CompTIA CASP CAS-002: Industry Influences, Risk Planning, Strategy, and Control

This course is included in our On-demand training solution.

Overview

The strategic plan that an organization uses is often driven from industry standards and information classification procedures. In this course, you’ll interpret business and industry influences and explain associated security risks. You will also look at risk mitigation planning, strategies, and controls. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Advanced Security Practitioner (CAS-002) certification exam.

Target Audience

Security candidates looking to certify their technical knowledge and skills required to conceptualize, engineer, integrate, and implement secure solutions across complex environments

Prerequisites

None

Expected Duration

120 min.

Course Objectives

Course Introduction

Risk Management

  • identify risk management techniques used to secure a network environment
  • New or Changing Models and Strategies

  • define new and changing models and strategies that are used to secure a network environment
  • Security Concerns of Integrating Diverse Industries

  • identify the security concerns that are associated with integrating diverse industries
  • Third Party Information Security

  • define the implications of creating third party information security
  • Impact of De-Perimeterization

  • identify the impact of de-perimeterization of network resources
  • Internal and External Influences

  • identify how internal and external influences affect network security
  • Information Classification

  • define the information classification techniques and how they can be used when securing a network environment
  • CIA Decisions, Requirements, and Policies

  • discuss CIA decisions and the requirements and policies that can be put in place when securing a network environment
  • CIA Aggregate Scores

  • work with CIA aggregate scores in order to secure a network environment
  • Extreme Planning and Worst Case Scenarios

  • define how to create plans for worse case scenarios that can affect your organization
  • System Specific Risk Analysis

  • define the system specific risk analysis techniques used to secure a network environment
  • Magnitude of Impact

  • analyze the magnitude of impacts caused by events when you are securing a network environment
  • Likelihood of Threat

  • calculate the likelihood of threats that can affect network security
  • Return on Investment and Total Cost of Ownership

  • calculate the ROI and TCO of resources when securing a network environment
  • Risk Appetite Strategies

  • define risk appetite strategies when securing a network environment
  • Risk Management Processes

  • define the risk management process when securing a network environment
  • Enterprise Security Architecture Frameworks

  • define the enterprise security architecture frameworks that can be used when securing a network environment
  • Continuous Improvement and Monitoring

  • define the methods for continuous improvement and monitoring when securing a network environment
  • Business Continuity Planning

  • define how to use business continuity planning when securing a network environment
  • IT Governance

  • define the role IT Governance plays when securing a network environment
  • Exercise: Security Risks, Planning, and Control

    SUBSCRIPTION COST



     

    NEED HELP OR NOT SURE?