CompTIA CASP CAS-002: Integration of Computing, Communications, and Disciplines

Security candidates looking to certify their technical knowledge and skills required to conceptualize, engineer, integrate, and implement secure solutions across complex environments

Prerequisite
None

Expected Duration
73 minutes

Description
Ensuring that departments work in a collaborative fashion is extremely important and will actually increase network security when done properly. In this course, you’ll learn about facilitating collaboration across diverse business units to achieve security goals. You will also look at selecting the appropriate control to secure communications and collaboration solutions. Finally, you will examine security activities across the technology life cycle. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Advanced Security Practitioner (CAS-002) certification exam.

Objective

Business Unit Collaboration

  • start the course
  • identify the role of sales staff and programmers in network security implementations
  • identify the role of database and network administrators in network security implementations
  • identify the role of management and finance in network security implementations
  • identify the role of human resources and emergency response in network security implementations
  • identify the role of facilities and physical security managers in network security implementations
  • identify how different business units must collaborate and use security guidance

Security of Unified Collaboration Tools

  • identify how conferencing and messaging solutions are used to secure network environments
  • identify how desktop sharing, remote assistance, and presence affect network security
  • define how telephony must be secured
  • define the need for security when working with collaboration sites
  • identify how over-the-air technologies can be secured in a network environment

Security Activities Across a Technology Life Cycle

  • identify how change management, operations, and maintenance are used to secure network environments
  • identify how commissioning, reuse, and disposal affect network security
  • identify the importance of the Security System Development Life Cycle when developing network security
  • identify how to use the Security Requirements Traceability Matrix
  • identify how testing and Agile, waterfall, and spiral methodologies are used when securing a networked environment

Inventory Control

  • identify how device tracking technologies are used when securing a network environment
  • identify how object tracking and containment technologies are used when securing a network environment

Practice: Computing and Communications

  • increasing Network Security Knowledge

MONTHLY SUBSCRIPTION

$129/month
 

ANNUAL SUBSCRIPTION

$1295/year

Multi-license discounts available for Annual and Monthly subscriptions.