PDFs and exam guides are not so efficient, right? Prepare for your CompTIA examination with our training course. The CAS-004 course contains a complete batch of videos that will provide you with profound and thorough knowledge related to CompTIA certification exam. Pass the CompTIA CAS-004 test with flying colors.
Curriculum for CAS-004 Certification Video Course
Name of Video | Time |
---|---|
![]() 1. Data Considerations (OBJ 4.3) |
1:00 |
![]() 2. Data Security (OBJ. 4.3) |
4:00 |
![]() 3. Data Classification (OBJ. 4.3) |
3:00 |
![]() 4. Data Types (OBJ. 4.3) |
5:00 |
![]() 5. Data Retention (OBJ. 4.3) |
7:00 |
![]() 6. Data Destruction (OBJ. 4.3) |
3:00 |
![]() 7. Data Ownership (OBJ. 4.3) |
6:00 |
![]() 8. Data Sovereignty (OBJ. 4.3) |
3:00 |
Name of Video | Time |
---|---|
![]() 1. Risk Management (OBJ 4.1) |
2:00 |
![]() 2. Risk Strategies (OBJ. 4.1) |
5:00 |
![]() 3. Risk Management Lifecycle (OBJ. 4.1) |
12:00 |
![]() 4. Risk Types (OBJ. 4.1) |
3:00 |
![]() 5. Risk Handling (OBJ. 4.1) |
9:00 |
![]() 6. Risk Tracking (OBJ. 4.1) |
5:00 |
![]() 7. Risk Assessment (OBJ. 4.1) |
18:00 |
![]() 8. When Risk Management Fails (OBJ. 4.1) |
4:00 |
Name of Video | Time |
---|---|
![]() 1. Policies and Frameworks (OBJ. 4.1 & 4.3) |
1:00 |
![]() 2. Policies (OBJ. 4.1) |
12:00 |
![]() 3. Frameworks (OBJ. 4.1) |
5:00 |
![]() 4. Regulations (OBJ. 4.3) |
8:00 |
![]() 5. Standards (OBJ. 4.3) |
6:00 |
![]() 6. Contracts and Agreements (OBJ. 4.3) |
9:00 |
![]() 7. Legal Considerations (OBJ. 4.3) |
7:00 |
![]() 8. Integrating Industries (OBJ. 4.3) |
3:00 |
Name of Video | Time |
---|---|
![]() 1. Business Continuity (OBJ 4.4) |
1:00 |
![]() 2. Business Continuity Plan (OBJ 4.4) |
14:00 |
![]() 3. Business Impact Analysis (OBJ 4.4) |
14:00 |
![]() 4. Privacy Impact Assessment (OBJ 4.4) |
4:00 |
![]() 5. Incident Response Plan (OBJ 4.4) |
11:00 |
![]() 6. Testing Plans (OBJ 4.4) |
7:00 |
Name of Video | Time |
---|---|
![]() 1. Risk Strategies (OBJ 4.1) |
2:00 |
![]() 2. Asset Value (OBJ 4.1) |
4:00 |
![]() 3. Access Control (OBJ 4.1) |
6:00 |
![]() 4. Aggregating Risk (OBJ 4.1) |
3:00 |
![]() 5. Scenario Planning (OBJ 4.1) |
8:00 |
![]() 6. Security Controls (OBJ 4.1) |
9:00 |
![]() 7. Security Solutions (OBJ 4.1) |
9:00 |
![]() 8. Cost of a Data Breach (OBJ 4.1) |
6:00 |
Name of Video | Time |
---|---|
![]() 1. Vendor Risk (OBJ 4.2) |
4:00 |
![]() 2. Business Models (OBJ 4.2) |
11:00 |
![]() 3. Influences (OBJ 4.2) |
7:00 |
![]() 4. Organizational Changes (OBJ 4.2) |
6:00 |
![]() 5. Shared Responsibility Model (OBJ 4.2) |
5:00 |
![]() 6. Viability and Support (OBJ 4.2) |
11:00 |
![]() 7. Dependencies (OBJ 4.2) |
5:00 |
![]() 8. Considerations (OBJ 4.2) |
11:00 |
![]() 9. Supply Chain (OBJ 4.2) |
6:00 |
Name of Video | Time |
---|---|
![]() 1. Securing Networks (OBJ 1.1) |
7:00 |
![]() 2. Switches (OBJ 1.1) |
7:00 |
![]() 3. Routers (OBJ 1.1) |
8:00 |
![]() 4. Wireless and Mesh (OBJ 1.1) |
3:00 |
![]() 5. Firewalls (OBJ 1.1) |
12:00 |
![]() 6. Configuring Firewalls (OBJ 1.1) |
7:00 |
![]() 7. Proxies (OBJ 1.1) |
7:00 |
![]() 8. Gateways (OBJ 1.1) |
5:00 |
![]() 9. IDS and IPS (OBJ 1.1) |
6:00 |
![]() 10. Network Access Control (NAC) (OBJ 1.1) |
3:00 |
![]() 11. Remote Access (OBJ 1.1) |
9:00 |
![]() 12. Unified Communications (OBJ 1.1) |
19:00 |
![]() 13. Cloud vs On-premise (OBJ 1.1) |
5:00 |
![]() 14. DNSSEC (OBJ 1.1) |
4:00 |
![]() 15. Load Balancer (OBJ 1.1) |
7:00 |
Name of Video | Time |
---|---|
![]() 1. Securing Architectures (OBJ 1.1) |
1:00 |
![]() 2. Traffic Mirroring (OBJ 1.1) |
4:00 |
![]() 3. Network Sensors (OBJ 1.1) |
12:00 |
![]() 4. Host Sensors (OBJ 1.1) |
6:00 |
![]() 5. Layer 2 Segmentation (OBJ 1.1) |
5:00 |
![]() 6. Network Segmentation (OBJ 1.1) |
13:00 |
![]() 7. Implement Network Segmentation (OBJ 1.1) |
10:00 |
![]() 8. Server Segmentation (OBJ 1.1) |
11:00 |
![]() 9. Zero Trust (OBJ 1.1) |
7:00 |
![]() 10. Merging Networks (OBJ 1.1) |
6:00 |
![]() 11. Software-Defined Networking (SDN) (OBJ 1.1) |
5:00 |
Name of Video | Time |
---|---|
![]() 1. Infrastructure Design (OBJ 1.2) |
1:00 |
![]() 2. Scalability (OBJ 1.2) |
6:00 |
![]() 3. Resiliency Issues (OBJ 1.2) |
13:00 |
![]() 4. Automation (OBJ 1.2) |
6:00 |
![]() 5. Performance Design (OBJ 1.2) |
6:00 |
![]() 6. Virtualization (OBJ 1.2) |
8:00 |
![]() 7. Securing VMs (OBJ 1.2) |
5:00 |
![]() 8. Containerization (OBJ 1.2) |
6:00 |
Name of Video | Time |
---|---|
![]() 1. Cloud and Virtualization (OBJ 1.6) |
1:00 |
![]() 2. Cloud Deployment Models (OBJ 1.6) |
5:00 |
![]() 3. Cloud Service Models (OBJ 1.6) |
5:00 |
![]() 4. Deployment Considerations (OBJ 1.6) |
5:00 |
![]() 5. Provider Limitations (OBJ 1.6) |
3:00 |
![]() 6. Extending Controls (OBJ 1.6) |
5:00 |
![]() 7. Provision and Deprovision (OBJ 1.6) |
3:00 |
![]() 8. Storage Models (OBJ 1.6) |
5:00 |
![]() 9. Virtualization (OBJ 1.6) |
8:00 |
Name of Video | Time |
---|---|
![]() 1. Software Applications (OBJ 1.3) |
3:00 |
![]() 2. Systems Development Life Cycle (OBJ 1.3) |
7:00 |
![]() 3. Software Development Life Cycle (OBJ 1.3) |
6:00 |
![]() 4. Development Approaches (OBJ 1.3) |
11:00 |
![]() 5. Software Assurance (OBJ 1.3) |
9:00 |
![]() 6. Baselins and Templates (OBJ 1.3) |
7:00 |
![]() 7. Best Practices (OBJ 1.3) |
6:00 |
![]() 8. Integrating Applications (OBJ 1.3) |
5:00 |
Name of Video | Time |
---|---|
![]() 1. Data Security (OBJ 1.4) |
4:00 |
![]() 2. Data Life Cycle (OBJ 1.4) |
10:00 |
![]() 3. Data Classification (OBJ 1.4) |
7:00 |
![]() 4. Labeling and Tagging (OBJ 1.4) |
8:00 |
![]() 5. Deidentification (OBJ 1.4) |
11:00 |
![]() 6. Data Encryption (OBJ 1.4) |
8:00 |
![]() 7. Data Loss Prevention (DLP) (OBJ 1.4) |
10:00 |
![]() 8. DLP Detection (OBJ 1.4) |
7:00 |
![]() 9. Data Loss Detection (OBJ 1.4) |
12:00 |
![]() 10. Auditing Files (OBJ 1.4) |
4:00 |
Name of Video | Time |
---|---|
![]() 1. Authentication and Authorization (OBJ 1.5) |
2:00 |
![]() 2. Access Control (OBJ 1.5) |
5:00 |
![]() 3. Credential Management (OBJ 1.5) |
4:00 |
![]() 4. Password Policies (OBJ 1.5) |
8:00 |
![]() 5. Implementing Password Policies (OBJ 1.5) |
5:00 |
![]() 6. Cracking Weak Passwords (OBJ 1.5) |
3:00 |
![]() 7. Multifactor Authentication (OBJ 1.5) |
8:00 |
![]() 8. Authentication Protocols (OBJ 1.5) |
10:00 |
![]() 9. Federation (OBJ 1.5) |
7:00 |
![]() 10. Root of Trust (OBJ 1.5) |
4:00 |
![]() 11. Attestation (OBJ 1.5) |
2:00 |
![]() 12. Identity Proofing (OBJ 1.5) |
4:00 |
Name of Video | Time |
---|---|
![]() 1. Cryptography (OBJ 1.7) |
2:00 |
![]() 2. Privacy and Confidentiality (OBJ 1.7) |
7:00 |
![]() 3. Integrity and Non-repudiation (OBJ 1.7) |
7:00 |
![]() 4. Compliance and Policy (OBJ 1.7) |
4:00 |
![]() 5. Data States (OBJ 1.7) |
7:00 |
![]() 6. Cryptographic Use Cases (OBJ 1.7) |
6:00 |
![]() 7. PKI Use Cases (OBJ 1.7) |
9:00 |
Name of Video | Time |
---|---|
![]() 1. Emerging Technology (OBJ 1.8) |
4:00 |
![]() 2. Artificial Intelligence (AI) & Machine Learning (ML) (OBJ 1.8) |
9:00 |
![]() 3. Deep Learning (OBJ 1.8) |
9:00 |
![]() 4. Big Data (OBJ 1.8) |
5:00 |
![]() 5. Blockchain & Distributed Consensus (OBJ 1.8) |
6:00 |
![]() 6. Passwordless Authentication (OBJ 1.8) |
5:00 |
![]() 7. Homomorphic Encryption (OBJ 1.8) |
4:00 |
![]() 8. Virtual/Augmented Reality (OBJ 1.8) |
5:00 |
![]() 9. 3D Printing (OBJ 1.8) |
3:00 |
![]() 10. Quantum Computing (OBJ 1.8) |
6:00 |
Name of Video | Time |
---|---|
![]() 1. Enterprise Mobility |
3:00 |
![]() 2. Enterprise Mobility Management (EMM) (OBJ. 3.1) |
10:00 |
![]() 3. WPA3 (OBJ. 3.1) |
7:00 |
![]() 4. Connectivity Options (OBJ. 3.1) |
9:00 |
![]() 5. Security Configurations (OBJ. 3.1) |
8:00 |
![]() 6. DNS Protection (OBJ. 3.1) |
3:00 |
![]() 7. Deployment Options (OBJ. 3.1) |
5:00 |
![]() 8. Reconnaissance Concerns (OBJ. 3.1) |
8:00 |
![]() 9. Mobile Security (OBJ. 3.1) |
8:00 |
Name of Video | Time |
---|---|
![]() 1. Endpoint Security Controls |
2:00 |
![]() 2. Device Hardening (OBJ. 3.2) |
