CompTIA CASP CAS-002: Research, Analysis and Assessment

Security candidates looking to certify their technical knowledge and skills required to conceptualize, engineer, integrate, and implement secure solutions across complex environments

Prerequisite
None

Expected Duration
149 minutes

Description
Research and testing are the backbone of introducing new technologies and devices into your network. It is important to make sure none of the new changes will compromise network security. In this course, you’ll learn about research methods to determine industry trends and their impact to the enterprise.You will also explore methods of securing an enterprise environment, and you will select methods or tools appropriate to conduct an assessment and analyze the results. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Advanced Security Practitioner (CAS-002) certification exam.

Objective

Ongoing Research and Situational Awareness

  • start the course
  • identify the best practices and new technologies for dealing with new systems
  • identify how client-side attacks, vulnerabilities, and threats affect network security
  • define how zero-day and emergent threats can affect network security
  • define how end-user cloud storage and business integration can affect network security

Global Response and Contractors

  • identify the role of the CERT team and what members should be on it
  • define how conventions, threats actors, and threat intelligence are used to create network security
  • define the role RFPs, RFQs, FRIs, and agreements play in network security

Enterprise Security

  • identify how benchmarks and baselines are used to create network security
  • define how prototypes and testing are used to create network security
  • define how cost benefit analysis is used when creating network security plans
  • identify how metrics collection and analysis is used when creating network security plans
  • identify how trend data and cyber defense are used when creating network security

Security Design and Analysis

  • define the role existing security controls play when creating network security
  • identify how reverse engineering can be used in order to create network security
  • define how performance, latency, scalability, and capability affect network security
  • define how usability, maintainability, availability, and recovery affect network security
  • identify how lessons learned and after-action reports are used to reinforce network security
  • define how judgment calls are used when network security issues arise

Testing Tools

  • define how network analysis tools are used when securing network environments
  • identify how exploitation tools can be used both to test and exploit network environments
  • define how passive reconnaissance and intelligence gathering tools can be used to test network environments

Testing Methods

  • define how assessment, sandboxing, and debugging can be used to test the security of network environments
  • identify how penetration testing can be used to ensure security in network environments
  • identify the differences between black box, white box, and gray box testing techniques
  • define how reconnaissance, fingerprinting, and social engineering can be used to test the security of network environments

Practice: Risk Mitigation Planning and Controls

  • Understand basic security, mitigation and prevention techniques

MONTHLY SUBSCRIPTION

$129/month
 

ANNUAL SUBSCRIPTION

$1295/year

Multi-license discounts available for Annual and Monthly subscriptions.