CAS-004: CompTIA Advanced Security Practitioner (CASP+) CAS-004
Your CompTIA CAS-004 exam is just around the corner, right? So, it's high time to find an effective preparation tool! Our training course is what you really need! This is a series of videos led by the experienced IT instructors who will provide you with a detailed overview of the CAS-004 certification test. Ace your CompTIA CAS-004 at the first attempt and obtain the CompTIA Advanced Security Practitioner (CASP+) CAS-004 credential with ease.
Curriculum for CAS-004 Video Course
Data Considerations (Domain 4)
Video Name | Time | |
---|---|---|
1. Data Considerations (OBJ 4.3) | 1:00 | |
2. Data Security (OBJ. 4.3) | 4:00 | |
3. Data Classification (OBJ. 4.3) | 3:00 | |
4. Data Types (OBJ. 4.3) | 5:00 | |
5. Data Retention (OBJ. 4.3) | 7:00 | |
6. Data Destruction (OBJ. 4.3) | 3:00 | |
7. Data Ownership (OBJ. 4.3) | 6:00 | |
8. Data Sovereignty (OBJ. 4.3) | 3:00 |
Video Name | Time | |
---|---|---|
1. Risk Management (OBJ 4.1) | 2:00 | |
2. Risk Strategies (OBJ. 4.1) | 5:00 | |
3. Risk Management Lifecycle (OBJ. 4.1) | 12:00 | |
4. Risk Types (OBJ. 4.1) | 3:00 | |
5. Risk Handling (OBJ. 4.1) | 9:00 | |
6. Risk Tracking (OBJ. 4.1) | 5:00 | |
7. Risk Assessment (OBJ. 4.1) | 18:00 | |
8. When Risk Management Fails (OBJ. 4.1) | 4:00 |
Video Name | Time | |
---|---|---|
1. Policies and Frameworks (OBJ. 4.1 & 4.3) | 1:00 | |
2. Policies (OBJ. 4.1) | 12:00 | |
3. Frameworks (OBJ. 4.1) | 5:00 | |
4. Regulations (OBJ. 4.3) | 8:00 | |
5. Standards (OBJ. 4.3) | 6:00 | |
6. Contracts and Agreements (OBJ. 4.3) | 9:00 | |
7. Legal Considerations (OBJ. 4.3) | 7:00 | |
8. Integrating Industries (OBJ. 4.3) | 3:00 |
Video Name | Time | |
---|---|---|
1. Business Continuity (OBJ 4.4) | 1:00 | |
2. Business Continuity Plan (OBJ 4.4) | 14:00 | |
3. Business Impact Analysis (OBJ 4.4) | 14:00 | |
4. Privacy Impact Assessment (OBJ 4.4) | 4:00 | |
5. Incident Response Plan (OBJ 4.4) | 11:00 | |
6. Testing Plans (OBJ 4.4) | 7:00 |
Video Name | Time | |
---|---|---|
1. Risk Strategies (OBJ 4.1) | 2:00 | |
2. Asset Value (OBJ 4.1) | 4:00 | |
3. Access Control (OBJ 4.1) | 6:00 | |
4. Aggregating Risk (OBJ 4.1) | 3:00 | |
5. Scenario Planning (OBJ 4.1) | 8:00 | |
6. Security Controls (OBJ 4.1) | 9:00 | |
7. Security Solutions (OBJ 4.1) | 9:00 | |
8. Cost of a Data Breach (OBJ 4.1) | 6:00 |
Video Name | Time | |
---|---|---|
1. Vendor Risk (OBJ 4.2) | 4:00 | |
2. Business Models (OBJ 4.2) | 11:00 | |
3. Influences (OBJ 4.2) | 7:00 | |
4. Organizational Changes (OBJ 4.2) | 6:00 | |
5. Shared Responsibility Model (OBJ 4.2) | 5:00 | |
6. Viability and Support (OBJ 4.2) | 11:00 | |
7. Dependencies (OBJ 4.2) | 5:00 | |
8. Considerations (OBJ 4.2) | 11:00 | |
