Training Video Course

CAS-003: CompTIA Advanced Security Practitioner (CASP) CAS-003

PDFs and exam guides are not so efficient, right? Prepare for your CompTIA examination with our training course. The CAS-003 course contains a complete batch of videos that will provide you with profound and thorough knowledge related to CompTIA certification exam. Pass the CompTIA CAS-003 test with flying colors.

Rating
4.56rating
Students
98
Duration
12:20:00 h
$16.49
$14.99

Curriculum for CAS-003 Video Course

Name of Video Time
Play Video: Course Introduction
1. Course Introduction
03:22
Play Video: Instructor Introduction
2. Instructor Introduction
01:35
Name of Video Time
Play Video: Chapter Introdcution
1. Chapter Introdcution
02:15
Play Video: Topic A: Understanding Business and Industry Influences
2. Topic A: Understanding Business and Industry Influences
00:10
Play Video: Ongoing Risk Management
3. Ongoing Risk Management
01:17
Play Video: New Products and User Behaviors
4. New Products and User Behaviors
03:43
Play Video: Business Models and Strategies
5. Business Models and Strategies
03:25
Play Video: Cloud Technologies
6. Cloud Technologies
04:47
Play Video: Acquisitions and Mergers
7. Acquisitions and Mergers
03:08
Play Video: Due Diligence Team
8. Due Diligence Team
01:05
Play Video: Data Ownership
9. Data Ownership
01:30
Play Video: Data Reclassification
10. Data Reclassification
01:00
Play Video: Integrating Diverse Industries
11. Integrating Diverse Industries
05:01
Play Video: Common Regulations
12. Common Regulations
05:08
Play Video: Geographic Differences
13. Geographic Differences
02:25
Play Video: Data Sovereignty
14. Data Sovereignty
00:53
Play Video: Internal and External Influences
15. Internal and External Influences
05:32
Play Video: De-perimeterization
16. De-perimeterization
01:07
Play Video: Understand Changes in Network Boundaries
17. Understand Changes in Network Boundaries
06:53
Play Video: Topic B: Policies and Procedures
18. Topic B: Policies and Procedures
00:22
Play Video: Understanding Policies and Procedures
19. Understanding Policies and Procedures
01:34
Play Video: Policy Life Cycle
20. Policy Life Cycle
01:28
Play Video: Process Life Cycle
21. Process Life Cycle
01:30
Play Video: Reviewing Policies and Processes
22. Reviewing Policies and Processes
03:45
Play Video: Common Business Documents
23. Common Business Documents
04:44
Play Video: Security for Contracts
24. Security for Contracts
01:14
Play Video: Contract Requirements
25. Contract Requirements
01:54
Play Video: General Privacy Principles
26. General Privacy Principles
01:13
Play Video: Standard Security Practices
27. Standard Security Practices
11:28
Play Video: Demo - Examining Security Policies
28. Demo - Examining Security Policies
07:11
Play Video: Topic C: Risk Mitigation and Control
29. Topic C: Risk Mitigation and Control
00:24
Play Video: Introduction to Risk Mitigation
30. Introduction to Risk Mitigation
01:00
Play Video: Categorizing Data
31. Categorizing Data
03:48
Play Video: Incorporating Stakeholder Input
32. Incorporating Stakeholder Input
01:18
Play Video: Aggregate CIA Scores
33. Aggregate CIA Scores
01:37
Play Video: Selecting and Implementing Controls
34. Selecting and Implementing Controls
04:11
Play Video: Security Control Frameworks
35. Security Control Frameworks
00:51
Play Video: Options for Frameworks
36. Options for Frameworks
04:40
Play Video: Extreme Scenario Planning
37. Extreme Scenario Planning
02:41
Play Video: System-Specific Risk Analysis
38. System-Specific Risk Analysis
01:13
Play Video: Qualitative Risk Analysis
39. Qualitative Risk Analysis
01:39
Play Video: Quantitative Risk Analysis
40. Quantitative Risk Analysis
01:06
Play Video: Risk Impact
41. Risk Impact
03:08