9:00 |
![]() 3. Unnecessary Services (OBJ. 3.2) |
6:00 |
![]() 4. Patching (OBJ. 3.2) |
5:00 |
![]() 5. Security Settings (OBJ. 3.2) |
6:00 |
![]() 6. Mandatory Access Controls (MAC) (OBJ. 3.2) |
7:00 |
![]() 7. Secure Boot (OBJ. 3.2) |
6:00 |
![]() 8. Hardware Encryption (OBJ. 3.2) |
5:00 |
![]() 9. Endpoint Protections (OBJ. 3.2) |
10:00 |
![]() 10. Logging and Monitoring (OBJ. 3.2) |
6:00 |
![]() 11. Configuring SIEM Agents (OBJ. 3.2) |
19:00 |
![]() 12. Resiliency (OBJ. 3.2) |
6:00 |
Name of Video | Time |
---|---|
![]() 1. Cloud Technologies |
3:00 |
![]() 2. Business Continuity/Disaster Recovery (BC/DR) (OBJ. 3.4) |
8:00 |
![]() 3. Cloud Encryption (OBJ. 3.4) |
5:00 |
![]() 4. Serverless Computing (OBJ. 3.4) |
9:00 |
![]() 5. Software-Defined Networking (SDN) (OBJ. 3.4) |
5:00 |
![]() 6. Log Collection and Analysis (OBJ. 3.4) |
4:00 |
![]() 7. Cloud Access Security Broker (CASB) (OBJ. 3.4) |
6:00 |
![]() 8. Cloud Misconfigurations (OBJ. 3.4) |
11:00 |
Name of Video | Time |
---|---|
![]() 1. Operational Technologies |
2:00 |
![]() 2. Embedded Systems (OBJ. 3.3) |
10:00 |
![]() 3. ICS and SCADA (OBJ. 3.3) |
9:00 |
![]() 4. ICS Protocols (OBJ. 3.3) |
11:00 |
![]() 5. Industries and Sectors (OBJ. 3.3) |
5:00 |
Name of Video | Time |
---|---|
![]() 1. Hashing and Symmetric Algorithms |
1:00 |
![]() 2. Hashing (OBJ. 3.6) |
7:00 |
![]() 3. Calculating Hash Digests (OBJ. 3.6) |
3:00 |
![]() 4. Message Authentication (OBJ. 3.6) |
4:00 |
![]() 5. Symmetric Algorithms (OBJ. 3.6) |
6:00 |
![]() 6. Stream Ciphers (OBJ. 3.6) |
5:00 |
![]() 7. Block Ciphers (OBJ. 3.6) |
10:00 |
Name of Video | Time |
---|---|
![]() 1. Asymmetric Algorithms |
2:00 |
![]() 2. Using Asymmetric Algortihms |
9:00 |
![]() 3. SSL/TLS and Cipher Suites (OBJ. 3.6) |
8:00 |
![]() 4. S/MIME and SSH (OBJ. 3.6) |
7:00 |
![]() 5. EAP (OBJ. 3.6) |
6:00 |
![]() 6. IPSec (OBJ. 3.6) |
15:00 |
![]() 7. Elliptic Curve Cryptography (ECC) (OBJ. 3.6) |
4:00 |
![]() 8. Forward Secrecy (OBJ. 3.6) |
4:00 |
![]() 9. Authenticated Encryption with Associated Data (AEAD) (OBJ. 3.6) |
2:00 |
![]() 10. Key Stretching (OBJ. 3.6) |
5:00 |
Name of Video | Time |
---|---|
![]() 1. Public Key Infrastructure |
3:00 |
![]() 2. PKI Components (OBJ. 3.5) |
10:00 |
![]() 3. Digital Certificates (OBJ. 3.5) |
8:00 |
![]() 4. Using Digital Certificates (OBJ. 3.5) |
6:00 |
![]() 5. Exploring Server Certificates (OBJ. 3.5) |
4:00 |
![]() 6. Trust Models (OBJ. 3.5) |
4:00 |
![]() 7. Certificate Management (OBJ. 3.5) |
3:00 |
![]() 8. Certificate Validity (CRL and OCSP) (OBJ. 3.5) |
4:00 |
![]() 9. Protecting Web Traffic (OBJ. 3.5) |
4:00 |