9. Supply Chain (OBJ 4.2) | 6:00 |
Video Name | Time | |
---|---|---|
1. Securing Networks (OBJ 1.1) | 7:00 | |
2. Switches (OBJ 1.1) | 7:00 | |
3. Routers (OBJ 1.1) | 8:00 | |
4. Wireless and Mesh (OBJ 1.1) | 3:00 | |
5. Firewalls (OBJ 1.1) | 12:00 | |
6. Configuring Firewalls (OBJ 1.1) | 7:00 | |
7. Proxies (OBJ 1.1) | 7:00 | |
8. Gateways (OBJ 1.1) | 5:00 | |
9. IDS and IPS (OBJ 1.1) | 6:00 | |
10. Network Access Control (NAC) (OBJ 1.1) | 3:00 | |
11. Remote Access (OBJ 1.1) | 9:00 | |
12. Unified Communications (OBJ 1.1) | 19:00 | |
13. Cloud vs On-premise (OBJ 1.1) | 5:00 | |
14. DNSSEC (OBJ 1.1) | 4:00 | |
15. Load Balancer (OBJ 1.1) | 7:00 |
Video Name | Time | |
---|---|---|
1. Securing Architectures (OBJ 1.1) | 1:00 | |
2. Traffic Mirroring (OBJ 1.1) | 4:00 | |
3. Network Sensors (OBJ 1.1) | 12:00 | |
4. Host Sensors (OBJ 1.1) | 6:00 | |
5. Layer 2 Segmentation (OBJ 1.1) | 5:00 | |
6. Network Segmentation (OBJ 1.1) | 13:00 | |
7. Implement Network Segmentation (OBJ 1.1) | 10:00 | |
8. Server Segmentation (OBJ 1.1) | 11:00 | |
9. Zero Trust (OBJ 1.1) | 7:00 | |
10. Merging Networks (OBJ 1.1) | 6:00 | |
11. Software-Defined Networking (SDN) (OBJ 1.1) | 5:00 |
Video Name | Time | |
---|---|---|
1. Infrastructure Design (OBJ 1.2) | 1:00 | |
2. Scalability (OBJ 1.2) | 6:00 | |
3. Resiliency Issues (OBJ 1.2) | 13:00 | |
4. Automation (OBJ 1.2) | 6:00 | |
5. Performance Design (OBJ 1.2) | 6:00 | |
6. Virtualization (OBJ 1.2) | 8:00 | |
7. Securing VMs (OBJ 1.2) | 5:00 | |
8. Containerization (OBJ 1.2) | 6:00 |
Video Name | Time | |
---|---|---|
1. Cloud and Virtualization (OBJ 1.6) | 1:00 | |
2. Cloud Deployment Models (OBJ 1.6) | 5:00 | |
3. Cloud Service Models (OBJ 1.6) | 5:00 | |
4. Deployment Considerations (OBJ 1.6) | 5:00 | |
5. Provider Limitations (OBJ 1.6) | 3:00 | |
6. Extending Controls (OBJ 1.6) | 5:00 | |
7. Provision and Deprovision (OBJ 1.6) | 3:00 | |
8. Storage Models (OBJ 1.6) | 5:00 | |
9. Virtualization (OBJ 1.6) | 8:00 |
Video Name | Time | |
---|---|---|
1. Software Applications (OBJ 1.3) | 3:00 | |
2. Systems Development Life Cycle (OBJ 1.3) | 7:00 | |
3. Software Development Life Cycle (OBJ 1.3) | 6:00 | |
4. Development Approaches (OBJ 1.3) | 11:00 | |
5. Software Assurance (OBJ 1.3) | 9:00 | |
6. Baselins and Templates (OBJ 1.3) | 7:00 | |
7. Best Practices (OBJ 1.3) | 6:00 | |
8. Integrating Applications (OBJ 1.3) | 5:00 |
Video Name | Time | |
---|---|---|
1. Data Security (OBJ 1.4) | 4:00 | |
2. Data Life Cycle (OBJ 1.4) | 10:00 | |
3. Data Classification (OBJ 1.4) | 7:00 | |
4. Labeling and Tagging (OBJ 1.4) | 8:00 | |
5. Deidentification (OBJ 1.4) | 11:00 | |
6. Data Encryption (OBJ 1.4) | 8:00 | |
7. Data Loss Prevention (DLP) (OBJ 1.4) | 10:00 | |
