Training Video Course

CAS-004: CompTIA Advanced Security Practitioner (CASP+) CAS-004

PDFs and exam guides are not so efficient, right? Prepare for your CompTIA examination with our training course. The CAS-004 course contains a complete batch of videos that will provide you with profound and thorough knowledge related to CompTIA certification exam. Pass the CompTIA CAS-004 test with flying colors.

Rating
4.4rating
Students
133
Duration
05:51:00 h
$16.49
$14.99

Curriculum for CAS-004 Certification Video Course

Name of Video Time
Play Video: Data Considerations (OBJ 4.3)
1. Data Considerations (OBJ 4.3)
1:00
Play Video: Data Security (OBJ. 4.3)
2. Data Security (OBJ. 4.3)
4:00
Play Video: Data Classification (OBJ. 4.3)
3. Data Classification (OBJ. 4.3)
3:00
Play Video: Data Types (OBJ. 4.3)
4. Data Types (OBJ. 4.3)
5:00
Play Video: Data Retention (OBJ. 4.3)
5. Data Retention (OBJ. 4.3)
7:00
Play Video: Data Destruction (OBJ. 4.3)
6. Data Destruction (OBJ. 4.3)
3:00
Play Video: Data Ownership (OBJ. 4.3)
7. Data Ownership (OBJ. 4.3)
6:00
Play Video: Data Sovereignty (OBJ. 4.3)
8. Data Sovereignty (OBJ. 4.3)
3:00
Name of Video Time
Play Video: Risk Management (OBJ 4.1)
1. Risk Management (OBJ 4.1)
2:00
Play Video: Risk Strategies (OBJ. 4.1)
2. Risk Strategies (OBJ. 4.1)
5:00
Play Video: Risk Management Lifecycle (OBJ. 4.1)
3. Risk Management Lifecycle (OBJ. 4.1)
12:00
Play Video: Risk Types (OBJ. 4.1)
4. Risk Types (OBJ. 4.1)
3:00
Play Video: Risk Handling (OBJ. 4.1)
5. Risk Handling (OBJ. 4.1)
9:00
Play Video: Risk Tracking (OBJ. 4.1)
6. Risk Tracking (OBJ. 4.1)
5:00
Play Video: Risk Assessment (OBJ. 4.1)
7. Risk Assessment (OBJ. 4.1)
18:00
Play Video: When Risk Management Fails (OBJ. 4.1)
8. When Risk Management Fails (OBJ. 4.1)
4:00
Name of Video Time
Play Video: Policies and Frameworks (OBJ. 4.1 & 4.3)
1. Policies and Frameworks (OBJ. 4.1 & 4.3)
1:00
Play Video: Policies (OBJ. 4.1)
2. Policies (OBJ. 4.1)
12:00
Play Video: Frameworks (OBJ. 4.1)
3. Frameworks (OBJ. 4.1)
5:00
Play Video: Regulations (OBJ. 4.3)
4. Regulations (OBJ. 4.3)
8:00
Play Video: Standards (OBJ. 4.3)
5. Standards (OBJ. 4.3)
6:00
Play Video: Contracts and Agreements (OBJ. 4.3)
6. Contracts and Agreements (OBJ. 4.3)
9:00
Play Video: Legal Considerations (OBJ. 4.3)
7. Legal Considerations (OBJ. 4.3)
7:00
Play Video: Integrating Industries (OBJ. 4.3)
8. Integrating Industries (OBJ. 4.3)
3:00
Name of Video Time
Play Video: Business Continuity (OBJ 4.4)
1. Business Continuity (OBJ 4.4)
1:00
Play Video: Business Continuity Plan (OBJ 4.4)
2. Business Continuity Plan (OBJ 4.4)
14:00
Play Video: Business Impact Analysis (OBJ 4.4)
3. Business Impact Analysis (OBJ 4.4)
14:00
Play Video: Privacy Impact Assessment (OBJ 4.4)
4. Privacy Impact Assessment (OBJ 4.4)
4:00
Play Video: Incident Response Plan (OBJ 4.4)
5. Incident Response Plan (OBJ 4.4)
11:00
Play Video: Testing Plans (OBJ 4.4)
6. Testing Plans (OBJ 4.4)
7:00
Name of Video Time
Play Video: Risk Strategies (OBJ 4.1)
1. Risk Strategies (OBJ 4.1)
2:00
Play Video: Asset Value (OBJ 4.1)
2. Asset Value (OBJ 4.1)
4:00
Play Video: Access Control (OBJ 4.1)
3. Access Control (OBJ 4.1)
6:00
Play Video: Aggregating Risk (OBJ 4.1)
4. Aggregating Risk (OBJ 4.1)
3:00
