Training Video Course

CAS-005: CompTIA SecurityX

PDFs and exam guides are not so efficient, right? Prepare for your CompTIA examination with our training course. The CAS-005 course contains a complete batch of videos that will provide you with profound and thorough knowledge related to CompTIA certification exam. Pass the CompTIA CAS-005 test with flying colors.

Rating
4.54rating
Students
88
Duration
00:52:31 h
$16.49
$14.99

Curriculum for CAS-005 Certification Video Course

Name of Video Time
Play Video: Introduction to CASP+ (CAS-005) / SecurityX Training
1. Introduction to CASP+ (CAS-005) / SecurityX Training
4:52
Name of Video Time
Play Video: Understand the CIA Triad and Security Objective
1. Understand the CIA Triad and Security Objective
7:15
Play Video: Security Terminologies
2. Security Terminologies
8:41
Play Video: Security Vulnerabilities
3. Security Vulnerabilities
5:09
Play Video: Vulnerability Key Terms
4. Vulnerability Key Terms
4:44
Play Video: Cyber Attack Process
5. Cyber Attack Process
5:34
Play Video: Adversaries and Threat Actors
6. Adversaries and Threat Actors
4:51
Play Video: APTs
7. APTs
8:00
Play Video: Threat Intel & CERT
8. Threat Intel & CERT
5:52
Play Video: Understanding Attack Surface
9. Understanding Attack Surface
8:01
Play Video: Understand Malware
10. Understand Malware
11:26
Play Video: DOS & DDOS
11. DOS & DDOS
9:00
Play Video: In-Path Attacks
12. In-Path Attacks
9:20
Play Video: Buffer overFlow Attack
13. Buffer overFlow Attack
5:51
Play Video: Race Condition
14. Race Condition
7:47
Play Video: Privilege Escalation
15. Privilege Escalation
6:36
Play Video: Side Channel Attacks
16. Side Channel Attacks
8:14
Play Video: Mobile Threats
17. Mobile Threats
6:13
Name of Video Time
Play Video: Governance and Management
1. Governance and Management
7:07
Play Video: Security Program
2. Security Program
13:43
Play Video: Security Senior Roles
3. Security Senior Roles
8:40
Play Video: Security and Business Integration
4. Security and Business Integration
6:15
Play Video: Information Security Governance
5. Information Security Governance
7:04
Play Video: Governance Frameworks
6. Governance Frameworks
11:17
Play Video: GRC
7. GRC
5:02
Play Video: Information Security vs GRC
8. Information Security vs GRC
3:57
Play Video: Security Program Documentation
9. Security Program Documentation
3:42
Name of Video Time
Play Video: Security Controls Overview
1. Security Controls Overview
11:20
Play Video: Compensating Controls and Control Objective
2. Compensating Controls and Control Objective
7:16
Play Video: Layered Defenses & Control References
3. Layered Defenses & Control References
8:05
Play Video: Control Review and Assessment
4. Control Review and Assessment
5:42
Play Video: SMART Metrics
5. SMART Metrics
5:28
Play Video: Understand the Enterprise Architecture
6. Understand the Enterprise Architecture
6:09
Play Video: The Process of Acquiring New Controls
7. The Process of Acquiring New Controls
5:59
Play Video: Project Management in Security Investments
8. Project Management in Security Investments
8:46
Play Video: Business Case and Feasibility Analaysis
9. Business Case and Feasibility Analaysis
4:38
Play Video: Management Buy In to support the Security Investment
10. Management Buy In to support the Security Investment
4:41
Name of Video Time
Play Video: Risk Management Overview
1. Risk Management Overview
10:06
Play Video: Risk Appetite & Tolerance and Capacity
2. Risk Appetite & Tolerance and Capacity
5:30
Play Video: Risk Identification
3. Risk Identification
6:42
Play Video: Digital Risk Protection Solutions
4. Digital Risk Protection Solutions
8:24
Play Video: Threat Modeling
5. Threat Modeling
6:13
Play Video: Use case & Abuse Case
6. Use case & Abuse Case
8:38
Play Video: Risk Analysis
7. Risk Analysis
8:46
Play Video: Risk Evaluation and Risk Response
8. Risk Evaluation and Risk Response
12:36
Play Video: Risk Reporting and Monitoring
9. Risk Reporting and Monitoring
9:17
Play Video: Risk Management Frameworks
10. Risk Management Frameworks
2:38
Play Video: NIST SP800-30
11. NIST SP800-30
8:38
Play Video: NIST RMF
12. NIST RMF
5:52
Name of Video Time
Play Video: Understanding Networks
1. Understanding Networks
11:34
Play Video: OSI Model & TCP/IP Model
2. OSI Model & TCP/IP Model
9:56
Play Video: OSI Layer 1
3. OSI Layer 1
8:45
Play Video: OSI Layer 2
4. OSI Layer 2
7:28
Play Video: OSI Layer 3
5. OSI Layer 3
8:09
Play Video: Network Addressing & ARP
6. Network Addressing & ARP
7:37
Play Video: Layer 4-7 Deep Dive