8. DLP Detection (OBJ 1.4) | 7:00 | |
9. Data Loss Detection (OBJ 1.4) | 12:00 | |
10. Auditing Files (OBJ 1.4) | 4:00 |
Video Name | Time | |
---|---|---|
1. Authentication and Authorization (OBJ 1.5) | 2:00 | |
2. Access Control (OBJ 1.5) | 5:00 | |
3. Credential Management (OBJ 1.5) | 4:00 | |
4. Password Policies (OBJ 1.5) | 8:00 | |
5. Implementing Password Policies (OBJ 1.5) | 5:00 | |
6. Cracking Weak Passwords (OBJ 1.5) | 3:00 | |
7. Multifactor Authentication (OBJ 1.5) | 8:00 | |
8. Authentication Protocols (OBJ 1.5) | 10:00 | |
9. Federation (OBJ 1.5) | 7:00 | |
10. Root of Trust (OBJ 1.5) | 4:00 | |
11. Attestation (OBJ 1.5) | 2:00 | |
12. Identity Proofing (OBJ 1.5) | 4:00 |
Video Name | Time | |
---|---|---|
1. Cryptography (OBJ 1.7) | 2:00 | |
2. Privacy and Confidentiality (OBJ 1.7) | 7:00 | |
3. Integrity and Non-repudiation (OBJ 1.7) | 7:00 | |
4. Compliance and Policy (OBJ 1.7) | 4:00 | |
5. Data States (OBJ 1.7) | 7:00 | |
6. Cryptographic Use Cases (OBJ 1.7) | 6:00 | |
7. PKI Use Cases (OBJ 1.7) | 9:00 |
Video Name | Time | |
---|---|---|
1. Emerging Technology (OBJ 1.8) | 4:00 | |
2. Artificial Intelligence (AI) & Machine Learning (ML) (OBJ 1.8) | 9:00 | |
3. Deep Learning (OBJ 1.8) | 9:00 | |
4. Big Data (OBJ 1.8) | 5:00 | |
5. Blockchain & Distributed Consensus (OBJ 1.8) | 6:00 | |
6. Passwordless Authentication (OBJ 1.8) | 5:00 | |
7. Homomorphic Encryption (OBJ 1.8) | 4:00 | |
8. Virtual/Augmented Reality (OBJ 1.8) | 5:00 | |
9. 3D Printing (OBJ 1.8) | 3:00 | |
10. Quantum Computing (OBJ 1.8) | 6:00 |
Video Name | Time | |
---|---|---|
1. Enterprise Mobility | 3:00 | |
2. Enterprise Mobility Management (EMM) (OBJ. 3.1) | 10:00 | |
3. WPA3 (OBJ. 3.1) | 7:00 | |
4. Connectivity Options (OBJ. 3.1) | 9:00 | |
5. Security Configurations (OBJ. 3.1) | 8:00 | |
6. DNS Protection (OBJ. 3.1) | 3:00 | |
7. Deployment Options (OBJ. 3.1) | 5:00 | |
8. Reconnaissance Concerns (OBJ. 3.1) | 8:00 | |
9. Mobile Security (OBJ. 3.1) | 8:00 |
Video Name | Time | |
---|---|---|
1. Endpoint Security Controls | 2:00 | |
2. Device Hardening (OBJ. 3.2) | 9:00 | |
3. Unnecessary Services (OBJ. 3.2) | 6:00 | |
4. Patching (OBJ. 3.2) | 5:00 | |
5. Security Settings (OBJ. 3.2) | 6:00 | |
6. Mandatory Access Controls (MAC) (OBJ. 3.2) | 7:00 | |
7. Secure Boot (OBJ. 3.2) | 6:00 | |
8. Hardware Encryption (OBJ. 3.2) | 5:00 | |
9. Endpoint Protections (OBJ. 3.2) | 10:00 | |
10. Logging and Monitoring (OBJ. 3.2) | 6:00 | |
11. Configuring SIEM Agents (OBJ. 3.2) | 19:00 | |
12. Resiliency (OBJ. 3.2) | 6:00 |
Video Name | Time | |
---|---|---|
1. Cloud Technologies | 3:00 | |
2. Business Continuity/Disaster Recovery (BC/DR) (OBJ. 3.4) | 8:00 | |
3. Cloud Encryption (OBJ. 3.4) | 5:00 | |