Play Video: Scenario Planning (OBJ 4.1)
5. Scenario Planning (OBJ 4.1)
8:00
Play Video: Security Controls (OBJ 4.1)
6. Security Controls (OBJ 4.1)
9:00
Play Video: Security Solutions (OBJ 4.1)
7. Security Solutions (OBJ 4.1)
9:00
Play Video: Cost of a Data Breach (OBJ 4.1)
8. Cost of a Data Breach (OBJ 4.1)
6:00
Name of Video Time
Play Video: Vendor Risk (OBJ 4.2)
1. Vendor Risk (OBJ 4.2)
4:00
Play Video: Business Models (OBJ 4.2)
2. Business Models (OBJ 4.2)
11:00
Play Video: Influences (OBJ 4.2)
3. Influences (OBJ 4.2)
7:00
Play Video: Organizational Changes (OBJ 4.2)
4. Organizational Changes (OBJ 4.2)
6:00
Play Video: Shared Responsibility Model (OBJ 4.2)
5. Shared Responsibility Model (OBJ 4.2)
5:00
Play Video: Viability and Support (OBJ 4.2)
6. Viability and Support (OBJ 4.2)
11:00
Play Video: Dependencies (OBJ 4.2)
7. Dependencies (OBJ 4.2)
5:00
Play Video: Considerations (OBJ 4.2)
8. Considerations (OBJ 4.2)
11:00
Play Video: Supply Chain (OBJ 4.2)
9. Supply Chain (OBJ 4.2)
6:00
Name of Video Time
Play Video: Securing Networks (OBJ 1.1)
1. Securing Networks (OBJ 1.1)
7:00
Play Video: Switches (OBJ 1.1)
2. Switches (OBJ 1.1)
7:00
Play Video: Routers (OBJ 1.1)
3. Routers (OBJ 1.1)
8:00
Play Video: Wireless and Mesh (OBJ 1.1)
4. Wireless and Mesh (OBJ 1.1)
3:00
Play Video: Firewalls (OBJ 1.1)
5. Firewalls (OBJ 1.1)
12:00
Play Video: Configuring Firewalls (OBJ 1.1)
6. Configuring Firewalls (OBJ 1.1)
7:00
Play Video: Proxies (OBJ 1.1)
7. Proxies (OBJ 1.1)
7:00
Play Video: Gateways (OBJ 1.1)
8. Gateways (OBJ 1.1)
5:00
Play Video: IDS and IPS (OBJ 1.1)
9. IDS and IPS (OBJ 1.1)
6:00
Play Video: Network Access Control (NAC) (OBJ 1.1)
10. Network Access Control (NAC) (OBJ 1.1)
3:00
Play Video: Remote Access (OBJ 1.1)
11. Remote Access (OBJ 1.1)
9:00
Play Video: Unified Communications (OBJ 1.1)
12. Unified Communications (OBJ 1.1)
19:00
Play Video: Cloud vs On-premise (OBJ 1.1)
13. Cloud vs On-premise (OBJ 1.1)
5:00
Play Video: DNSSEC (OBJ 1.1)
14. DNSSEC (OBJ 1.1)
4:00
Play Video: Load Balancer (OBJ 1.1)
15. Load Balancer (OBJ 1.1)
7:00
Name of Video Time
Play Video: Securing Architectures (OBJ 1.1)
1. Securing Architectures (OBJ 1.1)
1:00
Play Video: Traffic Mirroring (OBJ 1.1)
2. Traffic Mirroring (OBJ 1.1)
4:00
Play Video: Network Sensors (OBJ 1.1)
3. Network Sensors (OBJ 1.1)
12:00
Play Video: Host Sensors (OBJ 1.1)
4. Host Sensors (OBJ 1.1)
6:00
Play Video: Layer 2 Segmentation (OBJ 1.1)
5. Layer 2 Segmentation (OBJ 1.1)
5:00
Play Video: Network Segmentation (OBJ 1.1)
6. Network Segmentation (OBJ 1.1)
13:00
Play Video: Implement Network Segmentation (OBJ 1.1)
7. Implement Network Segmentation (OBJ 1.1)
10:00
Play Video: Server Segmentation (OBJ 1.1)
8. Server Segmentation (OBJ 1.1)
11:00
Play Video: Zero Trust (OBJ 1.1)
9. Zero Trust (OBJ 1.1)
7:00
Play Video: Merging Networks (OBJ 1.1)
10. Merging Networks (OBJ 1.1)
6:00
Play Video: Software-Defined Networking (SDN) (OBJ 1.1)
11. Software-Defined Networking (SDN) (OBJ 1.1)
5:00
Name of Video Time
Play Video: Infrastructure Design (OBJ 1.2)
1. Infrastructure Design (OBJ 1.2)
1:00
Play Video: Scalability (OBJ 1.2)
2. Scalability (OBJ 1.2)
6:00
Play Video: Resiliency Issues (OBJ 1.2)
3. Resiliency Issues (OBJ 1.2)
13:00
Play Video: Automation (OBJ 1.2)
