Introduction To CASP
Introduction to CASP18:31
1.0 Risk Management
1.1 Summarize business and industry influences and associated security risks.22:48
1.2 Compare and contrast security, privacy policies and procedures based on organizational requirements.36:08
1.3 Given a scenario, execute risk mitigation strategies and controls.1:10:51
1.4 Analyze risk metric scenarios to secure the enterprise.28:43
2.0 Enterprise Security Architecture
2.1 Analyze a scenario and integrate network and security components, concepts and architectures to meet security requirements Part-152:56
2.1 Analyze a scenario and integrate network and security components, concepts and architectures to meet security requirements Part-21:04:50
2.1 Analyze a scenario and integrate network and security components, concepts and architectures to meet security requirements Part-322:19
2.2 Analyze a scenario to integrate security controls for host devices to meet security requirements Part-153:07
2.2 Analyze a scenario to integrate security controls for host devices to meet security requirements Part-200:29:36
2.3 Analyze a scenario to integrate security controls for mobile and small form factor devices to meet security requirements Part-11:01:46
2.3 Analyze a scenario to integrate security controls for mobile and small form factor devices to meet security requirements Part-214:49
2.4 Given software vulnerability scenarios, select appropriate security controls.1:06:01
3.0 Enterprise Security Operations
3.1 Given a scenario, conduct a security assessment using the appropriate methods.51:57
3.2 Analyze a scenario or output, and select the appropriate tool for a security assessment Part-11:02:36
3.2 Analyze a scenario or output, and select the appropriate tool for a security assessment Part-258:44
3.3 Given a scenario, implement incident response and recovery procedures Part-159:13
3.3 Given a scenario, implement incident response and recovery procedures Part-215:33
4.0 Technical Integration of Enterprise Security
4.1 Given a scenario, integrate hosts, storage, networks and applications into a secure enterprise architecture.45:48
4.2 Given a scenario, integrate cloud and virtualization technologies into a secure enterprise architecture.46:19
4.3 Given a scenario, integrate and troubleshoot advanced authentication and authorization technologies to support enterprise security objectives.36:34
4.4 Given a scenario, implement cryptographic techniques.00:53:25
4.5 Given a scenario, select the appropriate control to secure communications and collaboration solutions – Part 112:30
4.5 Given a scenario, select the appropriate control to secure communications and collaboration solutions – Part 200:17:50
5.0 Research, Development and Collaboration
5.1 Given a scenario, apply research methods to determine industry trends and their impact to the enterprise.35:49
5.2 Given a scenario, implement security activities across the technology life cycle.58:05
5.3 Explain the importance of interaction across diverse business units to achieve security goals.00:19:28