Play Video: Likelihood of Threat
42. Likelihood of Threat
00:48
Play Video: Return on Investment
43. Return on Investment
01:52
Play Video: Understanding Payback
44. Understanding Payback
02:05
Play Video: Total Cost of Ownership
45. Total Cost of Ownership
01:24
Play Video: TCO Guidelines
46. TCO Guidelines
01:23
Play Video: Translate to Business Terms
47. Translate to Business Terms
01:31
Play Video: Risk Management Strategies
48. Risk Management Strategies
02:09
Play Video: Risk Management Processes
49. Risk Management Processes
01:06
Play Video: Information and Asset Value and Costs
50. Information and Asset Value and Costs
00:49
Play Video: Vulnerabilities and Threat Identification
51. Vulnerabilities and Threat Identification
01:06
Play Video: Additional Factors
52. Additional Factors
01:34
Play Video: Topic D: Business Continuity Planning
53. Topic D: Business Continuity Planning
00:21
Play Video: Continuity Planning
54. Continuity Planning
00:19
Play Video: BCP Components
55. BCP Components
01:51
Play Video: BCP Steps
56. BCP Steps
02:38
Play Video: Additional Plans
57. Additional Plans
01:48
Play Video: Conducting Business Impact Analysis
58. Conducting Business Impact Analysis
04:57
Play Video: Chapter 01 Review
59. Chapter 01 Review
01:03
Name of Video Time
Play Video: Chapter Introdcution
1. Chapter Introdcution
00:34
Play Video: Topic A: Physical and Virtual Network Security Devices
2. Topic A: Physical and Virtual Network Security Devices
00:15
Play Video: Unified Threat Management
3. Unified Threat Management
01:19
Play Video: Analyzing UTM
4. Analyzing UTM
01:31
Play Video: Intrusion Detection and Prevention
5. Intrusion Detection and Prevention
05:13
Play Video: In-Line Network Encryptor
6. In-Line Network Encryptor
01:31
Play Video: Network Access Control
7. Network Access Control
03:02
Play Video: SIEM
8. SIEM
01:15
Play Video: Firewalls
9. Firewalls
07:05
Play Video: Firewall Architecture
10. Firewall Architecture
05:16
Play Video: Wireless Controller
11. Wireless Controller
01:49
Play Video: Routers and Switches
12. Routers and Switches
02:09
Play Video: Proxy Servers
13. Proxy Servers
01:30
Play Video: Topic B: Application and Protocol Level Security
14. Topic B: Application and Protocol Level Security
00:29
Play Video: Web Application Firewalls
15. Web Application Firewalls
01:46
Play Video: Hardware Security Modules
16. Hardware Security Modules
01:50
Play Video: Vulnerability Scanners
17. Vulnerability Scanners
02:11
Play Video: Topic C: Advanced Network Design
18. Topic C: Advanced Network Design
00:31
Play Video: Virtual Private Networks
19. Virtual Private Networks
02:51
Play Video: VPN Protocols
20. VPN Protocols
01:58
Play Video: IP Security (IPSec)
21. IP Security (IPSec)
03:01
Play Video: IPSec Modes
22. IPSec Modes
01:02
Play Video: Demo - Examining IPSec Policies
23. Demo - Examining IPSec Policies
09:28
Play Video: Secure Sockets Layer (SSL)
24. Secure Sockets Layer (SSL)
01:44
Play Video: Transport Layer Security (TLS
25. Transport Layer Security (TLS
01:00
Play Video: Additional Security Protocols
26. Additional Security Protocols
03:26
Play Video: Authentication Protocols
27. Authentication Protocols
04:45
Play Video: Topic D: Network Solutions for Data Flow
28. Topic D: Network Solutions for Data Flow
00:36
Play Video: Data Loss Prevention
29. Data Loss Prevention
02:48
Play Video: Data Flow Enforcement
30. Data Flow Enforcement
02:00
Play Video: Network Flow
31. Network Flow
01:32
Play Video: Topic E: Secure Baselines of Networking and Security Components
32. Topic E: Secure Baselines of Networking and Security Components
00:31
Play Video: Securing Device Configurations
33. Securing Device Configurations
00:25
Play Video: Access Control Lists (ACLs)
34. Access Control Lists (ACLs)