4. Serverless Computing (OBJ. 3.4) | 9:00 | |
5. Software-Defined Networking (SDN) (OBJ. 3.4) | 5:00 | |
6. Log Collection and Analysis (OBJ. 3.4) | 4:00 | |
7. Cloud Access Security Broker (CASB) (OBJ. 3.4) | 6:00 | |
8. Cloud Misconfigurations (OBJ. 3.4) | 11:00 |
Video Name | Time | |
---|---|---|
1. Operational Technologies | 2:00 | |
2. Embedded Systems (OBJ. 3.3) | 10:00 | |
3. ICS and SCADA (OBJ. 3.3) | 9:00 | |
4. ICS Protocols (OBJ. 3.3) | 11:00 | |
5. Industries and Sectors (OBJ. 3.3) | 5:00 |
Video Name | Time | |
---|---|---|
1. Hashing and Symmetric Algorithms | 1:00 | |
2. Hashing (OBJ. 3.6) | 7:00 | |
3. Calculating Hash Digests (OBJ. 3.6) | 3:00 | |
4. Message Authentication (OBJ. 3.6) | 4:00 | |
5. Symmetric Algorithms (OBJ. 3.6) | 6:00 | |
6. Stream Ciphers (OBJ. 3.6) | 5:00 | |
7. Block Ciphers (OBJ. 3.6) | 10:00 |
Video Name | Time | |
---|---|---|
1. Asymmetric Algorithms | 2:00 | |
2. Using Asymmetric Algortihms | 9:00 | |
3. SSL/TLS and Cipher Suites (OBJ. 3.6) | 8:00 | |
4. S/MIME and SSH (OBJ. 3.6) | 7:00 | |
5. EAP (OBJ. 3.6) | 6:00 | |
6. IPSec (OBJ. 3.6) | 15:00 | |
7. Elliptic Curve Cryptography (ECC) (OBJ. 3.6) | 4:00 | |
8. Forward Secrecy (OBJ. 3.6) | 4:00 | |
9. Authenticated Encryption with Associated Data (AEAD) (OBJ. 3.6) | 2:00 | |
10. Key Stretching (OBJ. 3.6) | 5:00 |
Video Name | Time | |
---|---|---|
1. Public Key Infrastructure | 3:00 | |
2. PKI Components (OBJ. 3.5) | 10:00 | |
3. Digital Certificates (OBJ. 3.5) | 8:00 | |
4. Using Digital Certificates (OBJ. 3.5) | 6:00 | |
5. Exploring Server Certificates (OBJ. 3.5) | 4:00 | |
6. Trust Models (OBJ. 3.5) | 4:00 | |
7. Certificate Management (OBJ. 3.5) | 3:00 | |
8. Certificate Validity (CRL and OCSP) (OBJ. 3.5) | 4:00 | |
9. Protecting Web Traffic (OBJ. 3.5) | 4:00 | |
10. Troubleshooting Certificates (OBJ. 3.7) | 5:00 | |
11. Troubleshooting Keys (OBJ. 3.7) | 4:00 |
Video Name | Time | |
---|---|---|
1. Threat and Vulnerability Management | 2:00 | |
2. Threat Intelligence (OBJ. 2.1) | 6:00 | |
3. Threat Hunting (OBJ. 2.1) | 7:00 | |
4. Intelligence Collection (OBJ. 2.1) | 11:00 | |
5. Threat Actors (OBJ. 2.1) | 9:00 | |
6. Threat Management Frameworks (OBJ. 2.1) | 13:00 | |
7. Vulnerability Management Activities (OBJ. 2.3) | 12:00 | |
8. Security Content Automation Protocol (SCAP) (OBJ. 2.3) | 7:00 |
Video Name | Time | |
---|---|---|
1. Vulnerability Assessments | 2:00 | |
2. Penetration Test (OBJ. 2.4) | 5:00 | |
3. PenTest Steps (OBJ. 2.4) | 7:00 | |
4. PenTest Requirements (OBJ. 2.4) | 11:00 | |
5. Code Analysis (OBJ. 2.4) | 8:00 | |
6. Protocol Analysis (OBJ. 2.4) | 8:00 | |
7. TCPDump (OBJ. 2.4) | 8:00 | |
8. Wireshark (OBJ. 2.4) | 10:00 | |
9. Nmap (OBJ. 2.4) | 11:00 | |
10. Analysis Utilities (OBJ. 2.4) | 5:00 | |