7. Layer 4-7 Deep Dive
6:30
Play Video: Network Security Best Practices
8. Network Security Best Practices
8:59
Name of Video Time
Play Video: Zero Trust
1. Zero Trust
9:27
Play Video: Key Security Design Concepts
2. Key Security Design Concepts
7:08
Play Video: Deperimeterization & Security Boundaries [NEW]
3. Deperimeterization & Security Boundaries [NEW]
12:52
Play Video: Abstraction as a Security Strategy
4. Abstraction as a Security Strategy
6:46
Play Video: Trusted Computing Base
5. Trusted Computing Base
5:33
Name of Video Time
Play Video: Understand Segmentation & VLANs
1. Understand Segmentation & VLANs
9:14
Play Video: Understand NAC & Dot1X
2. Understand NAC & Dot1X
14:02
Play Video: Firewalls
3. Firewalls
8:28
Play Video: DMZ
4. DMZ
7:08
Play Video: IDS & IPS
5. IDS & IPS
8:12
Play Video: Network Access Policies and BYOD
6. Network Access Policies and BYOD
6:58
Play Video: Content Filtering
7. Content Filtering
8:58
Play Video: VPN, SSL vpn & IPSEC & Split Tunnel
8. VPN, SSL vpn & IPSEC & Split Tunnel
15:08
Play Video: Internet, Email Security Policies
9. Internet, Email Security Policies
7:01
Play Video: Securing Network Management Best Practices and Policies
10. Securing Network Management Best Practices and Policies
7:24
Play Video: Wireless Security
11. Wireless Security
12:42
Play Video: Wired Security
12. Wired Security
12:15
Play Video: Converged Networks - VOIP & QOS & POE
13. Converged Networks - VOIP & QOS & POE
6:34
Play Video: ICS & OT
14. ICS & OT
9:55
Play Video: ICS & OT Security
15. ICS & OT Security
7:50
Play Video: DNS
16. DNS
12:35
Play Video: Sandbox
17. Sandbox
3:48
Play Video: WAF - Web Application Firewall
18. WAF - Web Application Firewall
5:16
Play Video: Load Balancer
19. Load Balancer
5:19
Play Video: API & API Security
20. API & API Security
8:02
Play Video: API OWASP 10 Security
21. API OWASP 10 Security
18:24
Play Video: FIM
22. FIM
7:07
Play Video: SPAN & RSPAN & Network TAPs
23. SPAN & RSPAN & Network TAPs
9:51
Name of Video Time
Play Video: Understand the Role of IAM
1. Understand the Role of IAM
8:40
Play Video: AAA
2. AAA
13:42
Play Video: Biometric Authentication
3. Biometric Authentication
8:51
Play Video: SSO & RSO
4. SSO & RSO
7:36
Play Video: Key Access Control Concepts
5. Key Access Control Concepts
5:12
Play Video: Authorization
6. Authorization
7:40
Play Video: Accounting
7. Accounting
8:20
Play Video: Log Management
8. Log Management
9:40
Play Video: Log Management Best Practices
9. Log Management Best Practices
6:59
Play Video: Password & Authentication Attacks
10. Password & Authentication Attacks
11:05
Play Video: LDAP
11. LDAP
13:38
Name of Video Time
Play Video: Cloud Overview
1. Cloud Overview
8:24
Play Video: Cloud deployment Models
2. Cloud deployment Models
5:41
Play Video: Cloud Shared Responsibility Matrix
3. Cloud Shared Responsibility Matrix
6:50
Play Video: Cloud Contracts and SLA
4. Cloud Contracts and SLA
8:20
Play Video: Cloud Availability
5. Cloud Availability
6:39
Play Video: Cloud Related Threats
6. Cloud Related Threats
8:15
Play Video: Virtualization
7. Virtualization
4:49
Play Video: Containers
8. Containers
7:31
Play Video: SDN
9. SDN
7:53
Play Video: Storage Solutions
10. Storage Solutions
8:52
Play Video: Storage Redundancy Solutions
11. Storage Redundancy Solutions
8:57
Play Video: Backup and Restore
12. Backup and Restore
10:40
Play Video: Server, Application Security Policies
13. Server, Application Security Policies
6:47
Play Video: Cloud Related Policies
14. Cloud Related Policies
7:27
Play Video: CSA STAR
15. CSA STAR
9:14
Play Video: Secrets Management
16. Secrets Management
6:15
Name of Video Time
Play Video: Endpoint Security Software
1. Endpoint Security Software
12:21
Play Video: Endpoint Security Best Practices
2. Endpoint Security Best Practices
6:24
Play Video: Antimalware Measures
3. Antimalware Measures
4:32
Play Video: DLP Overview
4. DLP Overview
7:31
Play Video: IRM - Information Right Management
5. IRM - Information Right Management
8:07
Play Video: Using IRM Effectively
6. Using IRM Effectively
8:03
Play Video: Asset Management
7. Asset Management
6:45
Play Video: Patch Management Program
8. Patch Management Program
4:48
Play Video: Configuration Management and Baselines
9. Configuration Management and Baselines
7:10
Name of Video Time
Play Video: What is the Software?
1. What is the Software?
12:02
Play Video: Software Development Lifecycle
2. Software Development Lifecycle
7:29
Play Video: OWASP Top 10 for Web Application
3. OWASP Top 10 for Web Application
9:25
