CASP+ (CAS-004) Cert Prep: 2 Security Operations

Go to class
Write Review

Free Online Course: CASP+ (CAS-004) Cert Prep: 2 Security Operations provided by LinkedIn Learning is a comprehensive online course, which lasts for 8 hours worth of material. The course is taught in English and is free of charge. Upon completion of the course, you can receive an e-certificate from LinkedIn Learning. CASP+ (CAS-004) Cert Prep: 2 Security Operations is taught by Jason Dion.

Overview
  • Learn about the security operations topics you need to know to pass the CompTIA Advanced Security Practitioner+ (CASP+) (CAS-004) exam.

Syllabus
  • Introduction

    • Welcome
    • About the exam
    1. Threat and Vulnerability Management
    • Threat and vulnerability management
    • Threat intelligence
    • Threat hunting
    • Intelligence collection
    • Threat actors
    • Threat management frameworks
    • Vulnerability management activities
    • Security Content Automation Protocol
    2. Vulnerability Assessments
    • Vulnerability assessments
    • Penetration test
    • Pen test steps
    • Pen test requirements
    • Code analysis
    • Protocol analysis
    • Analysis utilities
    3. Risk Reduction
    • Risk reduction
    • Deceptive technologies
    • Security data analytics
    • Preventative controls
    • Application controls
    • Security automation
    • Physical security
    4. Analyzing Vulnerabilities
    • Analyzing vulnerabilities
    • Race conditions
    • Buffer overflows
    • Authentication and references
    • Ciphers and certificates
    • Improper headers
    • Software composition
    • Vulnerable web applications
    5. Attacking Vulnerabilities
    • Attacking vulnerabilities
    • Directory traversals
    • Cross-Site Scripting (XSS)
    • Cross-site request forgery (CSRF)
    • SQL injections
    • XML injections
    • Other injection attacks
    • Authentication bypass
    • VM attacks
    • Network attacks
    • Social engineering
    6. Indicators of Compromise
    • Indicators of compromise
    • Types of IoCs
    • PCAP files
    • NetFlow
    • Logs
    • IoC notifications
    • Response to IoCs
    7. Incident Response
    • Incident response
    • Triage
    • Communication plan
    • Stakeholder management
    • Incident response process
    • Playbooks
    8. Digital Forensics
    • Digital forensics
    • Forensic process
    • Chain of custody
    • Order of volatility
    • Forensic analysis
    9. Digital Forensic Tools
    • Digital forensic tools
    • Forensic workstations
    • File carving tools
    • Binary analysis tools
    • Forensic analysis tools
    • Imaging tools
    • Collection tools
    Conclusion
    • Conclusion