Booking options
£24
£24
On-Demand course
19 hours 5 minutes
All levels
This CompTIA Advanced Security Practitioner (CASP) - Video Training Course establishes knowledgeable professionals in the field of advanced security practices. At first you will learn about the enterprise security architecture, security technology and resource technology. Then you will learn security design and solutions, application security design, managing risk, security policies, security procedures and enterprise security integration. Finally, you will learn about security research and analysis, disaster recovery and business continuity, managing risk in projects, legal issues and judgment and decision-making. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers. This course will prepare you to pass the exam CompTIA Advanced Security Practitioner (CASP). So, if you are interested to get this course don't delay to join now.
To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee.
Hardcopy Certificate by post - £19
Soft copy PDF via email - £10
Our CompTIA Advanced Security Practitioner (CASP) - Video Training Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation.
After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market.
The Enterprise Security Architecture | |||
The Basics of Enterprise Security | FREE | 01:00:00 | |
The Enterprise Structure | 00:21:00 | ||
Enterprise Security Requirements | 00:09:00 | ||
The Enterprise Security Technology | |||
Common Network Security Components and Technologies | 00:55:00 | ||
Communications and Collaboration Security | 00:40:00 | ||
Cryptographic Tools and Techniques | 00:56:00 | ||
Advanced Authentication | 00:14:00 | ||
Enterprise Resource Technology | |||
Enterprise Storage Security Issues | 01:18:00 | ||
Distributed, Shared, and Virtualized Computing | 00:26:00 | ||
Cloud Computing and Security | 00:10:00 | ||
Security Design and Solutions | |||
Network Security Design | 02:22:00 | ||
Conduct a Security Assessment | 00:55:00 | ||
Host Security | 01:19:00 | ||
Managing Risk in Projects | |||
Create a Risk Management Plan | 01:15:00 | ||
Identify Risks and Their Causes | 00:11:00 | ||
Analyze Risks | 00:19:00 | ||
Develop a Risk Response Plan | 00:07:00 | ||
Integrating Advanced Authentication and Authorization Techniques | |||
Implement Authentication | 00:19:00 | ||
Implement Advanced | 00:07:00 | ||
Implementing Cryptographic Techniques | |||
Describe Cryptographic Concepts | 00:19:00 | ||
Choose Cryptographic Techniques | 00:31:00 | ||
Choose Cryptographic Implementation | 00:07:00 | ||
Integrating Hosts, Storage, Networks, and Apps in a Secure Enterprise Architecture | |||
Implement Security Standards in the Enterprise | 00:13:00 | ||
Select Technical Deployment Models | 00:28:00 | ||
The Enterprise Structure | 00:21:00 | ||
Secure Enterprise Application Integration Enablers | 00:21:00 | ||
Security Research and Analysis | |||
Perform an Industry Trends and Impact Analysis | 00:41:00 | ||
Perform an Enterprise Security Analysis | 00:26:00 | ||
Disaster Recovery and Business Continuity | |||
BCP Fundamentals | 00:21:00 | ||
BCP Implementation | 00:10:00 | ||
DRP Fundamentals | 00:18:00 | ||
DRP Implementation | 00:03:00 | ||
Responding to and Recovering from Incidents | |||
Design Systems to Facilitate Incident Response | 00:14:00 | ||
Conduct Incident and Emergency Responses | 00:20:00 | ||
Legal Issues | |||
Computer Crime Laws and Regulations | 00:16:00 | ||
Computer Crime Incident Response | 00:17:00 | ||
Judgment and Decision-Making | |||
Develop Critical Thinking Skills | 00:12:00 | ||
Determine the Root of a Problem | 00:06:00 | ||
Use Judgment to Make Sound Decisions | 00:18:00 | ||
Certificate and Transcript | |||
Order Your Certificates and Transcripts | 00:00:00 |