YoVDO

CASP+ (CAS-004) Cert Prep: 2 Security Operations

Offered By: LinkedIn Learning

Tags

CompTIA CASP+ (Plus) Courses Cybersecurity Courses Digital Forensics Courses Information Security Certifications Courses Incident Response Courses Vulnerability Assessment Courses Security Operations Courses

Course Description

Overview

Learn about the security operations topics you need to know to pass the CompTIA Advanced Security Practitioner+ (CASP+) (CAS-004) exam.

Syllabus

Introduction
  • Welcome
  • About the exam
1. Threat and Vulnerability Management
  • Threat and vulnerability management
  • Threat intelligence
  • Threat hunting
  • Intelligence collection
  • Threat actors
  • Threat management frameworks
  • Vulnerability management activities
  • Security Content Automation Protocol
2. Vulnerability Assessments
  • Vulnerability assessments
  • Penetration test
  • Pen test steps
  • Pen test requirements
  • Code analysis
  • Protocol analysis
  • Analysis utilities
3. Risk Reduction
  • Risk reduction
  • Deceptive technologies
  • Security data analytics
  • Preventative controls
  • Application controls
  • Security automation
  • Physical security
4. Analyzing Vulnerabilities
  • Analyzing vulnerabilities
  • Race conditions
  • Buffer overflows
  • Authentication and references
  • Ciphers and certificates
  • Improper headers
  • Software composition
  • Vulnerable web applications
5. Attacking Vulnerabilities
  • Attacking vulnerabilities
  • Directory traversals
  • Cross-Site Scripting (XSS)
  • Cross-site request forgery (CSRF)
  • SQL injections
  • XML injections
  • Other injection attacks
  • Authentication bypass
  • VM attacks
  • Network attacks
  • Social engineering
6. Indicators of Compromise
  • Indicators of compromise
  • Types of IoCs
  • PCAP files
  • NetFlow
  • Logs
  • IoC notifications
  • Response to IoCs
7. Incident Response
  • Incident response
  • Triage
  • Communication plan
  • Stakeholder management
  • Incident response process
  • Playbooks
8. Digital Forensics
  • Digital forensics
  • Forensic process
  • Chain of custody
  • Order of volatility
  • Forensic analysis
9. Digital Forensic Tools
  • Digital forensic tools
  • Forensic workstations
  • File carving tools
  • Binary analysis tools
  • Forensic analysis tools
  • Imaging tools
  • Collection tools
Conclusion
  • Conclusion

Taught by

Jason Dion

Related Courses

CompTIA PenTest+ Certification
A Cloud Guru
AWS SimuLearn: Cyber Security Threats
Amazon Web Services via AWS Skill Builder
Ethical Hacking
Cabrillo College via California Community Colleges System
Network Security
City College of San Francisco via California Community Colleges System
Ethical Hacking
Chaffey College via California Community Colleges System