• 0Shopping Cart
World IT Center
  • Home
  • Services
    • IT Consulting Services
      • Data Warehousing
      • Web Development
      • Enterprise Resource Planning
      • Management Services
      • Onsite-Offshore Dev Model
      • IT Project Management
      • Management Consulting
      • Network & Systems Expertise
      • Web Expertise
      • Database Expertise
      • Bio Metrics & Artificial Intelligence
      • Quality Assurance
      • Internet of Things (IoT)
      • Training
    • Staffing
      • Staffing Overview
      • Our Search & Placement Process
      • IT Employees Search & Placement
      • Our Staffing Professionals
      • Placement Guaranteed by our Staff
      • Our Staffs Proven Results
      • H-1B Sponsorship
    • Our Solutions
      • 24×7 IT Support Solution
      • Cloud Computing Solutions
      • ECommerce Solutions
      • BI & Reporting Solution
      • Data & Architectural solutions
      • IT Project Solutions
    • Cyber Security
      • Identity Access Management
      • Identity Governance and Administration
      • Data Loss prevention
      • Security Risk Management
      • Identity Administration
    • Application Services
    • Business Strategy
    • Data Analytics
    • Infrastructure
    • Technology Innovation
    • Automation
    • Cloud Services
    • Application Development Services
    • Application Maintenance
    • Customer Software Development
    • System Integration
  • Study Abroad
  • Software
    • Bundles
      • Bundle #1 Power Suite
      • Bundle #2 DLX Suite
      • Bundle #3 Bonus Suite
      • Bundle #4 Performance Suite
      • Bundle #5 Privacy Suite
    • Microsoft
      • Microsoft Office
      • Microsoft Windows
    • Norton
      • Norton Europe
      • Norton Latin America
      • Norton USA
    • Acronis
    • AdAware
    • Avast
    • AVG
    • Bitdefender
    • Bull Guard
    • ESET
    • F-Secure Antivirus
    • F-Secure Internet
    • G Data
    • Heimdal
    • HitmanPro
    • IOLO
    • iS3
    • Kaspersky
    • MalwareBytes
    • McAfee
    • Nero Platinum
    • Panda
    • Trend Micro
    • Trustport
    • Vipre
    • Watchdog Development
    • Webroot
    • Zemana
    • Avast HMA
    • Boost
    • CCleaner
    • FAQ
      • Download Links
      • Activation Video
  • Online Training
    • Courses
      • Adobe
      • Microsoft
      • CompTIA
      • Project Management
      • Security
      • Cisco
      • Web Development
      • Programming
      • Cloud Services & Virtualization
      • Databases
      • CyberSecurity
      • Accounting
      • Social Media and Marketing
    • Bundles Courses
    • All Courses Page Details
  • Consumer Electronics
  • Apply Jobs
  • Login
  • Search
  • Menu Menu
Sale!

CBT Training Videos for CompTIA: Advanced Security Practitioner (CASP)

$99.00 $49.99

9 in stock

EAN: N/A SKU: 753569148262 Categories: CompTIA, Courses, Security Tags: Advanced Security, Architecture Concepts, CASP+, comptia, CompTIA Advanced Security Practitioner (CASP+), CompTIA: Advanced Security Practitioner
  • Description

Course Description

The CASP exam covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers, while managing risk.

Module 1: Underlying Security Models

  • Course Guide
  • Underlying Security Models Part 1
  • Underlying Security Models Part 2
  • Underlying Security Models Part 3
  • Underlying Security Models Part 4
  • Underlying Security Models Part 5
  • Underlying Security Models Part 6
  • Underlying Security Models Part 7
  • General Security Part 1
  • General Security Part 2

Module 2: Selecting Security

  • Selecting Security Products Part 1
  • Selecting Security Products Part 2
  • Selecting Security Products Part 3
  • Control Selection Process Part 1
  • Control Selection Process Part 2

Module 3: Cryptography

  • Cryptography Symmetric and Asymmetric Part 1
  • Cryptography Symmetric and Asymmetric Part 2
  • Cryptography Symmetric and Asymmetric Part 3
  • Cryptography Symmetric and Asymmetric Part 4
  • Cryptography Message Integrity Controls Part 1
  • Cryptography Message Integrity Controls Part 2
  • Cryptography Message Integrity Controls Part 3
  • Cryptography Digital Signatures Part 1
  • Cryptography Digital Signatures Part 2
  • Cryptography PKI and PGP Part 1
  • Cryptography PKI and PGP Part 2
  • Cryptography PKI and PGP Part 3
  • Cryptography PKI and PGP Part 4

Module 4: Storage

  • Storage Part 1
  • Storage Part 2
  • Storage Part 3
  • Storage Part 4

Module 5: Virtual Computing

  • Virtual Computing
  • Cloud Computing Part 1
  • Cloud Computing Part 2
  • Cloud Computing Part 3
  • Cloud Computing Part 4
  • Cloud Computing Part 5