![]() 10. Troubleshooting Certificates (OBJ. 3.7) |
5:00 |
![]() 11. Troubleshooting Keys (OBJ. 3.7) |
4:00 |
Name of Video | Time |
---|---|
![]() 1. Threat and Vulnerability Management |
2:00 |
![]() 2. Threat Intelligence (OBJ. 2.1) |
6:00 |
![]() 3. Threat Hunting (OBJ. 2.1) |
7:00 |
![]() 4. Intelligence Collection (OBJ. 2.1) |
11:00 |
![]() 5. Threat Actors (OBJ. 2.1) |
9:00 |
![]() 6. Threat Management Frameworks (OBJ. 2.1) |
13:00 |
![]() 7. Vulnerability Management Activities (OBJ. 2.3) |
12:00 |
![]() 8. Security Content Automation Protocol (SCAP) (OBJ. 2.3) |
7:00 |
Name of Video | Time |
---|---|
![]() 1. Vulnerability Assessments |
2:00 |
![]() 2. Penetration Test (OBJ. 2.4) |
5:00 |
![]() 3. PenTest Steps (OBJ. 2.4) |
7:00 |
![]() 4. PenTest Requirements (OBJ. 2.4) |
11:00 |
![]() 5. Code Analysis (OBJ. 2.4) |
8:00 |
![]() 6. Protocol Analysis (OBJ. 2.4) |
8:00 |
![]() 7. TCPDump (OBJ. 2.4) |
8:00 |
![]() 8. Wireshark (OBJ. 2.4) |
10:00 |
![]() 9. Nmap (OBJ. 2.4) |
11:00 |
![]() 10. Analysis Utilities (OBJ. 2.4) |
5:00 |
![]() 11. Vulnerability Scanning (OBJ. 2.4) |
9:00 |
![]() 12. Analyzing Scan Outputs (OBJ. 2.4) |
14:00 |
Name of Video | Time |
---|---|
![]() 1. Risk Reduction |
2:00 |
![]() 2. Deceptive Technologies (OBJ. 2.6) |
5:00 |
![]() 3. Security Data Analytics (OBJ. 2.6) |
8:00 |
![]() 4. Preventative Controls (OBJ. 2.6) |
5:00 |
![]() 5. Application Controls (OBJ. 2.6) |
10:00 |
![]() 6. Security Automation (OBJ. 2.6) |
11:00 |
![]() 7. Physical Security (OBJ. 2.6) |
7:00 |
![]() 8. Lock Picking (OBJ. 2.6) |
2:00 |
Name of Video | Time |
---|---|
![]() 1. Analyzing Vulnerabilities |
1:00 |
![]() 2. Race Conditions (OBJ. 2.5) |
5:00 |
![]() 3. Buffer Overflows (OBJ. 2.5) |
12:00 |
![]() 4. Buffer Overflow Attack (OBJ. 2.6) |
6:00 |
![]() 5. Authentication and References (OBJ. 2.5) |
6:00 |
![]() 6. Ciphers and Certificates (OBJ. 2.5) |
11:00 |
![]() 7. Improper Headers (OBJ. 2.5) |
6:00 |
![]() 8. Software Composition (OBJ. 2.5) |
10:00 |
![]() 9. Vulnerable Web Applications (OBJ. 2.5) |
12:00 |
Name of Video | Time |
---|---|
![]() 1. Attacking Vulnerabilities |
1:00 |
![]() 2. Directory Traversals (OBJ. 2.5) |
10:00 |
![]() 3. Cross-Site Scripting (XSS) (OBJ. 2.5) |
9:00 |
![]() 4. Cross-Site Request Forgery (CSRF) (OBJ. 2.5) |
7:00 |
![]() 5. SQL Injections (OBJ. 2.5) |
7:00 |
![]() 6. XML Injections (OBJ. 2.5) |
6:00 |
![]() 7. Other Injection Attacks (OBJ. 2.5) |
4:00 |
![]() 8. Authentication Bypass (OBJ. 2.5) |
7:00 |
![]() 9. Web Application Vulnerabilities (OBJ. 2.5) |
9:00 |
![]() 10. VM Attacks (OBJ. 2.5) |
5:00 |
![]() 11. Network Attacks (OBJ. 2.5) |