4. Automation (OBJ 1.2)
6:00
Play Video: Performance Design (OBJ 1.2)
5. Performance Design (OBJ 1.2)
6:00
Play Video: Virtualization (OBJ 1.2)
6. Virtualization (OBJ 1.2)
8:00
Play Video: Securing VMs (OBJ 1.2)
7. Securing VMs (OBJ 1.2)
5:00
Play Video: Containerization (OBJ 1.2)
8. Containerization (OBJ 1.2)
6:00
Name of Video Time
Play Video: Cloud and Virtualization (OBJ 1.6)
1. Cloud and Virtualization (OBJ 1.6)
1:00
Play Video: Cloud Deployment Models (OBJ 1.6)
2. Cloud Deployment Models (OBJ 1.6)
5:00
Play Video: Cloud Service Models (OBJ 1.6)
3. Cloud Service Models (OBJ 1.6)
5:00
Play Video: Deployment Considerations (OBJ 1.6)
4. Deployment Considerations (OBJ 1.6)
5:00
Play Video: Provider Limitations (OBJ 1.6)
5. Provider Limitations (OBJ 1.6)
3:00
Play Video: Extending Controls (OBJ 1.6)
6. Extending Controls (OBJ 1.6)
5:00
Play Video: Provision and Deprovision (OBJ 1.6)
7. Provision and Deprovision (OBJ 1.6)
3:00
Play Video: Storage Models (OBJ 1.6)
8. Storage Models (OBJ 1.6)
5:00
Play Video: Virtualization (OBJ 1.6)
9. Virtualization (OBJ 1.6)
8:00
Name of Video Time
Play Video: Software Applications (OBJ 1.3)
1. Software Applications (OBJ 1.3)
3:00
Play Video: Systems Development Life Cycle (OBJ 1.3)
2. Systems Development Life Cycle (OBJ 1.3)
7:00
Play Video: Software Development Life Cycle (OBJ 1.3)
3. Software Development Life Cycle (OBJ 1.3)
6:00
Play Video: Development Approaches (OBJ 1.3)
4. Development Approaches (OBJ 1.3)
11:00
Play Video: Software Assurance (OBJ 1.3)
5. Software Assurance (OBJ 1.3)
9:00
Play Video: Baselins and Templates (OBJ 1.3)
6. Baselins and Templates (OBJ 1.3)
7:00
Play Video: Best Practices (OBJ 1.3)
7. Best Practices (OBJ 1.3)
6:00
Play Video: Integrating Applications (OBJ 1.3)
8. Integrating Applications (OBJ 1.3)
5:00
Name of Video Time
Play Video: Data Security (OBJ 1.4)
1. Data Security (OBJ 1.4)
4:00
Play Video: Data Life Cycle (OBJ 1.4)
2. Data Life Cycle (OBJ 1.4)
10:00
Play Video: Data Classification (OBJ 1.4)
3. Data Classification (OBJ 1.4)
7:00
Play Video: Labeling and Tagging (OBJ 1.4)
4. Labeling and Tagging (OBJ 1.4)
8:00
Play Video: Deidentification (OBJ 1.4)
5. Deidentification (OBJ 1.4)
11:00
Play Video: Data Encryption (OBJ 1.4)
6. Data Encryption (OBJ 1.4)
8:00
Play Video: Data Loss Prevention (DLP) (OBJ 1.4)
7. Data Loss Prevention (DLP) (OBJ 1.4)
10:00
Play Video: DLP Detection (OBJ 1.4)
8. DLP Detection (OBJ 1.4)
7:00
Play Video: Data Loss Detection (OBJ 1.4)
9. Data Loss Detection (OBJ 1.4)
12:00
Play Video: Auditing Files (OBJ 1.4)
10. Auditing Files (OBJ 1.4)
4:00
Name of Video Time
Play Video: Authentication and Authorization (OBJ 1.5)
1. Authentication and Authorization (OBJ 1.5)
2:00
Play Video: Access Control (OBJ 1.5)
2. Access Control (OBJ 1.5)
5:00
Play Video: Credential Management (OBJ 1.5)
3. Credential Management (OBJ 1.5)
4:00
Play Video: Password Policies (OBJ 1.5)
4. Password Policies (OBJ 1.5)
8:00
Play Video: Implementing Password Policies (OBJ 1.5)
5. Implementing Password Policies (OBJ 1.5)
5:00
Play Video: Cracking Weak Passwords (OBJ 1.5)
6. Cracking Weak Passwords (OBJ 1.5)
3:00
Play Video: Multifactor Authentication (OBJ 1.5)
7. Multifactor Authentication (OBJ 1.5)
8:00
