 1.1) 5:00
  14. DNSSEC (OBJ 1.1) 4:00
  15. Load Balancer (OBJ 1.1) 7:00
  Video Name Time
  1. Securing Architectures (OBJ 1.1) 1:00
  2. Traffic Mirroring (OBJ 1.1) 4:00
  3. Network Sensors (OBJ 1.1) 12:00
  4. Host Sensors (OBJ 1.1) 6:00
  5. Layer 2 Segmentation (OBJ 1.1) 5:00
  6. Network Segmentation (OBJ 1.1) 13:00
  7. Implement Network Segmentation (OBJ 1.1) 10:00
  8. Server Segmentation (OBJ 1.1) 11:00
  9. Zero Trust (OBJ 1.1) 7:00
  10. Merging Networks (OBJ 1.1) 6:00
  11. Software-Defined Networking (SDN) (OBJ 1.1) 5:00
  Video Name Time
  1. Infrastructure Design (OBJ 1.2) 1:00
  2. Scalability (OBJ 1.2) 6:00
  3. Resiliency Issues (OBJ 1.2) 13:00
  4. Automation (OBJ 1.2) 6:00
  5. Performance Design (OBJ 1.2) 6:00
  6. Virtualization (OBJ 1.2) 8:00
  7. Securing VMs (OBJ 1.2) 5:00
  8. Containerization (OBJ 1.2) 6:00
  Video Name Time
  1. Cloud and Virtualization (OBJ 1.6) 1:00
  2. Cloud Deployment Models (OBJ 1.6) 5:00
  3. Cloud Service Models (OBJ 1.6) 5:00
  4. Deployment Considerations (OBJ 1.6) 5:00
  5. Provider Limitations (OBJ 1.6) 3:00
  6. Extending Controls (OBJ 1.6) 5:00
  7. Provision and Deprovision (OBJ 1.6) 3:00
  8. Storage Models (OBJ 1.6) 5:00
  9. Virtualization (OBJ 1.6) 8:00
  Video Name Time
  1. Software Applications (OBJ 1.3) 3:00
  2. Systems Development Life Cycle (OBJ 1.3) 7:00
  3. Software Development Life Cycle (OBJ 1.3) 6:00
  4. Development Approaches (OBJ 1.3) 11:00
  5. Software Assurance (OBJ 1.3) 9:00
  6. Baselins and Templates (OBJ 1.3) 7:00
  7. Best Practices (OBJ 1.3) 6:00
  8. Integrating Applications (OBJ 1.3) 5:00
  Video Name Time
  1. Data Security (OBJ 1.4) 4:00
  2. Data Life Cycle (OBJ 1.4) 10:00
  3. Data Classification (OBJ 1.4) 7:00
  4. Labeling and Tagging (OBJ 1.4) 8:00
  5. Deidentification (OBJ 1.4) 11:00
  6. Data Encryption (OBJ 1.4) 8:00
  7. Data Loss Prevention (DLP) (OBJ 1.4) 10:00
  8. DLP Detection (OBJ 1.4) 7:00
  9. Data Loss Detection (OBJ 1.4) 12:00
  10. Auditing Files (OBJ 1.4) 4:00
  Video Name Time
  1. Authentication and Authorization (OBJ 1.5) 2:00
  2. Access Control (OBJ 1.5) 5:00
  3. Credential Management (OBJ 1.5) 4:00
  4. Password Policies (OBJ 1.5) 8:00
  5. Implementing Password Policies (OBJ 1.5) 5:00
  6. Cracking Weak Passwords (OBJ 1.5) 3:00
  7. Multifactor Authentication (OBJ 1.5) 8:00
  8. Authentication Protocols (OBJ 1.5) 10:00
  9. Federation (OBJ 1.5) 7:00
  10. Root of Trust (OBJ 1.5) 4:00
  11. Attestation (OBJ 1.5) 2:00
  12. Identity Proofing (OBJ 1.5) 4:00
  Video Name Time
  1. Cryptography (OBJ 1.7) 2:00
  2. Privacy and Confidentiality (OBJ 1.7) 7:00
  3. Integrity and Non-repudiation (OBJ 1.7) 7:00
  4. Compliance and Policy (OBJ 1.7) 4:00
  5. Data States (OBJ 1.7) 7:00
  6. Cryptographic Use Cases (OBJ 1.7) 6:00
  7. PKI Use Cases (OBJ 1.7) 9:00
  Video Name Time
  1. Emerging Technology (OBJ 1.8) 4:00
  2. Artificial Intelligence (AI) & Machine Learning (ML) (OBJ 1.8) 9:00
  3. Deep Learning (OBJ 1.8) 9:00
