PDFs and exam guides are not so efficient, right? Prepare for your CompTIA examination with our training course. The CAS-005 course contains a complete batch of videos that will provide you with profound and thorough knowledge related to CompTIA certification exam. Pass the CompTIA CAS-005 test with flying colors.
Curriculum for CAS-005 Certification Video Course
| Name of Video | Time |
|---|---|
![]() 1. Introduction to CASP+ (CAS-005) / SecurityX Training |
4:52 |
| Name of Video | Time |
|---|---|
![]() 1. Understand the CIA Triad and Security Objective |
7:15 |
![]() 2. Security Terminologies |
8:41 |
![]() 3. Security Vulnerabilities |
5:09 |
![]() 4. Vulnerability Key Terms |
4:44 |
![]() 5. Cyber Attack Process |
5:34 |
![]() 6. Adversaries and Threat Actors |
4:51 |
![]() 7. APTs |
8:00 |
![]() 8. Threat Intel & CERT |
5:52 |
![]() 9. Understanding Attack Surface |
8:01 |
![]() 10. Understand Malware |
11:26 |
![]() 11. DOS & DDOS |
9:00 |
![]() 12. In-Path Attacks |
9:20 |
![]() 13. Buffer overFlow Attack |
5:51 |
![]() 14. Race Condition |
7:47 |
![]() 15. Privilege Escalation |
6:36 |
![]() 16. Side Channel Attacks |
8:14 |
![]() 17. Mobile Threats |
6:13 |
| Name of Video | Time |
|---|---|
![]() 1. Governance and Management |
7:07 |
![]() 2. Security Program |
13:43 |
![]() 3. Security Senior Roles |
8:40 |
![]() 4. Security and Business Integration |
6:15 |
![]() 5. Information Security Governance |
7:04 |
![]() 6. Governance Frameworks |
11:17 |
![]() 7. GRC |
5:02 |
![]() 8. Information Security vs GRC |
3:57 |
![]() 9. Security Program Documentation |
3:42 |
| Name of Video | Time |
|---|---|
![]() 1. Security Controls Overview |
11:20 |
![]() 2. Compensating Controls and Control Objective |
7:16 |
![]() 3. Layered Defenses & Control References |
8:05 |
![]() 4. Control Review and Assessment |
5:42 |
![]() 5. SMART Metrics |
5:28 |
![]() 6. Understand the Enterprise Architecture |
6:09 |
![]() 7. The Process of Acquiring New Controls |
5:59 |
![]() 8. Project Management in Security Investments |
8:46 |
![]() 9. Business Case and Feasibility Analaysis |
4:38 |
![]() 10. Management Buy In to support the Security Investment |
4:41 |
| Name of Video | Time |
|---|---|
![]() 1. Risk Management Overview |
10:06 |
![]() 2. Risk Appetite & Tolerance and Capacity |
5:30 |
![]() 3. Risk Identification |
6:42 |
![]() 4. Digital Risk Protection Solutions |
8:24 |
![]() 5. Threat Modeling |
6:13 |
![]() 6. Use case & Abuse Case |
8:38 |
![]() 7. Risk Analysis |
8:46 |
![]() 8. Risk Evaluation and Risk Response |
12:36 |
![]() 9. Risk Reporting and Monitoring |
9:17 |
![]() 10. Risk Management Frameworks |
2:38 |
![]() 11. NIST SP800-30 |
8:38 |
![]() 12. NIST RMF |
5:52 |
| Name of Video | Time |
|---|---|
![]() 1. Understanding Networks |
11:34 |
![]() 2. OSI Model & TCP/IP Model |
9:56 |
![]() 3. OSI Layer 1 |
8:45 |
![]() 4. OSI Layer 2 |
7:28 |
![]() 5. OSI Layer 3 |
8:09 |
![]() 6. Network Addressing & ARP |
7:37 |
![]() 7. Layer 4-7 Deep Dive |
6:30 |
![]() 8. Network Security Best Practices |
8:59 |
| Name of Video | Time |
|---|---|
![]() 1. Zero Trust |
9:27 |