Play Video: Authentication Protocols (OBJ 1.5)
8. Authentication Protocols (OBJ 1.5)
10:00
Play Video: Federation (OBJ 1.5)
9. Federation (OBJ 1.5)
7:00
Play Video: Root of Trust (OBJ 1.5)
10. Root of Trust (OBJ 1.5)
4:00
Play Video: Attestation (OBJ 1.5)
11. Attestation (OBJ 1.5)
2:00
Play Video: Identity Proofing (OBJ 1.5)
12. Identity Proofing (OBJ 1.5)
4:00
Name of Video Time
Play Video: Cryptography (OBJ 1.7)
1. Cryptography (OBJ 1.7)
2:00
Play Video: Privacy and Confidentiality (OBJ 1.7)
2. Privacy and Confidentiality (OBJ 1.7)
7:00
Play Video: Integrity and Non-repudiation (OBJ 1.7)
3. Integrity and Non-repudiation (OBJ 1.7)
7:00
Play Video: Compliance and Policy (OBJ 1.7)
4. Compliance and Policy (OBJ 1.7)
4:00
Play Video: Data States (OBJ 1.7)
5. Data States (OBJ 1.7)
7:00
Play Video: Cryptographic Use Cases (OBJ 1.7)
6. Cryptographic Use Cases (OBJ 1.7)
6:00
Play Video: PKI Use Cases (OBJ 1.7)
7. PKI Use Cases (OBJ 1.7)
9:00
Name of Video Time
Play Video: Emerging Technology (OBJ 1.8)
1. Emerging Technology (OBJ 1.8)
4:00
Play Video: Artificial Intelligence (AI) & Machine Learning (ML) (OBJ 1.8)
2. Artificial Intelligence (AI) & Machine Learning (ML) (OBJ 1.8)
9:00
Play Video: Deep Learning (OBJ 1.8)
3. Deep Learning (OBJ 1.8)
9:00
Play Video: Big Data (OBJ 1.8)
4. Big Data (OBJ 1.8)
5:00
Play Video: Blockchain & Distributed Consensus (OBJ 1.8)
5. Blockchain & Distributed Consensus (OBJ 1.8)
6:00
Play Video: Passwordless Authentication (OBJ 1.8)
6. Passwordless Authentication (OBJ 1.8)
5:00
Play Video: Homomorphic Encryption (OBJ 1.8)
7. Homomorphic Encryption (OBJ 1.8)
4:00
Play Video: Virtual/Augmented Reality (OBJ 1.8)
8. Virtual/Augmented Reality (OBJ 1.8)
5:00
Play Video: 3D Printing (OBJ 1.8)
9. 3D Printing (OBJ 1.8)
3:00
Play Video: Quantum Computing (OBJ 1.8)
10. Quantum Computing (OBJ 1.8)
6:00
Name of Video Time
Play Video: Enterprise Mobility
1. Enterprise Mobility
3:00
Play Video: Enterprise Mobility Management (EMM) (OBJ. 3.1)
2. Enterprise Mobility Management (EMM) (OBJ. 3.1)
10:00
Play Video: WPA3 (OBJ. 3.1)
3. WPA3 (OBJ. 3.1)
7:00
Play Video: Connectivity Options (OBJ. 3.1)
4. Connectivity Options (OBJ. 3.1)
9:00
Play Video: Security Configurations (OBJ. 3.1)
5. Security Configurations (OBJ. 3.1)
8:00
Play Video: DNS Protection (OBJ. 3.1)
6. DNS Protection (OBJ. 3.1)
3:00
Play Video: Deployment Options (OBJ. 3.1)
7. Deployment Options (OBJ. 3.1)
5:00
Play Video: Reconnaissance Concerns (OBJ. 3.1)
8. Reconnaissance Concerns (OBJ. 3.1)
8:00
Play Video: Mobile Security (OBJ. 3.1)
9. Mobile Security (OBJ. 3.1)
8:00
Name of Video Time
Play Video: Endpoint Security Controls
1. Endpoint Security Controls
2:00
Play Video: Device Hardening (OBJ. 3.2)
2. Device Hardening (OBJ. 3.2)
9:00
Play Video: Unnecessary Services (OBJ. 3.2)
3. Unnecessary Services (OBJ. 3.2)
6:00
Play Video: Patching (OBJ. 3.2)
4. Patching (OBJ. 3.2)
5:00
Play Video: Security Settings (OBJ. 3.2)
5. Security Settings (OBJ. 3.2)
6:00
Play Video: Mandatory Access Controls (MAC) (OBJ. 3.2)
6. Mandatory Access Controls (MAC) (OBJ. 3.2)
7:00
Play Video: Secure Boot (OBJ. 3.2)
7. Secure Boot (OBJ. 3.2)
6:00
Play Video: Hardware Encryption (OBJ. 3.2)
8. Hardware Encryption (OBJ. 3.2)
5:00
Play Video: Endpoint Protections (OBJ. 3.2)
9. Endpoint Protections (OBJ. 3.2)
10:00
Play Video: Logging and Monitoring (OBJ. 3.2)
10. Logging and Monitoring (OBJ. 3.2)
6:00
Play Video: Configuring SIEM Agents (OBJ. 3.2)
11. Configuring SIEM Agents (OBJ. 3.2)
19:00
Play Video: Resiliency (OBJ. 3.2)
12. Resiliency (OBJ. 3.2)
6:00
Name of Video Time
Play Video: Cloud Technologies
1. Cloud Technologies
3:00
Play Video: Business Continuity/Disaster Recovery (BC/DR) (OBJ. 3.4)
2. Business Continuity/Disaster Recovery (BC/DR) (OBJ. 3.4)
8:00
Play Video: Cloud Encryption (OBJ. 3.4)
3. Cloud Encryption (OBJ. 3.4)
5:00
Play Video: Serverless Computing (OBJ. 3.4)
4. Serverless Computing (OBJ. 3.4)
9:00
Play Video: Software-Defined Networking (SDN) (OBJ. 3.4)
5. Software-Defined Networking (SDN) (OBJ. 3.4)
5:00
Play Video: Log Collection and Analysis (OBJ. 3.4)
6. Log Collection and Analysis (OBJ. 3.4)
4:00
Play Video: Cloud Access Security Broker (CASB) (OBJ. 3.4)
7. Cloud Access Security Broker (CASB) (OBJ. 3.4)
6:00
Play Video: Cloud Misconfigurations (OBJ. 3.4)
8. Cloud Misconfigurations (OBJ. 3.4)
11:00
Name of Video Time
Play Video: Operational Technologies
1. Operational Technologies
2:00
Play Video: Embedded Systems (OBJ. 3.3)
2. Embedded Systems (OBJ. 3.3)
10:00
Play Video: ICS and SCADA (OBJ. 3.3)
3. ICS and SCADA (OBJ. 3.3)
9:00
Play Video: ICS Protocols (OBJ. 3.3)
4. ICS Protocols (OBJ. 3.3)
11:00
Play Video: Industries and Sectors (OBJ. 3.3)
5. Industries and Sectors (OBJ. 3.3)
5:00
Name of Video Time
Play Video: Hashing and Symmetric Algorithms
1. Hashing and Symmetric Algorithms
1:00
Play Video: Hashing (OBJ. 3.6)
2. Hashing (OBJ. 3.6)
7:00
Play Video: Calculating Hash Digests (OBJ. 3.6)
3. Calculating Hash Digests (OBJ. 3.6)
3:00
Play Video: Message Authentication (OBJ. 3.6)
4. Message Authentication (OBJ. 3.6)
4:00
Play Video: Symmetric Algorithms (OBJ. 3.6)
5. Symmetric Algorithms (OBJ. 3.6)
6:00
Play Video: Stream Ciphers (OBJ. 3.6)
6. Stream Ciphers (OBJ. 3.6)
5:00
Play Video: Block Ciphers (OBJ. 3.6)
7. Block Ciphers (OBJ. 3.6)
10:00
Name of Video Time
Play Video: Asymmetric Algorithms
1. Asymmetric Algorithms
2:00
Play Video: Using Asymmetric Algortihms
2. Using Asymmetric Algortihms
9:00
Play Video: SSL/TLS and Cipher Suites (OBJ. 3.6)
3. SSL/TLS and Cipher Suites (OBJ. 3.6)
8:00
Play Video: S/MIME and SSH (OBJ. 3.6)
4. S/MIME and SSH (OBJ. 3.6)
7:00
Play Video: EAP (OBJ. 3.6)
5. EAP (OBJ. 3.6)
6:00
Play Video: IPSec (OBJ. 3.6)
6. IPSec (OBJ. 3.6)
15:00
Play Video: Elliptic Curve Cryptography (ECC) (OBJ. 3.6)
7. Elliptic Curve Cryptography (ECC) (OBJ. 3.6)
4:00
Play Video: Forward Secrecy (OBJ. 3.6)
8. Forward Secrecy (OBJ. 3.6)
4:00
Play Video: Authenticated Encryption with Associated Data (AEAD) (OBJ. 3.6)
9. Authenticated Encryption with Associated Data (AEAD) (OBJ. 3.6)
2:00
Play Video: Key Stretching (OBJ. 3.6)
10. Key Stretching (OBJ. 3.6)
5:00
Name of Video Time
Play Video: Public Key Infrastructure
1. Public Key Infrastructure
3:00
Play Video: PKI Components (OBJ. 3.5)
2. PKI Components (OBJ. 3.5)
10:00
Play Video: Digital Certificates (OBJ. 3.5)
3. Digital Certificates (OBJ. 3.5)
8:00
Play Video: Using Digital Certificates (OBJ. 3.5)
4. Using Digital Certificates (OBJ. 3.5)
6:00