00:43
Play Video: ACL Rule Sets
35. ACL Rule Sets
02:04
Play Video: Change Monitoring
36. Change Monitoring
01:30
Play Video: Configuration Lockdown
37. Configuration Lockdown
00:51
Play Video: Availability Controls
38. Availability Controls
03:29
Play Video: Disk Availability
39. Disk Availability
03:56
Play Video: Key Availability Terms
40. Key Availability Terms
01:25
Play Video: Topic F: Advanced Configuration of Network Devices
41. Topic F: Advanced Configuration of Network Devices
00:16
Play Video: Additional Configurations
42. Additional Configurations
00:49
Play Video: Transport Security
43. Transport Security
01:44
Play Video: Trunking Security
44. Trunking Security
03:47
Play Video: Port Security
45. Port Security
02:20
Play Video: Ports and Sockets
46. Ports and Sockets
03:37
Play Video: Security Zones
47. Security Zones
01:29
Play Video: Network Segmentation
48. Network Segmentation
01:24
Play Video: Network Access Control
49. Network Access Control
02:52
Play Video: NAC Concepts
50. NAC Concepts
02:53
Play Video: Network Enabled Devices
51. Network Enabled Devices
02:21
Play Video: Automation Systems
52. Automation Systems
01:23
Play Video: Physical Security
53. Physical Security
02:17
Play Video: Chapter 02 Review
54. Chapter 02 Review
01:16
Name of Video Time
Play Video: Chapter Introdcution
1. Chapter Introdcution
00:56
Play Video: Topic A: Understanding Authentication and Authorization Concepts
2. Topic A: Understanding Authentication and Authorization Concepts
00:20
Play Video: Authentication
3. Authentication
04:42
Play Video: The Importance of Identity
4. The Importance of Identity
07:43
Play Video: Additional Password Options
5. Additional Password Options
00:54
Play Video: Demo - Enforcing Strong Passwords
6. Demo - Enforcing Strong Passwords
10:04
Play Video: Biometric Authentication
7. Biometric Authentication
02:50
Play Video: Biometric Considerations
8. Biometric Considerations
01:35
Play Video: Beyond Single Factor
9. Beyond Single Factor
01:38
Play Video: Certificate Authentication
10. Certificate Authentication
03:01
Play Video: Authorization
11. Authorization
07:42
Play Video: Open Authorization
12. Open Authorization
01:07
Play Video: XACML
13. XACML
01:55
Play Video: SPML
14. SPML
01:06
Play Video: Authorization Concepts
15. Authorization Concepts
04:02
Play Video: Trust Models
16. Trust Models
01:53
Play Video: Topic B: Cryptographic Techniques
17. Topic B: Cryptographic Techniques
00:27
Play Video: Introduction to Cryptography
18. Introduction to Cryptography
01:19
Play Video: Cryptographic Techniques
19. Cryptographic Techniques
00:51
Play Video: Key Stretching
20. Key Stretching
00:58
Play Video: Hashing
21. Hashing
03:14
Play Video: Message Digest (MD) Algorithms
22. Message Digest (MD) Algorithms
01:36
Play Video: Secure Hash Algorithm (SHA)
23. Secure Hash Algorithm (SHA)
01:30
Play Video: Digital Signatures
24. Digital Signatures
02:00
Play Video: Message Authentication
25. Message Authentication
01:17
Play Video: Code Signing
26. Code Signing
00:45
Play Video: Additional Concepts
27. Additional Concepts
02:12
Play Video: Protecting Data in Transit
28. Protecting Data in Transit
02:02
Play Video: Protecting Data in Memory
29. Protecting Data in Memory
01:13
Play Video: Protecting Data at Rest
30. Protecting Data at Rest
03:44
Play Video: Symmetric Algorithms
31. Symmetric Algorithms
04:08
Play Video: Asymmetric Algorithms
32. Asymmetric Algorithms
03:00
Play Video: Encryption Methods
33. Encryption Methods
03:22
Play Video: Topic C: Cryptographic Implementations
34. Topic C: Cryptographic Implementations
00:27
Play Video: Crypto Options
35. Crypto Options
02:09
Play Video: Additional Crypto Options
36. Additional Crypto Options
02:42
