Course Outline
Part I: Security Architecture
- Introduction
- Services
- Segmentation
- De-perimeterization/Zero Trust
- Merging of Networks from Various Organizations
- Software-Defined Networking (SDN)
- Exam Preparation Tasks (10 Questions)
- Introduction
- Scalability
- Resiliency
- Automation
- Performance
- Containerization
- Virtualization
- Content Delivery Network
- Caching
- Exam Preparation Tasks (10 Questions)
- Introduction
- Baseline and Templates
- Software Assurance
- Considerations of Integrating Enterprise Applications
- Integrating Security into Development Life Cycle
- Exam Preparation Tasks (10 Questions)
- Introduction
- Data Loss Prevention
- Data Loss Detection
- Data Classification, Labeling, and Tagging
- Obfuscation
- Anonymization
- Encrypted vs. Unencrypted
- Data Life Cycle
- Data Inventory and Mapping
- Data Integrity Management
- Data Storage, Backup, and Recovery
- Exam Preparation Tasks (10 Questions)
- Labs
- Introduction
- Credential Management
- Password Policies
- Federation
- Access Control
- Protocols
- Multifactor Authentication (MFA)
- One-Time Password (OTP)
- Hardware Root of Trust
- Single Sign-On (SSO)
- JavaScript Object Notation (JSON) Web Token (JWT)
- Attestation and Identity Proofing
- Exam Preparation Tasks (10 Questions)
- Introduction
- Virtualization Strategies
- Provisioning and Deprovisioning
- Middleware
- Metadata and Tags
- Deployment Models and Considerations
- Hosting Models
- Service Models
- Cloud Provider Limitations
- Extending Appropriate On-premises Controls
- Storage Models
- Exam Preparation Tasks (10 Questions)
- Labs
- Introduction
- Privacy and Confidentiality Requirements
- Integrity Requirements
- Non-repudiation
- Compliance and Policy Requirements
- Common Cryptography Use Cases
- Common PKI Use Cases
- Exam Preparation Tasks: 10 Questions
- Labs
Part II: Security Operations
- Introduction
- Intelligence Types
- Actor Types
- Threat Actor Properties
- Intelligence Collection Methods
- Frameworks
- Exam Preparation Tasks: 10 Questions
- Labs
- Introduction
- Indicators of Compromise
- Response
- Exam Preparation Tasks: 10 Questions
- Labs
- Vulnerability Scans
- Security Content Automation Protocol (SCAP)
- Self-assessment vs. Third-Party Vendor Assessment
- Patch Management
- Information Sources
- Exam Preparation Tasks: 10 Questions
- Labs
- Introduction
- Methods
- Tools
- Dependency Management
- Requirements
- Exam Preparation Tasks: 10 Questions
- Labs
- Introduction
- Vulnerabilities
- Inherently Vulnerable System/Application
- Attacks
- Exam Preparation Tasks: 10 Questions
- Introduction
- Proactive and Detection
- Security Data Analytics
- Preventive
- Application Control
- Security Automation
- Physical Security
- Exam Preparation Tasks: 10 Questions
- Introduction
- Event Classifications
- Triage Event
- Pre-escalation Tasks
- Incident Response Process
- Specific Response Playbooks/Processes
- Communication Plan
- Stakeholder Management
- Exam Preparation Tasks: 10 Questions
- Labs
- Section: Introduction
- Legal vs. Internal Corporate Purposes
- Forensic Process
- Integrity Preservation
- Cryptanalysis
- Steganalysis
- Exam Preparation Tasks: 10 Questions
- Labs
- Introduction
- File Carving Tools
- Binary Analysis Tools
- Analysis Tools
- Imaging Tools
- Hashing Utilities
- Live Collection vs. Post-mortem Tools
- Exam Preparation Tasks: 10 Questions
- Introduction
- File Carving Tools
- Binary Analysis Tools
- Analysis Tools
- Imaging Tools
- Hashing Utilities
- Live Collection vs. Post-mortem Tools
- Exam Preparation Tasks: 10 Questions
Part III: Security Engineering and Cryptography
- Introduction
- Managed Configurations
- Deployment Scenarios
- Exam Preparation Tasks: 10 Questions
- Labs
- Introduction
- Hardening Techniques
- Processes
- Mandatory Access Control
- Trustworthy Computing
- Compensating Controls
- Exam Preparation Tasks: 10 Questions
- Introduction
- Embedded
- ICS/Supervisory Control and Data Acquisition (SCADA)
- Protocols
- Sectors
- Exam Preparation Tasks: 10 Questions
- Introduction
- Automation and Orchestration
- Encryption Configuration
- Logs
- Monitoring Configurations
- Key Ownership and Location
- Key Life-Cycle Management
- Backup and Recovery Methods
- Infrastructure vs. Serverless Computing
- Application Virtualization
- Software-Defined Networking
- Misconfigurations
- Collaboration Tools
- Storage Configurations
- Cloud Access Security Broker (CASB)
- Exam Preparation Tasks: 10 Questions
- Labs
- Introduction
- PKI Hierarchy
- Certificate Types
- Certificate Usages/Profiles/Templates
- Extensions
- Trusted Providers
- Trust Model
- Cross-certification
- Configure Profiles
- Life-Cycle Management
- Public and Private Keys
- Digital Signature
- Certificate Pinning
- Certificate Stapling
- Certificate Signing Requests (CSRs)
- Online Certificate Status Protocol (OCSP) vs. Certificate Revocation List (CRL)
- HTTP Strict Transport Security (HSTS)
- Exam Preparation Tasks: 10 Questions
- Labs
- Introduction
- Hashing
- Symmetric Algorithms
- Asymmetric Algorithms
- Protocols
- Elliptic-Curve Cryptography
- Forward Secrecy
- Authenticated Encryption with Associated Data
- Key Stretching
- Exam Preparation Tasks: 10 Questions
- Labs
- Introduction
- Implementation and Configuration Issues
- Keys
- Exam Preparation Tasks: 10 Questions
Part IV: Governance, Risk, and Compliance
- Introduction
- Risk Assessment
- Risk Handling Techniques
- Risk Types
- Risk Management Life Cycle
- Risk Tracking
- Risk Appetite vs. Risk Tolerance
- Policies and Security Practices
- Exam Preparation Tasks: 10 Question
- Introduction
- Shared Responsibility Model (Roles/Responsibilities)
- Vendor Lock-in and Vendor Lock-out
- Vendor Viability
- Meeting Client Requirements
- Support Availability
- Geographical Considerations
- Supply Chain Visibility
- Incident Reporting Requirements
- Source Code Escrows
- Ongoing Vendor Assessment Tools
- Third-Party Dependencies
- Technical Considerations
- Exam Preparation Tasks: 10 Questions
- Introduction
- Security Concerns of Integrating Diverse Industries
- Data Considerations
- Geographic Considerations
- Third-Party Attestation of Compliance
- Regulations, Accreditations, and Standards
- Legal Considerations
- Contract and Agreement Types
- Exam Preparation Tasks: 10 Questions
- Introduction
- Business Impact Analysis
- Privacy Impact Assessment
- Disaster Recovery Plan (DRP)/Business Continuity Plan (BCP)
- Incident Response Plan
- Testing Plans
- Exam Preparation Tasks (10 Questions)
- Labs
CompTIA®AdvancedSecurity Practitioner(CASP+) CAS-004 Practice Test
Scheduling and Information