Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA Advanced Security Practitioner (CASP+) - CAS-004
02 - 1. Enterprise Mobility
01 - Enterprise mobility (2:36)
02 - Enterprise mobility management (9:36)
03 - WPA3 (7:20)
04 - Connectivity options (8:48)
05 - Security configurations (8:08)
06 - DNS protection (3:15)
07 - Deployment options (4:38)
08 - Reconnaissance concerns (8:00)
09 - Mobile security (7:50)
03 - 2. Endpoint Security Controls
01 - Endpoint security controls (2:24)
02 - Device hardening (8:30)
03 - Patching (4:42)
04 - Security settings (5:41)
05 - Mandatory access controls (MAC) (6:44)
06 - Secure boot (5:49)
07 - Hardware encryption (4:48)
08 - Endpoint protections (9:54)
09 - Logging and monitoring (6:14)
10 - Resiliency (6:04)
04 - 3. Cloud Technologies
01 - Cloud technologies (2:38)
02 - Business continuity and disaster recovery (7:51)
03 - Cloud encryption (5:23)
04 - Serverless computing (8:54)
05 - Software-defined networking (SDN) (6:52)
06 - Log collection and analysis (4:22)
07 - Cloud application security broker (6:16)
08 - Cloud misconfigurations (10:57)
05 - 4. Operational Technologies
01 - Operational technologies (2:05)
02 - Embedded systems (10:28)
03 - ICS and SCADA (9:18)
04 - ICS protocols (10:54)
05 - Industries and sectors (4:51)
06 - 5. Hashing and Symmetric Algorithms
01 - Hashing and symmetric algorithms (1:13)
02 - Hashing (6:55)
03 - Message authentication (3:33)
04 - Symmetric algorithms (5:43)
05 - Stream ciphers (4:32)
06 - Block ciphers (10:01)
07 - Elliptic curve cryptography (ECC) (3:34)
08 - Forward secrecy (3:35)
10 - Key stretching (4:30)
07 - 6. Asymmetric Algorithms
01 - Asymmetric algorithms (2:11)
02 - Using asymmetric algorithms (9:28)
03 - SSL, TLS, and cipher suites (8:21)
04 - SMIME and SSH (7:27)
05 - EAP (5:39)
06 - IPSec (14:34)
07 - Elliptic curve cryptography (ECC) (3:34)
08 - Forward secrecy (3:35)
09 - Authenticated encryption with associated data (AEAD) (1:53)
10 - Key stretching (4:30)
08 - 7. Public Key Infrastructure
01 - Public key infrastructure (4:30)
02 - PKI components (10:18)
03 - Digital certificates (7:45)
04 - Using digital certificates (5:40)
05 - Trust models (4:29)
06 - Certificate management (2:44)
07 - Certificate validity CRL and OCSP (3:48)
08 - Protecting web traffic (3:30)
09 - Troubleshooting certificates (5:22)
10 - Troubleshooting keys (3:35)
09 - Conclusion
01 - Conclusion (10:47)
Teach online with
02 - Embedded systems
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock