This course was created with the
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA Advanced Security Practitioner (CASP+) - CAS-004
02 - 1. Enterprise Mobility
01 - Enterprise mobility (2:36)
02 - Enterprise mobility management (9:36)
03 - WPA3 (7:20)
04 - Connectivity options (8:48)
05 - Security configurations (8:08)
06 - DNS protection (3:15)
07 - Deployment options (4:38)
08 - Reconnaissance concerns (8:00)
09 - Mobile security (7:50)
03 - 2. Endpoint Security Controls
01 - Endpoint security controls (2:24)
02 - Device hardening (8:30)
03 - Patching (4:42)
04 - Security settings (5:41)
05 - Mandatory access controls (MAC) (6:44)
06 - Secure boot (5:49)
07 - Hardware encryption (4:48)
08 - Endpoint protections (9:54)
09 - Logging and monitoring (6:14)
10 - Resiliency (6:04)
04 - 3. Cloud Technologies
01 - Cloud technologies (2:38)
02 - Business continuity and disaster recovery (7:51)
03 - Cloud encryption (5:23)
04 - Serverless computing (8:54)
05 - Software-defined networking (SDN) (6:52)
06 - Log collection and analysis (4:22)
07 - Cloud application security broker (6:16)
08 - Cloud misconfigurations (10:57)
05 - 4. Operational Technologies
01 - Operational technologies (2:05)
02 - Embedded systems (10:28)
03 - ICS and SCADA (9:18)
04 - ICS protocols (10:54)
05 - Industries and sectors (4:51)
06 - 5. Hashing and Symmetric Algorithms
01 - Hashing and symmetric algorithms (1:13)
02 - Hashing (6:55)
03 - Message authentication (3:33)
04 - Symmetric algorithms (5:43)
05 - Stream ciphers (4:32)
06 - Block ciphers (10:01)
07 - Elliptic curve cryptography (ECC) (3:34)
08 - Forward secrecy (3:35)
10 - Key stretching (4:30)
07 - 6. Asymmetric Algorithms
01 - Asymmetric algorithms (2:11)
02 - Using asymmetric algorithms (9:28)
03 - SSL, TLS, and cipher suites (8:21)
04 - SMIME and SSH (7:27)
05 - EAP (5:39)
06 - IPSec (14:34)
07 - Elliptic curve cryptography (ECC) (3:34)
08 - Forward secrecy (3:35)
09 - Authenticated encryption with associated data (AEAD) (1:53)
10 - Key stretching (4:30)
08 - 7. Public Key Infrastructure
01 - Public key infrastructure (4:30)
02 - PKI components (10:18)
03 - Digital certificates (7:45)
04 - Using digital certificates (5:40)
05 - Trust models (4:29)
06 - Certificate management (2:44)
07 - Certificate validity CRL and OCSP (3:48)
08 - Protecting web traffic (3:30)
09 - Troubleshooting certificates (5:22)
10 - Troubleshooting keys (3:35)
09 - Conclusion
01 - Conclusion (10:47)
01 - Public key infrastructure
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock