YoVDO

CASP+ (CAS-004) Cert Prep: 1 Security Architecture

Offered By: LinkedIn Learning

Tags

CompTIA CASP+ (Plus) Courses Cloud Computing Courses Cryptography Courses Network Security Courses Virtualization Courses Information Security Certifications Courses Data Security Courses

Course Description

Overview

Learn about the security architecture topics you need to know to pass the CompTIA Advanced Security Practitioner+ (CASP+) (CAS-004) exam.

Syllabus

Introduction
  • Welcome
  • About the exam
1. Securing Networks
  • Securing networks
  • Switches
  • Routers
  • Wireless and mesh
  • Firewalls
  • Proxies
  • Gateways
  • IDS and IPS
  • Network access control
  • Remote access
  • Unified communication
  • Cloud vs. on-premises
  • DNSSEC
  • Load balancer
2. Securing Architectures
  • Securing architectures
  • Traffic mirroring
  • Network sensors
  • Host sensors
  • Layer 2 segmentation
  • Network segmentation
  • Server segmentation
  • Zero trust
  • Merging networks
  • Software-defined networking
3. Infrastructure Design
  • Infrastructure design
  • Scalability
  • Resiliency issues
  • Automation
  • Performance design
  • Virtualization
  • Containerization
4. Cloud and Virtualization
  • Cloud and virtualization
  • Cloud deployment models
  • Cloud service models
  • Deployment considerations
  • Provider limitations
  • Extending controls
  • Provisioning and deprovision
  • Storage models
  • Virtualization
5. Software Applications
  • Software applications
  • Systems development lifecycle
  • Software development lifecycle
  • Development approaches
  • Software assurance
  • Baselines and templates
  • Best practices
  • Integrating applications
6. Data Security
  • Data security
  • Data lifecycle
  • Data classification
  • Labeling and tagging
  • Deidentification
  • Data encryption
  • Data loss prevention (DLP)
  • DLP detection
  • Data loss detection
7. Authentication and Authorization
  • Authentication and authorization
  • Access control
  • Credential management
  • Password policies
  • Multi-factor authentication
  • Authentication protocols
  • Federation
  • Root of trust
  • Attestation
  • Identity proofing
8. Cryptography
  • Cryptography
  • Privacy and confidentiality
  • Integrity
  • Compliance and policy
  • Data states
  • Cryptographic use cases
  • PKI use cases
9. Emerging Technology
  • Emerging technology
  • Artificial intelligence and machine learning
  • Deep learning
  • Big data
  • Blockchain distributed consensus
  • Passwordless authentication
  • Homomorphic encryption
  • Virtual and augmented reality
  • 3D printing
  • Quantum computing
Conclusion
  • Conclusion

Taught by

Jason Dion

Related Courses

Advanced Operating Systems
Georgia Institute of Technology via Udacity
Cloud Computing Applications, Part 1: Cloud Systems and Infrastructure
University of Illinois at Urbana-Champaign via Coursera
GT - Refresher - Advanced OS
Georgia Institute of Technology via Udacity
Introduction to Cloud Infrastructure Technologies
Linux Foundation via edX
Microsoft Windows Server 2012 Fundamentals: Hyper-V
Microsoft via edX