![]() |
CompTIA CASP+ (CAS-004) - Bob Salmans - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: CompTIA CASP+ (CAS-004) - Bob Salmans (/Thread-CompTIA-CASP-CAS-004-Bob-Salmans) |
CompTIA CASP+ (CAS-004) - Bob Salmans - AD-TEAM - 03-11-2025 ![]() 8.09 GB | 00:08:51 | mp4 | 1920X1080 | 16:9 Genre:eLearning |Language:English
Files Included :
1 DoS Protection, Load Balancers and Proxies (107.24 MB) 2 Intrusion PreventionDetection Systems (75.81 MB) 3 Application Security (36.68 MB) 4 NACs and VPNs (57.64 MB) 5 Securing DNS and Email (78.63 MB) 6 Routers and NAT Gateways (52.69 MB) 7 Firewalls, UTMs and NGFWs (81.19 MB) 1 Threat Intelligence (98.34 MB) 2 Threat Intel Collection Methods (47.96 MB) 3 Types of Threat Actors (42.88 MB) 4 Threat Management Frameworks (58.69 MB) 5 Using MITRE ATT&CK (126.23 MB) 6 IOCs and Responses (40.43 MB) 1 Vulnerability Scans (75.3 MB) 2 Security Content Automation Protocol (SCAP) (77.22 MB) 3 Assessments (80.69 MB) 4 Patch Management (44.71 MB) 5 Information Sources (27.5 MB) 1 Vulnerability Assessment vs Pentesting (53.68 MB) 2 Testing Methods (61 MB) 3 Pentesting Post Exploit (51.4 MB) 4 Vulnerability Assessment Tools (49.21 MB) 5 Some Pentesting Tools (66.28 MB) 6 Vulnerability Assessments and Pentesting Requirements (40.86 MB) 1 Common Software Vulnerabilities (77.33 MB) 2 Race Conditions (43.92 MB) 3 Cryptographic Vulnerabilities (32.39 MB) 4 Software Development Vulnerabilities (49.86 MB) 5 Web Application Attacks (39.88 MB) 6 VM and Network-Based Attacks (68.96 MB) 1 Being Proactive (85.17 MB) 2 Using Data Analysis (70.1 MB) 3 Preventative Measures (57.1 MB) 4 Application Control (39.73 MB) 5 Security Automation (25.47 MB) 6 Physical Security (52.78 MB) 1 Intro (16.55 MB) 2 Event Classification (48.29 MB) 3 Event Triage (50.99 MB) 4 Incident Response Process (46.63 MB) 5 Incident Response Playbooks (80.76 MB) 6 Automated Response (32.69 MB) 7 Communications Plans & Stakeholder Management (26.4 MB) 1 Intro (30.99 MB) 2 Forensic Process Identification (60.45 MB) 3 Digital Forensics (33.68 MB) 4 Forensic Process Evidence Collection (68.55 MB) 5 Forensic Process Evidence Preservation (30.51 MB) 6 Forensic Process Analysis (33.79 MB) 7 Forensic Process Verification and Presentation (19.03 MB) 1 Intro (11.47 MB) 2 Enterprise Mobility Management (30.22 MB) 3 Windows Information Protection (86.75 MB) 4 Configuring Endpoint Security Controls (60.2 MB) 5 Hardening Techniques (96.81 MB) 6 Compensation Controls (34.68 MB) 1 Intro (8.64 MB) 2 Cloud Deployment Models (40.88 MB) 3 Impacts of Cloud Technology Adoption (71.82 MB) 4 Securing Specialized Technologies (49.37 MB) 5 Cloud Threats And Vulnerabilities (22.9 MB) 6 Monitoring Logs Using Azure AD Audit (35.24 MB) 7 Emerging Technologies (88.84 MB) 1 Introduction To Public Key Infrastructure (6.91 MB) 2 The Role Of Public Key Infrastructure (51.63 MB) 3 Private And Public Key Encryption (36.49 MB) 4 Certificate Lifecycle (57.52 MB) 5 Certificate Types And Usage (44.74 MB) 6 