Play Video: Cryptographic Applications
37. Cryptographic Applications
01:05
Play Video: Crypto Considerations
38. Crypto Considerations
01:27
Play Video: Stream vs. Block Ciphers
39. Stream vs. Block Ciphers
01:47
Play Video: Block Cipher Modes
40. Block Cipher Modes
00:25
Play Video: Public Key Infrastructure
41. Public Key Infrastructure
05:41
Play Video: Primary PKI Functions
42. Primary PKI Functions
02:09
Play Video: Additional PKI Concepts
43. Additional PKI Concepts
01:42
Play Video: Chapter 03 Review
44. Chapter 03 Review
01:05
Name of Video Time
Play Video: Chapter Introdcution
1. Chapter Introdcution
00:56
Play Video: Topic A: Security for Host Devices
2. Topic A: Security for Host Devices
00:25
Play Video: Trusted OS
3. Trusted OS
02:14
Play Video: Trusted OS Options
4. Trusted OS Options
03:11
Play Video: Security Software
5. Security Software
06:06
Play Video: Additional Host-Based Software Options
6. Additional Host-Based Software Options
02:24
Play Video: Demo - Configuring a Host-Based Firewall
7. Demo - Configuring a Host-Based Firewall
07:42
Play Video: Auditing
8. Auditing
02:08
Play Video: Demo - Configuring Audit Policies
9. Demo - Configuring Audit Policies
08:14
Play Video: Endpoint Detection Response
10. Endpoint Detection Response
01:00
Play Video: Host Hardening
11. Host Hardening
04:00
Play Video: Group Policy
12. Group Policy
02:20
Play Video: Demo - Configuring Group Policy Security
13. Demo - Configuring Group Policy Security
04:44
Play Video: Command Shell Restrictions
14. Command Shell Restrictions
02:17
Play Video: Out-of-Band Management
15. Out-of-Band Management
02:11
Play Video: Dedicated Interfaces
16. Dedicated Interfaces
02:34
Play Video: External I/O Restrictions
17. External I/O Restrictions
01:54
Play Video: Wireless Technologies
18. Wireless Technologies
05:03
Play Video: Wi-Fi Components
19. Wi-Fi Components
01:59
Play Video: 802.11 Standards
20. 802.11 Standards
03:21
Play Video: Wireless Security
21. Wireless Security
05:39
Play Video: Securing Other Host Devices
22. Securing Other Host Devices
03:18
Play Video: Boot Security
23. Boot Security
02:06
Play Video: Additional Boot Security Options
24. Additional Boot Security Options
04:30
Play Video: Topic B: Mobile Device Security
25. Topic B: Mobile Device Security
00:41
Play Video: Enterprise Mobility Management
26. Enterprise Mobility Management
01:18
Play Video: MDM Concepts
27. MDM Concepts
02:56
Play Video: Management Options
28. Management Options
03:32
Play Video: Context Aware Management
29. Context Aware Management
03:57
Play Video: Security and Privacy
30. Security and Privacy
04:16
Play Video: Physical Security Options
31. Physical Security Options
01:27
Play Video: Additional Mobile Device Concepts
32. Additional Mobile Device Concepts
06:07
Play Video: Authentication Options
33. Authentication Options
02:22
Play Video: Mobile Devices
34. Mobile Devices
04:46
Play Video: Wearable Security Implications
35. Wearable Security Implications
01:38
Play Video: Topic C: Software Security Controls
36. Topic C: Software Security Controls
00:26
Play Video: Application Security Design Considerations
37. Application Security Design Considerations
03:03
Play Video: Application Issues
38. Application Issues
06:30
Play Video: Application Issues conti...
39. Application Issues conti...
08:18
Play Video: Data Remnants
40. Data Remnants
01:41
Play Video: Securing Applications
41. Securing Applications
02:34
Play Video: Using JSON and REST
42. Using JSON and REST
01:39
Play Video: Browser Extensions
43. Browser Extensions
02:39
Play Video: Application Vulnerabilities
44. Application Vulnerabilities
01:57
Play Video: Chapter 04 Review
45. Chapter 04 Review
01:06
Name of Video Time
Play Video: Chapter Introduction
1. Chapter Introduction