  4. Big Data (OBJ 1.8) 5:00
  5. Blockchain & Distributed Consensus (OBJ 1.8) 6:00
  6. Passwordless Authentication (OBJ 1.8) 5:00
  7. Homomorphic Encryption (OBJ 1.8) 4:00
  8. Virtual/Augmented Reality (OBJ 1.8) 5:00
  9. 3D Printing (OBJ 1.8) 3:00
  10. Quantum Computing (OBJ 1.8) 6:00
  Video Name Time
  1. Enterprise Mobility 3:00
  2. Enterprise Mobility Management (EMM) (OBJ. 3.1) 10:00
  3. WPA3 (OBJ. 3.1) 7:00
  4. Connectivity Options (OBJ. 3.1) 9:00
  5. Security Configurations (OBJ. 3.1) 8:00
  6. DNS Protection (OBJ. 3.1) 3:00
  7. Deployment Options (OBJ. 3.1) 5:00
  8. Reconnaissance Concerns (OBJ. 3.1) 8:00
  9. Mobile Security (OBJ. 3.1) 8:00
  Video Name Time
  1. Endpoint Security Controls 2:00
  2. Device Hardening (OBJ. 3.2) 9:00
  3. Unnecessary Services (OBJ. 3.2) 6:00
  4. Patching (OBJ. 3.2) 5:00
  5. Security Settings (OBJ. 3.2) 6:00
  6. Mandatory Access Controls (MAC) (OBJ. 3.2) 7:00
  7. Secure Boot (OBJ. 3.2) 6:00
  8. Hardware Encryption (OBJ. 3.2) 5:00
  9. Endpoint Protections (OBJ. 3.2) 10:00
  10. Logging and Monitoring (OBJ. 3.2) 6:00
  11. Configuring SIEM Agents (OBJ. 3.2) 19:00
  12. Resiliency (OBJ. 3.2) 6:00
  Video Name Time
  1. Cloud Technologies 3:00
  2. Business Continuity/Disaster Recovery (BC/DR) (OBJ. 3.4) 8:00
  3. Cloud Encryption (OBJ. 3.4) 5:00
  4. Serverless Computing (OBJ. 3.4) 9:00
  5. Software-Defined Networking (SDN) (OBJ. 3.4) 5:00
  6. Log Collection and Analysis (OBJ. 3.4) 4:00
  7. Cloud Access Security Broker (CASB) (OBJ. 3.4) 6:00
  8. Cloud Misconfigurations (OBJ. 3.4) 11:00
  Video Name Time
  1. Operational Technologies 2:00
  2. Embedded Systems (OBJ. 3.3) 10:00
  3. ICS and SCADA (OBJ. 3.3) 9:00
  4. ICS Protocols (OBJ. 3.3) 11:00
  5. Industries and Sectors (OBJ. 3.3) 5:00
  Video Name Time
  1. Hashing and Symmetric Algorithms 1:00
  2. Hashing (OBJ. 3.6) 7:00
  3. Calculating Hash Digests (OBJ. 3.6) 3:00
  4. Message Authentication (OBJ. 3.6) 4:00
  5. Symmetric Algorithms (OBJ. 3.6) 6:00
  6. Stream Ciphers (OBJ. 3.6) 5:00
  7. Block Ciphers (OBJ. 3.6) 10:00
  Video Name Time
  1. Asymmetric Algorithms 2:00
  2. Using Asymmetric Algortihms 9:00
  3. SSL/TLS and Cipher Suites (OBJ. 3.6) 8:00
  4. S/MIME and SSH (OBJ. 3.6) 7:00
  5. EAP (OBJ. 3.6) 6:00
  6. IPSec (OBJ. 3.6) 15:00
  7. Elliptic Curve Cryptography (ECC) (OBJ. 3.6) 4:00
  8. Forward Secrecy (OBJ. 3.6) 4:00
  9. Authenticated Encryption with Associated Data (AEAD) (OBJ. 3.6) 2:00
  10. Key Stretching (OBJ. 3.6) 5:00
  Video Name Time
  1. Public Key Infrastructure 3:00
  2. PKI Components (OBJ. 3.5) 10:00
  3. Digital Certificates (OBJ. 3.5) 8:00
  4. Using Digital Certificates (OBJ. 3.5) 6:00
  5. Exploring Server Certificates (OBJ. 3.5) 4:00
  6. Trust Models (OBJ. 3.5) 4:00
  7. Certificate Management (OBJ. 3.5) 3:00
  8. Certificate Validity (CRL and OCSP) (OBJ. 3.5) 4:00
  9. Protecting Web Traffic (OBJ. 3.5) 4:00
  10. Troubleshooting Certificates (OBJ. 3.7) 5:00
  11. Troubleshooting Keys (OBJ. 3.7) 4:00
  Video Name Time