Play Video: Exploring Server Certificates (OBJ. 3.5)
5. Exploring Server Certificates (OBJ. 3.5)
4:00
Play Video: Trust Models (OBJ. 3.5)
6. Trust Models (OBJ. 3.5)
4:00
Play Video: Certificate Management (OBJ. 3.5)
7. Certificate Management (OBJ. 3.5)
3:00
Play Video: Certificate Validity (CRL and OCSP) (OBJ. 3.5)
8. Certificate Validity (CRL and OCSP) (OBJ. 3.5)
4:00
Play Video: Protecting Web Traffic (OBJ. 3.5)
9. Protecting Web Traffic (OBJ. 3.5)
4:00
Play Video: Troubleshooting Certificates (OBJ. 3.7)
10. Troubleshooting Certificates (OBJ. 3.7)
5:00
Play Video: Troubleshooting Keys (OBJ. 3.7)
11. Troubleshooting Keys (OBJ. 3.7)
4:00
Name of Video Time
Play Video: Threat and Vulnerability Management
1. Threat and Vulnerability Management
2:00
Play Video: Threat Intelligence (OBJ. 2.1)
2. Threat Intelligence (OBJ. 2.1)
6:00
Play Video: Threat Hunting (OBJ. 2.1)
3. Threat Hunting (OBJ. 2.1)
7:00
Play Video: Intelligence Collection (OBJ. 2.1)
4. Intelligence Collection (OBJ. 2.1)
11:00
Play Video: Threat Actors (OBJ. 2.1)
5. Threat Actors (OBJ. 2.1)
9:00
Play Video: Threat Management Frameworks (OBJ. 2.1)
6. Threat Management Frameworks (OBJ. 2.1)
13:00
Play Video: Vulnerability Management Activities (OBJ. 2.3)
7. Vulnerability Management Activities (OBJ. 2.3)
12:00
Play Video: Security Content Automation Protocol (SCAP) (OBJ. 2.3)
8. Security Content Automation Protocol (SCAP) (OBJ. 2.3)
7:00
Name of Video Time
Play Video: Vulnerability Assessments
1. Vulnerability Assessments
2:00
Play Video: Penetration Test (OBJ. 2.4)
2. Penetration Test (OBJ. 2.4)
5:00
Play Video: PenTest Steps (OBJ. 2.4)
3. PenTest Steps (OBJ. 2.4)
7:00
Play Video: PenTest Requirements (OBJ. 2.4)
4. PenTest Requirements (OBJ. 2.4)
11:00
Play Video: Code Analysis (OBJ. 2.4)
5. Code Analysis (OBJ. 2.4)
8:00
Play Video: Protocol Analysis (OBJ. 2.4)
6. Protocol Analysis (OBJ. 2.4)
8:00
Play Video: TCPDump (OBJ. 2.4)
7. TCPDump (OBJ. 2.4)
8:00
Play Video: Wireshark (OBJ. 2.4)
8. Wireshark (OBJ. 2.4)
10:00
Play Video: Nmap (OBJ. 2.4)
9. Nmap (OBJ. 2.4)
11:00
Play Video: Analysis Utilities (OBJ. 2.4)
10. Analysis Utilities (OBJ. 2.4)
5:00
Play Video: Vulnerability Scanning (OBJ. 2.4)
11. Vulnerability Scanning (OBJ. 2.4)
9:00
Play Video: Analyzing Scan Outputs (OBJ. 2.4)
12. Analyzing Scan Outputs (OBJ. 2.4)
14:00
Name of Video Time
Play Video: Risk Reduction
1. Risk Reduction
2:00
Play Video: Deceptive Technologies (OBJ. 2.6)
2. Deceptive Technologies (OBJ. 2.6)
5:00
Play Video: Security Data Analytics (OBJ. 2.6)
3. Security Data Analytics (OBJ. 2.6)
8:00
Play Video: Preventative Controls (OBJ. 2.6)
4. Preventative Controls (OBJ. 2.6)
5:00
Play Video: Application Controls (OBJ. 2.6)
5. Application Controls (OBJ. 2.6)
10:00
Play Video: Security Automation (OBJ. 2.6)
6. Security Automation (OBJ. 2.6)
11:00
Play Video: Physical Security (OBJ. 2.6)
7. Physical Security (OBJ. 2.6)
7:00
Play Video: Lock Picking (OBJ. 2.6)
8. Lock Picking (OBJ. 2.6)
2:00
Name of Video Time
Play Video: Analyzing Vulnerabilities
1. Analyzing Vulnerabilities
1:00
Play Video: Race Conditions (OBJ. 2.5)
2. Race Conditions (OBJ. 2.5)
5:00
Play Video: Buffer Overflows (OBJ. 2.5)
3. Buffer Overflows (OBJ. 2.5)
12:00
Play Video: Buffer Overflow Attack (OBJ. 2.6)
