CompTIA CASP CAS-002: Technical Integration of Enterprise Components

This course is included in our On-demand training solution.

Overview

Tying all the security mechanisms in your organization together is extremely important, as it will bring the overall security into effect. In this course, you’ll learn about integrating hosts, storage, networks and applications into a secure enterprise architecture. You will also examine ways to integrate advanced authentication and authorization technologies to support enterprise objectives. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Advanced Security Practitioner (CAS-002) certification exam.

Target Audience

Security candidates looking to certify their technical knowledge and skills required to conceptualize, engineer, integrate, and implement secure solutions across complex environments

Prerequisites

None

Expected Duration

90 min.

Course Objectives

Course Introduction

Secure Data Flows to Meet Changing Business Needs

  • define how secure data flows can be used to meet changing business needs
  • Standards

  • define how standards are used to secure a network environment
  • Interoperability Issues

  • define how interoperability issues affect network security
  • Cloud and Virtualization Considerations and Options

  • define how cloud and virtualized environments affect network security
  • Vulnerabilities Associated with Virtual Machines

  • define how the vulnerabilities associated with virtual machines will affect network security
  • Secure Use of On-demand Cloud Computing

  • define how to secure on-demand cloud computing
  • Data Aggregation and Isolation

  • define how data aggregation and isolation is used to aid in securing a network environment
  • Resources Provisioning and De-Provisioning

  • identify how provisioning and de-provisioning of resources affects network security
  • Securing Virtual Environments

  • understand how to secure virtual environments
  • Mergers, Acquisitions, and Divestitures

  • define how mergers, acquisitions, and divestitures can affect network security
  • Network Secure Segmentation and Delegation

  • define how network secure segmentation and delegation can affect network security
  • Logical and Physical Deployment Diagrams

  • define how logical and physical deployment diagrams are used to create secure network environments
  • Secure Infrastructure Design

  • define how a secure infrastructure design is used when creating network security plans
  • Storage Integration

  • define how storage integration can be used to aid in securing a network environment
  • CRM, ERP, and GRC

  • define how CRM, ERP, and GRC are used to aid in creating a secure network environment
  • ESB, SOA, and Directory Services

  • define how ESB, SOA, and directory services are used to aid in creating a secure network environment
  • DNS, CMDB, and CMS

  • define how DNS, CMDB, and CMS are used to aid in creating a secure network environment
  • Advanced Authentication

  • identify how advanced authentication can help in creating a secure network environment
  • Advanced Authorization

  • identify how advanced authorization is used to help create a secure network environment
  • Attestation and Identity Propagation

  • define how attestation and identity propagation can help in creating a secure network environment
  • Federation

  • identify how federation can help in creating a secure network environment
  • RADIUS

  • identify how the RADIUS trust model can be used to help create a secure network environment
  • Lightweight Direct Access Protocol

  • identify how the LDAP trust model can be used to help create a secure network environment
  • Active Directory

  • identify how the Active Directory trust model can be used to help create a secure network environment
  • Exercise: Technical Integration of Components

    SUBSCRIPTION COST



     

    NEED HELP OR NOT SURE?