  1. Threat and Vulnerability Management 2:00
  2. Threat Intelligence (OBJ. 2.1) 6:00
  3. Threat Hunting (OBJ. 2.1) 7:00
  4. Intelligence Collection (OBJ. 2.1) 11:00
  5. Threat Actors (OBJ. 2.1) 9:00
  6. Threat Management Frameworks (OBJ. 2.1) 13:00
  7. Vulnerability Management Activities (OBJ. 2.3) 12:00
  8. Security Content Automation Protocol (SCAP) (OBJ. 2.3) 7:00
  Video Name Time
  1. Vulnerability Assessments 2:00
  2. Penetration Test (OBJ. 2.4) 5:00
  3. PenTest Steps (OBJ. 2.4) 7:00
  4. PenTest Requirements (OBJ. 2.4) 11:00
  5. Code Analysis (OBJ. 2.4) 8:00
  6. Protocol Analysis (OBJ. 2.4) 8:00
  7. TCPDump (OBJ. 2.4) 8:00
  8. Wireshark (OBJ. 2.4) 10:00
  9. Nmap (OBJ. 2.4) 11:00
  10. Analysis Utilities (OBJ. 2.4) 5:00
  11. Vulnerability Scanning (OBJ. 2.4) 9:00
  12. Analyzing Scan Outputs (OBJ. 2.4) 14:00
  Video Name Time
  1. Risk Reduction 2:00
  2. Deceptive Technologies (OBJ. 2.6) 5:00
  3. Security Data Analytics (OBJ. 2.6) 8:00
  4. Preventative Controls (OBJ. 2.6) 5:00
  5. Application Controls (OBJ. 2.6) 10:00
  6. Security Automation (OBJ. 2.6) 11:00
  7. Physical Security (OBJ. 2.6) 7:00
  8. Lock Picking (OBJ. 2.6) 2:00
  Video Name Time
  1. Analyzing Vulnerabilities 1:00
  2. Race Conditions (OBJ. 2.5) 5:00
  3. Buffer Overflows (OBJ. 2.5) 12:00
  4. Buffer Overflow Attack (OBJ. 2.6) 6:00
  5. Authentication and References (OBJ. 2.5) 6:00
  6. Ciphers and Certificates (OBJ. 2.5) 11:00
  7. Improper Headers (OBJ. 2.5) 6:00
  8. Software Composition (OBJ. 2.5) 10:00
  9. Vulnerable Web Applications (OBJ. 2.5) 12:00
  Video Name Time
  1. Attacking Vulnerabilities 1:00
  2. Directory Traversals (OBJ. 2.5) 10:00
  3. Cross-Site Scripting (XSS) (OBJ. 2.5) 9:00
  4. Cross-Site Request Forgery (CSRF) (OBJ. 2.5) 7:00
  5. SQL Injections (OBJ. 2.5) 7:00
  6. XML Injections (OBJ. 2.5) 6:00
  7. Other Injection Attacks (OBJ. 2.5) 4:00
  8. Authentication Bypass (OBJ. 2.5) 7:00
  9. Web Application Vulnerabilities (OBJ. 2.5) 9:00
  10. VM Attacks (OBJ. 2.5) 5:00
  11. Network Attacks (OBJ. 2.5) 11:00
  12. Analyzing Web Applications (OBJ. 2.5) 16:00
  13. Social Engineering (OBJ. 2.5) 7:00
  14. Phishing Campaigns (OBJ. 2.5) 5:00
  Video Name Time
  1. Indicators of Compromise 2:00
  2. Types of IoCs (OBJ. 2.2) 4:00
  3. PCAP Files (OBJ. 2.2) 4:00
  4. Conduct Packet Analysis (OBJ. 2.2) 6:00
  5. NetFlow (OBJ. 2.2) 7:00
  6. Logs (OBJ. 2.2) 7:00
  7. IoC Notifications (OBJ. 2.2) 8:00
  8. Response to IoCs (OBJ. 2.2) 5:00
  9. Security Appliances (OBJ. 2.2) 16:00
  Video Name Time
  1. Incident Response 1:00
  2. Triage (OBJ. 2.7) 8:00
  3. Communication Plan (OBJ. 2.7) 10:00
  4. Stakeholder Management (OBJ. 2.7) 7:00
  5. Incident Response Process (OBJ. 2.7) 10:00
  6. Playbooks (OBJ. 2.7) 8:00
  Video Name Time
  1. Digital Forensics 1:00
  2. Forensic Process (OBJ. 2.8) 5:00
  3. Chain of Custody (OBJ. 2.8) 7:00
  4. Order of Volatility (OBJ. 2.8) 7:00
  5. Forensic Analysis (OBJ. 2.8) 7:00
  6. Steganography 4:00

