CASP+ (CAS-004) Cert Prep: 1 Security Architecture

Go to class
Write Review

Free Online Course: CASP+ (CAS-004) Cert Prep: 1 Security Architecture provided by LinkedIn Learning is a comprehensive online course, which lasts for 9 hours worth of material. The course is taught in English and is free of charge. Upon completion of the course, you can receive an e-certificate from LinkedIn Learning. CASP+ (CAS-004) Cert Prep: 1 Security Architecture is taught by Jason Dion.

Overview
  • Learn about the security architecture topics you need to know to pass the CompTIA Advanced Security Practitioner+ (CASP+) (CAS-004) exam.

Syllabus
  • Introduction

    • Welcome
    • About the exam
    1. Securing Networks
    • Securing networks
    • Switches
    • Routers
    • Wireless and mesh
    • Firewalls
    • Proxies
    • Gateways
    • IDS and IPS
    • Network access control
    • Remote access
    • Unified communication
    • Cloud vs. on-premises
    • DNSSEC
    • Load balancer
    2. Securing Architectures
    • Securing architectures
    • Traffic mirroring
    • Network sensors
    • Host sensors
    • Layer 2 segmentation
    • Network segmentation
    • Server segmentation
    • Zero trust
    • Merging networks
    • Software-defined networking
    3. Infrastructure Design
    • Infrastructure design
    • Scalability
    • Resiliency issues
    • Automation
    • Performance design
    • Virtualization
    • Containerization
    4. Cloud and Virtualization
    • Cloud and virtualization
    • Cloud deployment models
    • Cloud service models
    • Deployment considerations
    • Provider limitations
    • Extending controls
    • Provisioning and deprovision
    • Storage models
    • Virtualization
    5. Software Applications
    • Software applications
    • Systems development lifecycle
    • Software development lifecycle
    • Development approaches
    • Software assurance
    • Baselines and templates
    • Best practices
    • Integrating applications
    6. Data Security
    • Data security
    • Data lifecycle
    • Data classification
    • Labeling and tagging
    • Deidentification
    • Data encryption
    • Data loss prevention (DLP)
    • DLP detection
    • Data loss detection
    7. Authentication and Authorization
    • Authentication and authorization
    • Access control
    • Credential management
    • Password policies
    • Multi-factor authentication
    • Authentication protocols
    • Federation
    • Root of trust
    • Attestation
    • Identity proofing
    8. Cryptography
    • Cryptography
    • Privacy and confidentiality
    • Integrity
    • Compliance and policy
    • Data states
    • Cryptographic use cases
    • PKI use cases
    9. Emerging Technology
    • Emerging technology
    • Artificial intelligence and machine learning
    • Deep learning
    • Big data
    • Blockchain distributed consensus
    • Passwordless authentication
    • Homomorphic encryption
    • Virtual and augmented reality
    • 3D printing
    • Quantum computing
    Conclusion
    • Conclusion