Play Video: CWE - Common Weakness Enumeration
4. CWE - Common Weakness Enumeration
3:32
Play Video: Application Threats in Memory Concurrency and_Resource Management [NEW]
5. Application Threats in Memory Concurrency and_Resource Management [NEW]
13:45
Play Video: DevOPS
6. DevOPS
6:31
Play Video: DevSECOPS
7. DevSECOPS
7:05
Play Video: Secure Coding Practices
8. Secure Coding Practices
8:39
Play Video: Protecting the Source Code
9. Protecting the Source Code
8:39
Play Video: Application Sandboxing and Runtime Defense Mechanisms [NEW]
10. Application Sandboxing and Runtime Defense Mechanisms [NEW]
12:04
Play Video: Security Requirements Traceability Matrix (SRTM)
11. Security Requirements Traceability Matrix (SRTM)
8:38
Play Video: Software Release Management
12. Software Release Management
10:33
Play Video: Software Maintenance
13. Software Maintenance
6:08
Play Video: Software Testing
14. Software Testing
9:12
Play Video: Writing Secure Code
15. Writing Secure Code
8:39
Play Video: Application Security Frameworks Software Assurance and Library Hygiene [NEW]
16. Application Security Frameworks Software Assurance and Library Hygiene [NEW]
12:26
Play Video: Data Handling and Context Aware Application Security Controls [NEW]
17. Data Handling and Context Aware Application Security Controls [NEW]
18:12
Play Video: Penetration Testing Overview
18. Penetration Testing Overview
9:59
Play Video: Penetration Testing in Action - Tools and Techniques for Recon/Scanning [NEW]
19. Penetration Testing in Action - Tools and Techniques for Recon/Scanning [NEW]
13:54
Play Video: Penetration Testing In Action - Tools and Techniques for HOST/APP Testing [NEW]
20. Penetration Testing In Action - Tools and Techniques for HOST/APP Testing [NEW]
15:44
Play Video: Bug Bounty Programs & Bug Hunting
21. Bug Bounty Programs & Bug Hunting
5:17
Name of Video Time
Play Video: Understand the Policy Document
1. Understand the Policy Document
04:40
Play Video: Policy Document Attributes and Review of Policy Document
2. Policy Document Attributes and Review of Policy Document
6:41
Play Video: Standards and Baseline
3. Standards and Baseline
4:13
Play Video: Procedures and Guidelines
4. Procedures and Guidelines
4:18
Play Video: HR Security
5. HR Security
11:05
Play Video: HR Policy
6. HR Policy
5:23
Play Video: Understand Social Engineering Attacks
7. Understand Social Engineering Attacks
24:47
Play Video: Security Awareness Training
8. Security Awareness Training
7:31
Play Video: Auditing and Reviewing Systems
9. Auditing and Reviewing Systems
9:23
Play Video: Outsourcing Security Requirements
10. Outsourcing Security Requirements
13:58
Play Video: Supply Chain Risk management
11. Supply Chain Risk management
9:42
Name of Video Time
Play Video: Introduction to Cryptography
1. Introduction to Cryptography
8:26
Play Video: Symmetric Encryption
2. Symmetric Encryption
7:39
Play Video: ASymmetric Encryption
3. ASymmetric Encryption
7:29
Play Video: Cryptography Key Concepts
4. Cryptography Key Concepts
6:41
Play Video: PKI
5. PKI
8:03
Play Video: Certificates
6. Certificates
5:54
Play Video: Certificate Pinning
7. Certificate Pinning
5:24
Play Video: SSL & MTLS
8. SSL & MTLS
4:59
Play Video: Digital Signature
9. Digital Signature
3:50
Play Video: Hashing and Integrity
10. Hashing and Integrity
9:42
Play Video: Cryptographic Applications
11. Cryptographic Applications
5:31
Name of Video Time
Play Video: Data Lifecycle
1. Data Lifecycle
3:39
Play Video: Data Disposal
2. Data Disposal
4:32
Play Video: Data Classification
3. Data Classification
12:06
Play Video: Data Governance
4. Data Governance
6:34
Play Video: Privacy and Data Protection
5. Privacy and Data Protection
10:55
Play Video: Privacy Controls and Documentation
6. Privacy Controls and Documentation
10:52
Play Video: Cloud Computing and Data Dispersion
7. Cloud Computing and Data Dispersion
5:05
Play Video: Measures for Data Protection
8. Measures for Data Protection
6:41
Play Video: Data Classification and Protection Policies
9. Data Classification and Protection Policies
8:14
Name of Video Time
Play Video: Incident Management
1. Incident Management
9:09
Play Video: Building Incident Response Plan
2. Building Incident Response Plan
13:52
Play Video: Digital Forsensics
3. Digital Forsensics
7:44
Play Video: Business Continuity Planning
4. Business Continuity Planning
11:15
Play Video: RTO & RPO and Recovery Metrics
5. RTO & RPO and Recovery Metrics
10:46
Play Video: Recovery Sites
6. Recovery Sites
10:54
Play Video: BCP Policy
7. BCP Policy
8:51