02:21
Play Video: Topic A: Cloud and Virtualization Technology
2. Topic A: Cloud and Virtualization Technology
01:22
Play Video: Cloud Computing and Virtualization
3. Cloud Computing and Virtualization
05:48
Play Video: Cloud Options
4. Cloud Options
10:37
Play Video: Security Considerations
5. Security Considerations
04:35
Play Video: Cloud Service Models
6. Cloud Service Models
07:39
Play Video: Demo - Examining Cloud Service Models
7. Demo - Examining Cloud Service Models
09:14
Play Video: Security and Virtualization
8. Security and Virtualization
05:46
Play Video: Cloud-Augmented Security Services
9. Cloud-Augmented Security Services
07:25
Play Video: Security as a Service
10. Security as a Service
01:54
Play Video: Virtualization Vulnerabilities
11. Virtualization Vulnerabilities
03:40
Play Video: Topic B: Securing Remote Access and Collaboration
12. Topic B: Securing Remote Access and Collaboration
00:37
Play Video: Remote Access
13. Remote Access
01:09
Play Video: Dial-Up Access
14. Dial-Up Access
03:09
Play Video: Virtual Private Networks
15. Virtual Private Networks
01:49
Play Video: Remote Access Purposes
16. Remote Access Purposes
03:05
Play Video: Security Considerations
17. Security Considerations
02:08
Play Video: Unified Collaboration Tools
18. Unified Collaboration Tools
01:08
Play Video: Web Conferencing
19. Web Conferencing
04:43
Play Video: Video Conferencing
20. Video Conferencing
03:06
Play Video: Storage and Document Collaboration
21. Storage and Document Collaboration
03:12
Play Video: Unified Communication
22. Unified Communication
01:44
Play Video: Instant Messaging
23. Instant Messaging
03:01
Play Video: Presence
24. Presence
03:13
Play Video: E-Mail
25. E-Mail
11:55
Play Video: Chapter 05 Review
26. Chapter 05 Review
01:04
Name of Video Time
Play Video: Chapter Introduction
1. Chapter Introduction
01:09
Play Video: Topic A: Security Assessments
2. Topic A: Security Assessments
00:20
Play Video: Importance of Security Assessments
3. Importance of Security Assessments
00:40
Play Video: Malware Sandboxing
4. Malware Sandboxing
02:29
Play Video: Memory Dumping
5. Memory Dumping
01:36
Play Video: Runtime Debugging
6. Runtime Debugging
01:25
Play Video: Reconnaissance
7. Reconnaissance
01:20
Play Video: Fingerprinting
8. Fingerprinting
02:29
Play Video: Code Review
9. Code Review
02:47
Play Video: Social Engineering
10. Social Engineering
12:48
Play Video: Public Information
11. Public Information
11:15
Play Video: Demo - Accessing Public Information
12. Demo - Accessing Public Information
06:36
Play Video: Penetration Test
13. Penetration Test
05:41
Play Video: Vulnerability Assessment
14. Vulnerability Assessment
02:55
Play Video: Assessment Styles
15. Assessment Styles
04:30
Play Video: Topic B: Security Assessment Tools
16. Topic B: Security Assessment Tools
00:34
Play Video: Network Tool Types
17. Network Tool Types
04:39
Play Video: Security Content Automation Protocol (SCAP)
18. Security Content Automation Protocol (SCAP)
02:03
Play Video: Common Vulnerability Scoring System (CVSS)
19. Common Vulnerability Scoring System (CVSS)
03:16
Play Video: Fuzzing
20. Fuzzing
00:50
Play Video: Exploit Kits
21. Exploit Kits
01:06
Play Video: Host Tools
22. Host Tools
07:25
Play Video: Additional Host Tools
23. Additional Host Tools
03:40
Play Video: Physical Security Tools
24. Physical Security Tools
03:23
Play Video: Topic C: Incident Response and Recovery
25. Topic C: Incident Response and Recovery
01:02
Play Video: E-discovery
26. E-discovery
05:37
Play Video: Data Breach
27. Data Breach
01:23
Play Video: Incident Response Process
28. Incident Response Process
04:30
Play Video: Chapter 06 Review
29. Chapter 06 Review
00:56
Play Video: Course Closure
30. Course Closure
02:36