4. Buffer Overflow Attack (OBJ. 2.6)
6:00
Play Video: Authentication and References (OBJ. 2.5)
5. Authentication and References (OBJ. 2.5)
6:00
Play Video: Ciphers and Certificates (OBJ. 2.5)
6. Ciphers and Certificates (OBJ. 2.5)
11:00
Play Video: Improper Headers (OBJ. 2.5)
7. Improper Headers (OBJ. 2.5)
6:00
Play Video: Software Composition (OBJ. 2.5)
8. Software Composition (OBJ. 2.5)
10:00
Play Video: Vulnerable Web Applications (OBJ. 2.5)
9. Vulnerable Web Applications (OBJ. 2.5)
12:00
Name of Video Time
Play Video: Attacking Vulnerabilities
1. Attacking Vulnerabilities
1:00
Play Video: Directory Traversals (OBJ. 2.5)
2. Directory Traversals (OBJ. 2.5)
10:00
Play Video: Cross-Site Scripting (XSS) (OBJ. 2.5)
3. Cross-Site Scripting (XSS) (OBJ. 2.5)
9:00
Play Video: Cross-Site Request Forgery (CSRF) (OBJ. 2.5)
4. Cross-Site Request Forgery (CSRF) (OBJ. 2.5)
7:00
Play Video: SQL Injections (OBJ. 2.5)
5. SQL Injections (OBJ. 2.5)
7:00
Play Video: XML Injections (OBJ. 2.5)
6. XML Injections (OBJ. 2.5)
6:00
Play Video: Other Injection Attacks (OBJ. 2.5)
7. Other Injection Attacks (OBJ. 2.5)
4:00
Play Video: Authentication Bypass (OBJ. 2.5)
8. Authentication Bypass (OBJ. 2.5)
7:00
Play Video: Web Application Vulnerabilities (OBJ. 2.5)
9. Web Application Vulnerabilities (OBJ. 2.5)
9:00
Play Video: VM Attacks (OBJ. 2.5)
10. VM Attacks (OBJ. 2.5)
5:00
Play Video: Network Attacks (OBJ. 2.5)
11. Network Attacks (OBJ. 2.5)
11:00
Play Video: Analyzing Web Applications (OBJ. 2.5)
12. Analyzing Web Applications (OBJ. 2.5)
16:00
Play Video: Social Engineering (OBJ. 2.5)
13. Social Engineering (OBJ. 2.5)
7:00
Play Video: Phishing Campaigns (OBJ. 2.5)
14. Phishing Campaigns (OBJ. 2.5)
5:00
Name of Video Time
Play Video: Indicators of Compromise
1. Indicators of Compromise
2:00
Play Video: Types of IoCs (OBJ. 2.2)
2. Types of IoCs (OBJ. 2.2)
4:00
Play Video: PCAP Files (OBJ. 2.2)
3. PCAP Files (OBJ. 2.2)
4:00
Play Video: Conduct Packet Analysis (OBJ. 2.2)
4. Conduct Packet Analysis (OBJ. 2.2)
6:00
Play Video: NetFlow (OBJ. 2.2)
5. NetFlow (OBJ. 2.2)
7:00
Play Video: Logs (OBJ. 2.2)
6. Logs (OBJ. 2.2)
7:00
Play Video: IoC Notifications (OBJ. 2.2)
7. IoC Notifications (OBJ. 2.2)
8:00
Play Video: Response to IoCs (OBJ. 2.2)
8. Response to IoCs (OBJ. 2.2)
5:00
Play Video: Security Appliances (OBJ. 2.2)
9. Security Appliances (OBJ. 2.2)
16:00
Name of Video Time
Play Video: Incident Response
1. Incident Response
1:00
Play Video: Triage (OBJ. 2.7)
2. Triage (OBJ. 2.7)
8:00
Play Video: Communication Plan (OBJ. 2.7)
3. Communication Plan (OBJ. 2.7)
10:00
Play Video: Stakeholder Management (OBJ. 2.7)
4. Stakeholder Management (OBJ. 2.7)
7:00
Play Video: Incident Response Process (OBJ. 2.7)
5. Incident Response Process (OBJ. 2.7)
10:00
Play Video: Playbooks (OBJ. 2.7)
6. Playbooks (OBJ. 2.7)
8:00
Name of Video Time
Play Video: Digital Forensics
1. Digital Forensics
1:00
Play Video: Forensic Process (OBJ. 2.8)
2. Forensic Process (OBJ. 2.8)
5:00
Play Video: Chain of Custody (OBJ. 2.8)
3. Chain of Custody (OBJ. 2.8)
7:00
Play Video: Order of Volatility (OBJ. 2.8)
4. Order of Volatility (OBJ. 2.8)
7:00
Play Video: Forensic Analysis (OBJ. 2.8)
5. Forensic Analysis (OBJ. 2.8)
7:00
Play Video: Steganography
6. Steganography
4:00