CompTIA CAS-005 Exam Dumps, Practice Test Questions

100% Latest & Updated CompTIA CAS-005 Practice Test Questions, Exam Dumps & Verified Answers!
30 Days Free Updates, Instant Download!

CompTIA CAS-005 Premium Bundle
$79.97
$59.98

CAS-005 Premium Bundle

  • Premium File: 475 Questions & Answers. Last update: Apr 27, 2026
  • Training Course: 180 Video Lectures
  • Study Guide: 903 Pages
  • Latest Questions
  • 100% Accurate Answers
  • Fast Exam Updates

CAS-005 Premium Bundle

CompTIA CAS-005 Premium Bundle
  • Premium File: 475 Questions & Answers. Last update: Apr 27, 2026
  • Training Course: 180 Video Lectures
  • Study Guide: 903 Pages
  • Latest Questions
  • 100% Accurate Answers
  • Fast Exam Updates
$79.97
$59.98

CompTIA CAS-005 Training Course

Want verified and proven knowledge for CompTIA SecurityX? Believe it's easy when you have ExamSnap's CompTIA SecurityX certification video training course by your side which along with our CompTIA CAS-005 Exam Dumps & Practice Test questions provide a complete solution to pass your exam Read More.

Prepared by Top Experts, the top IT Trainers ensure that when it comes to your IT exam prep and you can count on ExamSnap CompTIA SecurityX certification video training course that goes in line with the corresponding CompTIA CAS-005 exam dumps, study guide, and practice test questions & answers.

Only Registered Members can View Training Courses

Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.

  • Trusted by 1.2M IT Certification Candidates Every Month
  • Hundreds Hours of Videos
  • Instant download After Registration

Already Member? Click here to Login

A confirmation link will be sent to this email address to verify your login

UP

SPECIAL OFFER: GET 10% OFF

This is ONE TIME OFFER

ExamSnap Discount Offer
Enter Your Email Address to Receive Your 10% Off Discount Code

A confirmation link will be sent to this email address to verify your login. *We value your privacy. We will not rent or sell your email address.

Download Free Demo of VCE Exam Simulator

Experience Avanset VCE Exam Simulator for yourself.

Simply submit your e-mail address below to get started with our interactive software demo of your free trial.

Free Demo Limits: In the demo version you will be able to access only first 5 questions from exam.