Download CompTIA CAS-003 Exam Questions & Answers

Get 100% Real Exam Questions, Accurate & Verified Answers As Seen in the Real Exam!
30 Days Free Updates, Instant Download!

CompTIA CAS-003 Premium Bundle
$69.97
$49.99

CAS-003 Premium Bundle

  • Premium File: 368 Questions & Answers. Last update: Nov 21, 2020
  • Training Course: 260 Video Lectures
  • Study Guide: 1220 Pages
  • Real Questions
  • 100% Accurate Answers
  • Fast Exam Updates
Get Unlimited Access to ALL Premium Files

CAS-003 Premium Bundle

CompTIA CAS-003 Premium Bundle
  • Premium File: 368 Questions & Answers. Last update: Nov 21, 2020
  • Training Course: 260 Video Lectures
  • Study Guide: 1220 Pages
  • Real Questions
  • 100% Accurate Answers
  • Fast Exam Updates
$69.97
$49.99
Get Unlimited Access to ALL Premium Files

Comments (10)

Add Comment

Please post your comments about CAS-003 Exams. Don't share your email address asking for CAS-003 braindumps or CAS-003 exam pdf files.

  • marcus
  • Switzerland
  • Oct 28, 2020

A cost effective resource to help you through the CAS exam. All the topics are covered very well. A constant support in practical measures. It’s good if you are looking for a brief guide of advanced security. It’s brief, but at the same time all inclusive.

  • Maxime
  • United States
  • Oct 19, 2020

the definite structure of the lectures is very practical, and makes the program so easy to conceive. brilliantly put together. I would recommend this to everyone looking to optimize their skills, and grow in your careers in IT Security.

  • manan
  • Belgium
  • Oct 07, 2020

The program is incisively presented, doesn’t take much time, doesn’t confuse you, and most importantly it covers all the subjective curriculums. And this is global in its approach, that’s a good quality.

  • Warren C
  • Australia
  • Oct 01, 2020

Excellent course, well explained. It was helpful enough to give you mental and technical preparation for appearing in the advanced level examination, but as this whole stream is more about interpersonal skills, this is certainly not your ticket to the moon. If you are planning to take the CAS cert, this can be one of your most reliable resources.

  • ‘’fred
  • Mexico
  • Sep 20, 2020

as far as advanced IT security goes, if you work for 10years in an enterprise level, with 5 years hands-on experience in technical, you are likely to get all the skills from there. what this course does for you, is to give you more confidence for the exam, as you go through the course, seeing your otherwise scattered jobs being explained in an organized way.

  • Dean Talley
  • United States
  • Sep 08, 2020

The sequence of the course is represented very well, and it really touches all the aspects relevant to the certification exam. All the points are explained in time efficient manner, without dragging the cues.

  • jacy101
  • Germany
  • Sep 01, 2020

a very good material to revise the new advancements in the enterprise storage and networking sector and brush up one’s skills and competency. but this course may not be a standalone resource for passing the exam; it’s not too bad though, to give you an insight of the areas you need to focus on. I think this tutorial is a value for money.

  • eckbert
  • France
  • Aug 24, 2020

The best part is that they have fragmented the course in short concise lectures. It’s easy to perceive and relate to, even though you’d have to rather “imagine” the security breach or other cases and imagine yourself in such situations. This is to polish your instincts for getting fair with the CompTIA Advanced Security Practitioner (CASP) Examination.

  • Steven
  • Netherlands
  • Aug 15, 2020

this is a very good resource, the best material in fact. however, what I really miss in here is a bit of case studies or real time examples. but given the price, and other inclusions, this is an impressive pack, and helpful nonetheless.

  • Dong Ju
  • Singapore
  • Aug 08, 2020

Decently presented in complete relevance. It’s a good deal of “Integration Program” that doesn’t take a giant leap with new information; yet don’t drag the obvious basic things. Well versed and helpful to pass the CASP examination. Recommend!

Add Comment

Only Registered Members can View Training Courses

Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.

  • Trusted by 1.2M IT Certification Candidates Every Month
  • Hundreds Hours of Videos
  • Instant download After Registration

Already Member? Click here to Login

A confirmation link will be sent to this email address to verify your login

UP

LIMITED OFFER: GET 30% Discount

This is ONE TIME OFFER

ExamSnap Discount Offer
Enter Your Email Address to Receive Your 30% Discount Code

A confirmation link will be sent to this email address to verify your login. *We value your privacy. We will not rent or sell your email address.

Download Free Demo of VCE Exam Simulator

Experience Avanset VCE Exam Simulator for yourself.

Simply submit your e-mail address below to get started with our interactive software demo of your free trial.

Free Demo Limits: In the demo version you will be able to access only first 5 questions from exam.