11. Vulnerability Scanning (OBJ. 2.4) | 9:00 | |
12. Analyzing Scan Outputs (OBJ. 2.4) | 14:00 |
Video Name | Time | |
---|---|---|
1. Risk Reduction | 2:00 | |
2. Deceptive Technologies (OBJ. 2.6) | 5:00 | |
3. Security Data Analytics (OBJ. 2.6) | 8:00 | |
4. Preventative Controls (OBJ. 2.6) | 5:00 | |
5. Application Controls (OBJ. 2.6) | 10:00 | |
6. Security Automation (OBJ. 2.6) | 11:00 | |
7. Physical Security (OBJ. 2.6) | 7:00 | |
8. Lock Picking (OBJ. 2.6) | 2:00 |
Video Name | Time | |
---|---|---|
1. Analyzing Vulnerabilities | 1:00 | |
2. Race Conditions (OBJ. 2.5) | 5:00 | |
3. Buffer Overflows (OBJ. 2.5) | 12:00 | |
4. Buffer Overflow Attack (OBJ. 2.6) | 6:00 | |
5. Authentication and References (OBJ. 2.5) | 6:00 | |
6. Ciphers and Certificates (OBJ. 2.5) | 11:00 | |
7. Improper Headers (OBJ. 2.5) | 6:00 | |
8. Software Composition (OBJ. 2.5) | 10:00 | |
9. Vulnerable Web Applications (OBJ. 2.5) | 12:00 |
Video Name | Time | |
---|---|---|
1. Attacking Vulnerabilities | 1:00 | |
2. Directory Traversals (OBJ. 2.5) | 10:00 | |
3. Cross-Site Scripting (XSS) (OBJ. 2.5) | 9:00 | |
4. Cross-Site Request Forgery (CSRF) (OBJ. 2.5) | 7:00 | |
5. SQL Injections (OBJ. 2.5) | 7:00 | |
6. XML Injections (OBJ. 2.5) | 6:00 | |
7. Other Injection Attacks (OBJ. 2.5) | 4:00 | |
8. Authentication Bypass (OBJ. 2.5) | 7:00 | |
9. Web Application Vulnerabilities (OBJ. 2.5) | 9:00 | |
10. VM Attacks (OBJ. 2.5) | 5:00 | |
11. Network Attacks (OBJ. 2.5) | 11:00 | |
12. Analyzing Web Applications (OBJ. 2.5) | 16:00 | |
13. Social Engineering (OBJ. 2.5) | 7:00 | |
14. Phishing Campaigns (OBJ. 2.5) | 5:00 |
Video Name | Time | |
---|---|---|
1. Indicators of Compromise | 2:00 | |
2. Types of IoCs (OBJ. 2.2) | 4:00 | |
3. PCAP Files (OBJ. 2.2) | 4:00 | |
4. Conduct Packet Analysis (OBJ. 2.2) | 6:00 | |
5. NetFlow (OBJ. 2.2) | 7:00 | |
6. Logs (OBJ. 2.2) | 7:00 | |
7. IoC Notifications (OBJ. 2.2) | 8:00 | |
8. Response to IoCs (OBJ. 2.2) | 5:00 | |
9. Security Appliances (OBJ. 2.2) | 16:00 |
Video Name | Time | |
---|---|---|
1. Incident Response | 1:00 | |
2. Triage (OBJ. 2.7) | 8:00 | |
3. Communication Plan (OBJ. 2.7) | 10:00 | |
4. Stakeholder Management (OBJ. 2.7) | 7:00 | |
5. Incident Response Process (OBJ. 2.7) | 10:00 | |
6. Playbooks (OBJ. 2.7) | 8:00 |
Video Name | Time | |
---|---|---|
1. Digital Forensics | 1:00 | |
2. Forensic Process (OBJ. 2.8) | 5:00 | |
3. Chain of Custody (OBJ. 2.8) | 7:00 | |
4. Order of Volatility (OBJ. 2.8) | 7:00 | |
5. Forensic Analysis (OBJ. 2.8) | 7:00 | |
6. Steganography | 4:00 |
Student Feedback
Similar Courses
Only Registered Members can View Training Courses
Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.
Try Free Demo
Try Free Demo