Understanding Trust Concepts (72.27 MB) 1 Traffic Monitoring (44.58 MB) 2 Security Sensors (106.37 MB) 3 Network Segmentation (105.45 MB) 4 Deperimeterization Zero Trust (33.78 MB) 5 Merging Networks (56.36 MB) 6 Defense In Depth (25.92 MB) 1 Hashing (73.1 MB) 2 SSLTLS (51.85 MB) 3 Symmetric And Asymmetric Algorithm (25.49 MB) 4 SMIME and SSH (96.1 MB) 5 Internet Protocol Security (IPSec) (69.95 MB) 1 Risk Analysis Methods (44.7 MB) 2 Responding To Risk (52.18 MB) 3 Types of Risk (37.34 MB) 4 Risk Management Lifecycle and Frameworks (62.06 MB) 5 Tracking Risk (29.02 MB) 6 Risk Appetite, Tolerance, and Capacity (55.65 MB) 7 Policies and Security Practices (51.9 MB) 1 Third Party Risk Management (107.7 MB) 2 Vendor Lock-InOut and Viability (45.88 MB) 3 Meeting Obligations (46.87 MB) 4 Third Party Dependencies (56.74 MB) 5 Technical Considerations (47.35 MB) 6 Additional Vendor Considerations (47.13 MB) 1 Data Considerations (72.05 MB) 2 Location, Location, Location (48.15 MB) 3 Regulations, Accreditations and Standards (72.52 MB) 4 Legal Considerations (51 MB) 5 Contract and Agreement Types (51.07 MB) 1 BC and DR Planning (33.95 MB) 2 BCDR Planning Process (61.67 MB) 3 Creating a BC Plan (37.41 MB) 4 DR Planning (79.02 MB) 5 Resiliency Technologies (59.06 MB) 6 Testing BCDR Plans (35.2 MB) 1 Software Defined Networking (SDN) (70.67 MB) 2 Scalability and Automation (70.24 MB) 3 Resiliency In Infrastructure Design (96.39 MB) 4 Virtuailzation and Containerization (119.76 MB) 5 CDNs and Caching (57.56 MB) 1 Baselines and Templates (59.56 MB) 2 APIs and Middleware (93.62 MB) 3 Software Assurance (76.23 MB) 4 Integrating Enterprise Applications (41.73 MB) 5 Application Development Security (64.75 MB) 6 Web Application Security (87.71 MB) 1 Data Loss Prevention and Detection (50.05 MB) 2 Data Classification, Labeling and Tagging (63.43 MB) 3 Obfuscation and Anonymization of Data (62.85 MB) 4 Data Lifecycle Management (66.94 MB) 5 Data Inventory and Mapping (47.44 MB) 6 Data Integrity Management (93.83 MB) 1 Managing Credentials (81.93 MB) 2 Password Policies (74.03 MB) 3 Access Control (56.66 MB) 4 AAA Protocols (73.89 MB) 5 MFA, OTP and SSO (35.87 MB) 6 Authenticating Hardware and People (36.19 MB) 1 Virtualization Technologies (61.31 MB) 2 Virtualization Strategies (54.64 MB) 3 Cloud Deployment Models (67.61 MB) 4 Cloud Computing Characteristics (62.47 MB) 5 Cloud Provider Limitations (58.29 MB) 6 Extending On-premise Security Controls (69.2 MB) 1 The CIA Triad (41.76 MB) 2 Non-repudiation and Compliance Requirements (59.1 MB) 3 Cryptography and PKI (51.22 MB) 4 Hashes and Digital Signatures (81.86 MB) 5 Cryptography Use Cases (66.14 MB) 1 AI and ML (47.63 MB) 2 Quantum Computing and Nano Technology (49.91 MB) 3 Homomorphic Encryption and SMC (64.93 MB) 4 Blockchain and Distributed Consensus (61.98 MB) 5 Big Data and Passwordless Authentication (65.55 MB) 6 Virtual Reality and 3D Printing (58.09 MB) 7 Deepfakes and Biometric Impersonation (47.28 MB)] Screenshot ![]() |