CompTIA CASP+ CAS-004 Exam Dumps, Practice Test Questions

100% Latest & Updated CompTIA CASP+ CAS-004 Practice Test Questions, Exam Dumps & Verified Answers!
30 Days Free Updates, Instant Download!

CompTIA CAS-004 Premium Bundle
$69.97
$49.99

CAS-004 Premium Bundle

  • Premium File: 158 Questions & Answers. Last update: May 29, 2022
  • Training Course: 271 Video Lectures
  • Study Guide: 530 Pages
  • Latest Questions
  • 100% Accurate Answers
  • Fast Exam Updates

CAS-004 Premium Bundle

CompTIA CAS-004 Premium Bundle
  • Premium File: 158 Questions & Answers. Last update: May 29, 2022
  • Training Course: 271 Video Lectures
  • Study Guide: 530 Pages
  • Latest Questions
  • 100% Accurate Answers
  • Fast Exam Updates
$69.97
$49.99

Free CAS-004 Exam Questions & CAS-004 Dumps

File Name Size Votes
File Name
comptia.certkiller.cas-004.v2022-04-02.by.sienna.78q.vce
Size
2.72 MB
Votes
1
File Name
comptia.pass4sureexam.cas-004.v2021-11-19.by.victoria.49q.vce
Size
1.89 MB
Votes
1
File Name
comptia.examcollection.cas-004.v2021-09-16.by.oliver.75q.vce
Size
1.03 MB
Votes
1

CompTIA CAS-004 Training Course

Want verified and proven knowledge for CompTIA Advanced Security Practitioner (CASP+) CAS-004? Believe it's easy when you have ExamSnap's CompTIA Advanced Security Practitioner (CASP+) CAS-004 certification video training course by your side which along with our CompTIA CAS-004 Exam Dumps & Practice Test questions provide a complete solution to pass your exam Read More.

Prepared by Top Experts, the top IT Trainers ensure that when it comes to your IT exam prep and you can count on ExamSnap CompTIA Advanced Security Practitioner (CASP+) CAS-004 certification video training course that goes in line with the corresponding CompTIA CAS-004 exam dumps, study guide, and practice test questions & answers.

Comments (0)

Add Comment

Please post your comments about CAS-004 Exams. Don't share your email address asking for CAS-004 braindumps or CAS-004 exam pdf files.

Add Comment

Only Registered Members can View Training Courses

Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.

  • Trusted by 1.2M IT Certification Candidates Every Month
  • Hundreds Hours of Videos
  • Instant download After Registration

Already Member? Click here to Login

A confirmation link will be sent to this email address to verify your login

UP

LIMITED OFFER: GET 30% Discount

This is ONE TIME OFFER

ExamSnap Discount Offer
Enter Your Email Address to Receive Your 30% Discount Code

A confirmation link will be sent to this email address to verify your login. *We value your privacy. We will not rent or sell your email address.

Download Free Demo of VCE Exam Simulator

Experience Avanset VCE Exam Simulator for yourself.

Simply submit your e-mail address below to get started with our interactive software demo of your free trial.

Free Demo Limits: In the demo version you will be able to access only first 5 questions from exam.