11:00 |
![]() 12. Analyzing Web Applications (OBJ. 2.5) |
16:00 |
![]() 13. Social Engineering (OBJ. 2.5) |
7:00 |
![]() 14. Phishing Campaigns (OBJ. 2.5) |
5:00 |
Name of Video | Time |
---|---|
![]() 1. Indicators of Compromise |
2:00 |
![]() 2. Types of IoCs (OBJ. 2.2) |
4:00 |
![]() 3. PCAP Files (OBJ. 2.2) |
4:00 |
![]() 4. Conduct Packet Analysis (OBJ. 2.2) |
6:00 |
![]() 5. NetFlow (OBJ. 2.2) |
7:00 |
![]() 6. Logs (OBJ. 2.2) |
7:00 |
![]() 7. IoC Notifications (OBJ. 2.2) |
8:00 |
![]() 8. Response to IoCs (OBJ. 2.2) |
5:00 |
![]() 9. Security Appliances (OBJ. 2.2) |
16:00 |
Name of Video | Time |
---|---|
![]() 1. Incident Response |
1:00 |
![]() 2. Triage (OBJ. 2.7) |
8:00 |
![]() 3. Communication Plan (OBJ. 2.7) |
10:00 |
![]() 4. Stakeholder Management (OBJ. 2.7) |
7:00 |
![]() 5. Incident Response Process (OBJ. 2.7) |
10:00 |
![]() 6. Playbooks (OBJ. 2.7) |
8:00 |
Name of Video | Time |
---|---|
![]() 1. Digital Forensics |
1:00 |
![]() 2. Forensic Process (OBJ. 2.8) |
5:00 |
![]() 3. Chain of Custody (OBJ. 2.8) |
7:00 |
![]() 4. Order of Volatility (OBJ. 2.8) |
7:00 |
![]() 5. Forensic Analysis (OBJ. 2.8) |
7:00 |
![]() 6. Steganography |
4:00 |
100% Latest & Updated CompTIA CASP+ CAS-004 Practice Test Questions, Exam Dumps & Verified Answers!
30 Days Free Updates, Instant Download!
CAS-004 Premium Bundle
CompTIA CAS-004 Training Course
Want verified and proven knowledge for CompTIA Advanced Security Practitioner (CASP+) CAS-004? Believe it's easy when you have ExamSnap's CompTIA Advanced Security Practitioner (CASP+) CAS-004 certification video training course by your side which along with our CompTIA CAS-004 Exam Dumps & Practice Test questions provide a complete solution to pass your exam Read More.
Prepared by Top Experts, the top IT Trainers ensure that when it comes to your IT exam prep and you can count on ExamSnap CompTIA Advanced Security Practitioner (CASP+) CAS-004 certification video training course that goes in line with the corresponding CompTIA CAS-004 exam dumps, study guide, and practice test questions & answers.
Purchase Individually
CompTIA Training Courses
Only Registered Members can View Training Courses
Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.
LIMITED OFFER: GET 30% Discount
This is ONE TIME OFFER
A confirmation link will be sent to this email address to verify your login. *We value your privacy. We will not rent or sell your email address.
Download Free Demo of VCE Exam Simulator
Experience Avanset VCE Exam Simulator for yourself.
Simply submit your e-mail address below to get started with our interactive software demo of your free trial.