Module 6: IPv6

  • IPV6 Part 1
  • IPV6 Part 2

Module 7: Remote Access Security

  • Remote Access Security Part 1
  • Remote Access Security Part 2

Module 8: Domain Name System

  • Domain Name System Part 1
  • Domain Name System Part 2
  • Domain Name System Part 3
  • Domain Name System Part 4
  • Domain Name System Part 5
  • Domain Name System Part 6
  • Domain Name System Part 7
  • Domain Name System Part 8

Module 9: Directory Services

  • Directory Services

Module 10: Firewall and VPN

  • Firewall and VPN Part 1
  • Firewall and VPN Part 2
  • Firewall and VPN Part 3
  • Firewall and VPN Part 4
  • Firewall Policy Part 1
  • Firewall Policy Part 2
  • Firewall Policy Part 3
  • Firewall Policy Part 4

Module 11: Security Configuration Management

  • Security Configuration Management Part 1
  • Security Configuration Management Part 2
  • Security Configuration Management Part 3

Module 12: Network Infrastructure Security

  • Network Infrastructure Security Part 1
  • Network Infrastructure Security Part 2
  • Network Infrastructure Security Part 3
  • Network Infrastructure Security Part 4

Module 13: Secure Web Services

  • Secure Web Services Part 1
  • Secure Web Services Part 2
  • OWASP top Ten Part 1
  • OWASP top Ten Part 2
  • OWASP top Ten Part 3
  • OWASP top Ten Part 4
  • OWASP top Ten Part 5

Module 14: Buffer Overflows

  • Buffer Overflows Part 1
  • Buffer Overflows Part 2

Module 15: SQL Injection

  • SQL Injection Part 1
  • SQL Injection Part 2

Module 16: Access Control

  • Access Control Part 1
  • Access Control Part 2

Module 17: Single Sign-On

  • Single Sign-On Part 1
  • Single Sign-On Part 2
  • Single Sign-On Part 3

Module 18: Risk Assessment

  • Risk Assessment Part 1
  • Risk Assessment Part 2

Module 19: Testing and Assessment

  • Testing and Assessment Part 1
  • Testing and Assessment Part 2
  • Testing and Assessment Part 3

Module 20: Common Vulnerability

  • Common Vulnerability Scoring System Part 1
  • Common Vulnerability Scoring System Part 2
  • Common Vulnerability Scoring System Part 3
  • Common Vulnerability Scoring System Part 4

Module 21: Common Criteria

  • Common Criteria Part 1
  • Common Criteria Part 2
  • Common Criteria Part 3
  • Common Criteria Part 4
  • Common Criteria Part 5

Module 22: Personally Identifiable Information

  • Personally Identifiable Information Part 1
  • Personally Identifiable Information Part 2

Module 23: Risk Management

  • Risk Management Part 1
  • Risk Management Part 2
  • Risk Management Part 3

Module 24: Frameworks

  • Frameworks Part 1
  • Frameworks Part 2
  • Frameworks Part 3
  • Frameworks Part 4

Module 25: Interconnecting Systems

  • Interconnecting Systems Part 1
  • Interconnecting Systems Part 2

Module 26: Security Services

  • Security Services Part 1
  • Security Services Part 2
  • Security Services Part 3
  • Security Services Part 4

Module 27: Continuous Monitoring

  • Continuous Monitoring Part 1
  • Continuous Monitoring Part 2
  • Continuous Monitoring Part 3
  • Continuous Monitoring Part 4

Module 28:Incident Handling

  • Incident Handling Part 1
  • Incident Handling Part 2
  • Incident Handling Part 3
  • Incident Handling Part 4

Module 29: Forensic & Incident Response

  • Forensic and Incident Response Part 1
  • Forensic and Incident Response Part 2
  • Forensic and Incident Response Part 3

Module 30: Requirements Processing

  • Requirements Processing Part 1
  • Requirements Processing Part 2
  • Requirements Processing Part 3

Module 31: Standards Bodies

  • Standards Bodies

Module 32: Secure System Life Cycle

  • Secure System Life Cycle Part 1
  • Secure System Life Cycle Part 2
  • Secure System Life Cycle Part 3

Module 33- Email

  •      Email

Module 34- Mobile and BYOD

  • Mobile and BYOD Part 1
  • Mobile and BYOD Part 2

 Module 35- Voiceover IP

  • Voice over IP

Module 36- Physical Facilities Assessment Process

  • Physical Facilities Assessment Process Part 1
  • Physical Facilities Assessment Process Part 2

 

WorldITCenter

WorldITCenter expertise to optimize performance in every aspect of your organization. To succeed in today’s environment, businesses need to lead through increased complexity and volatility.

Quick Links

  • Online Training/Courses
  • Buy Softwares
  • Get Consultation

Find Us

67 S Bedford St,400 W
Burlington, MA 01803
USA

Terms And Conditions

  • Terms of Use
  • Privacy Policy
  • Refunding Policy
  • Rescheduling Policy
  • Free Demo Trail
  • Payment Provider

These are my Office Hours

Mo-Fr: 8:00-19:00
Sa: 8:00-14:00
So: closed

2015-20 © Copyright - World IT Center
  • Facebook
  • LinkedIn
  • Youtube
CBT Training Videos for CompTIA Security Analytics Professional (CSAP) CBT Training Videos for CompTIA FC0-U51: IT Fundamentals Course
Scroll to top