Categories

There are currently no items in your shopping cart.

User Panel

Forgot your password?.

CompTIA Advanced Security Practitioner

Video Introducing this tutorial

01 - CompTIA Advanced Security Practitioner - Introduction
02 - Module Introduction
03 - Learning objectives
04 - 1.1 Risk Management of New Initiatives
05 - 1.2 Business and Industry Policies
06 - 1.3 Internal and External Influences
07 - 1.4 Impacts of De-perimiterization
08 - Learning objectives
09 - 2.1 Policy and Process Life Cycle Management
10 - 2.2 Partnering with HR, Legal, and the C-Suite
11 - 2.3 Common Business Documentation
12 - 2.4 Security Requirements for Contracts
13 - 2.5 General Principles for Sensitive Information
14 - 2.6 Developing Standard Policies and Security Practices
15 - Learning objectives
16 - 3.1 CIA-based Decisions for the Organization
17 - 3.2 System-specific Worst-case Analysis
18 - 3.3 Risk Determination
19 - 3.4 Translating Risk into Business Terms
20 - 3.5 Risk Treatment
21 - 3.6 Risk Management Process
22 - 3.7 Business Continuity Planning
23 - 3.8 IT Governance and Frameworks
24 - 3.9 Enterprise Resilience and Continual Improvement
25 - Learning objectives
26 - 4.1 Reviewing Control Effectiveness
27 - 4.2 Reverse Engineering and Deconstruction
28 - 4.3 Collecting and Analyzing Metrics
29 - 4.4 Prototypes, Benchmarks, and Baselines
30 - 4.5 Analyzing Cyber Defense Trends
31 - 4.6 Analyzing Solution Metrics for Business Needs
32 - Module Introduction
33 - Learning objectives
34 - 5.1 Physical and Virtual Network and Security Devices
35 - 5.2 Application and Protocol-aware Technologies
36 - 5.3 Advanced Network Design - Cryptographic Solutions
37 - 5.4 Advanced Network Design - Networking Solutions
38 - 5.5 Complex Solutions for Data Flow
39 - 5.6 Secure Configuration and SDN
40 - 5.7 Network Management and Montioring Tools
41 - 5.8 Advanced Configuration of Infrastucture Devices - Configuration and Zoning
42 - 5.9 Advanced Configuration of Infrastucture Devices - Network-enabled Devices
43 - Learning objectives
44 - 6.1 Implementing Trusted O_S
45 - 6.2 Endpoint Security Software
46 - 6.3 Hardening Hosts - Administrative Controls
47 - 6.4 Hardening Hosts - Peripheral Protection
48 - 6.5 Boot Loader Protections
49 - 6.6 Terminal Services and Application Delivery Services
50 - Learning objectives
51 - 7.1 Enterprise Mobility Management - MDM
52 - 7.2 Enterprise Mobility Management - MAM
53 - 7.3 Mobility Security and Privacy Concerns - Data Storage
54 - 7.4 Mobility Security and Privacy Concerns - Peripherals
55 - 7.5 Mobility Security and Privacy Concerns - Authentication
56 - 7.6 Wearable Technology
57 - Learning objectives
58 - 8.1 Application Security Design Considerations
59 - 8.2 Specific Application Issues - Attacks and Exploits
60 - 8.3 Specific Application Issues - Common Vulnerabilities
61 - 8.4 Specific Application Issues - Sandboxing and Firewalls
62 - 8.5 Client-side Processing vs. Server-side Processing
63 - 8.6 O_S and Firmware Vulnerabilities
64 - Module Introduction
65 - Learning objectives
66 - 9.1 Security Assessment Methods - Strategies
67 - 9.2 Security Assessment Methods - Techniques
68 - 9.3 Security Assessment Types - Testing and Assessment
69 - 9.4 Security Assessment Types - Exercises
70 - Learning objectives
71 - 10.1 Scanners
72 - 10.2 Additional Security Assessment Tools
73 - 10.3 Types of Host Tools - Scanners and Crackers
74 - 10.4 Types of Host Tools - Monitoring and Analysis
75 - 10.5 Physical Security Tools

You Have Got Gift 25% OFF

Use this Coupon Code “J3JKN396