Student Feedback

5 Stars
4 Stars
3 Stars
2 Stars
1 Star
5.0
Rating: 5.0
Overall Rating: Good.

Similar Courses

Only Registered Members can View Training Courses

Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.

  • Trusted by 1.2M IT Certification Candidates Every Month
  • Hundreds Hours of Videos
  • Instant download After Registration

Already Member? Click here to Login

A confirmation link will be sent to this email address to verify your login

1200+ IT Certification Exams available: Get a free sample of any exam right now!
Try Free Demo

Try Free Demo

  • ABA
  • ACAMS
  • ACFE
  • ACI
  • ACSM
  • Adobe
  • AHIP
  • AHLEI
  • AICPA
  • AIWMI
  • Alfresco
  • Alibaba
  • AMA
  • AndroidATC
  • APBM
  • API
  • APICS
  • Apple
  • Arista
  • ASIS
  • ASQ
  • Atlassian
  • Autodesk
  • Avaya
  • Axis Communications
  • BACB
  • BCS
  • Blockchain
  • Blue Coat
  • Blue Prism
  • C++ Institute
  • CA Technologies
  • CertNexus
  • Checkpoint
  • CIMA
  • Cisco
  • Citrix
  • CIW
  • Cloudera
  • CNCF
  • CompTIA
  • CSA
  • CyberArk
  • Dell
  • DMI
  • DSCI
  • EMC
  • Esri
  • Exin
  • Extreme Networks
  • F5
  • FileMaker
  • FINRA
  • Fortinet
  • GAQM
  • GARP
  • Genesys
  • GIAC
  • Google
  • Guidance Software
  • H3C
  • HashiCorp
  • HFMA
  • HIPAA
  • Hitachi
  • HP
  • HRCI
  • Huawei
  • IAPP
  • IBM
  • IFPUG
  • IIA
  • IIBA
  • Informatica
  • iSAQB
  • ISC
  • iSQI
  • ISTQB
  • ITIL
  • Juniper
  • Lenovo
  • Linux Foundation
  • Logical Operations
  • LPI
  • Magento
  • Marketo
  • McAfee
  • Microsoft
  • Mirantis
  • Mulesoft
  • NACVA
  • NCMA
  • NetSuite
  • Network Appliance
  • NI
  • Nokia
  • Novell
  • Nuage Networks
  • Nutanix
  • OMG
  • Palo Alto Networks
  • Pegasystems
  • PEOPLECERT
  • PMI
  • PRINCE2
  • Pulse Secure
  • Python Institute
  • QlikView
  • RedHat
  • Riverbed
  • RSA
  • Salesforce
  • SANS
  • SAP
  • SAS Institute
  • Scrum
  • SDI
  • ServiceNow
  • Six Sigma
  • Slack
  • SNIA
  • Snowflake
  • SOA
  • Software Certifications
  • SolarWinds
  • Splunk
  • SpringSource
  • Symantec
  • Teradata
  • Test Prep
  • The Open Group
  • Tibco
  • UiPath
  • Unity Certification
  • VCE
  • Veeam
  • Veritas
  • Vmedu
  • VMware
  • WatchGuard
  • WorldatWork
  • Zend
Next Step
Next Step

Try Free Demo

  • CompTIA
Next Step
Next Step