![]() 2. Key Security Design Concepts |
7:08 |
![]() 3. Deperimeterization & Security Boundaries [NEW] |
12:52 |
![]() 4. Abstraction as a Security Strategy |
6:46 |
![]() 5. Trusted Computing Base |
5:33 |
| Name of Video | Time |
|---|---|
![]() 1. Understand Segmentation & VLANs |
9:14 |
![]() 2. Understand NAC & Dot1X |
14:02 |
![]() 3. Firewalls |
8:28 |
![]() 4. DMZ |
7:08 |
![]() 5. IDS & IPS |
8:12 |
![]() 6. Network Access Policies and BYOD |
6:58 |
![]() 7. Content Filtering |
8:58 |
![]() 8. VPN, SSL vpn & IPSEC & Split Tunnel |
15:08 |
![]() 9. Internet, Email Security Policies |
7:01 |
![]() 10. Securing Network Management Best Practices and Policies |
7:24 |
![]() 11. Wireless Security |
12:42 |
![]() 12. Wired Security |
12:15 |
![]() 13. Converged Networks - VOIP & QOS & POE |
6:34 |
![]() 14. ICS & OT |
9:55 |
![]() 15. ICS & OT Security |
7:50 |
![]() 16. DNS |
12:35 |
![]() 17. Sandbox |
3:48 |
![]() 18. WAF - Web Application Firewall |
5:16 |
![]() 19. Load Balancer |
5:19 |
![]() 20. API & API Security |
8:02 |
![]() 21. API OWASP 10 Security |
18:24 |
![]() 22. FIM |
7:07 |
![]() 23. SPAN & RSPAN & Network TAPs |
9:51 |
| Name of Video | Time |
|---|---|
![]() 1. Understand the Role of IAM |
8:40 |
![]() 2. AAA |
13:42 |
![]() 3. Biometric Authentication |
8:51 |
![]() 4. SSO & RSO |
7:36 |
![]() 5. Key Access Control Concepts |
5:12 |
![]() 6. Authorization |
7:40 |
![]() 7. Accounting |
8:20 |
![]() 8. Log Management |
9:40 |
![]() 9. Log Management Best Practices |
6:59 |
![]() 10. Password & Authentication Attacks |
11:05 |
![]() 11. LDAP |
13:38 |
| Name of Video | Time |
|---|---|
![]() 1. Cloud Overview |
8:24 |
![]() 2. Cloud deployment Models |
5:41 |
![]() 3. Cloud Shared Responsibility Matrix |
6:50 |
![]() 4. Cloud Contracts and SLA |
8:20 |
![]() 5. Cloud Availability |
6:39 |
![]() 6. Cloud Related Threats |
8:15 |
![]() 7. Virtualization |
4:49 |
![]() 8. Containers |
7:31 |
![]() 9. SDN |
7:53 |
![]() 10. Storage Solutions |
8:52 |
![]() 11. Storage Redundancy Solutions |
8:57 |
![]() 12. Backup and Restore |
10:40 |
![]() 13. Server, Application Security Policies |
6:47 |
![]() 14. Cloud Related Policies |
7:27 |
![]() 15. CSA STAR |
9:14 |
![]() 16. Secrets Management |
6:15 |
| Name of Video | Time |
|---|---|
![]() 1. Endpoint Security Software |
12:21 |
![]() 2. Endpoint Security Best Practices |
6:24 |
![]() 3. Antimalware Measures |
4:32 |
![]() 4. DLP Overview |
7:31 |
![]() 5. IRM - Information Right Management |
8:07 |
![]() 6. Using IRM Effectively |
8:03 |
![]() 7. Asset Management |
6:45 |
![]() 8. Patch Management Program |
4:48 |
![]() 9. Configuration Management and Baselines |
7:10 |
| Name of Video | Time |
|---|---|
![]() 1. What is the Software? |
12:02 |
![]() 2. Software Development Lifecycle |
7:29 |
![]() 3. OWASP Top 10 for Web Application |
9:25 |
![]() 4. CWE - Common Weakness Enumeration |
3:32 |
![]() 5. Application Threats in Memory Concurrency and_Resource Management [NEW] |
13:45 |
![]() 6. DevOPS |
6:31 |
![]() 7. DevSECOPS |
7:05 |
![]() 8. Secure Coding Practices |
8:39 |
![]() 9. Protecting the Source Code |
8:39 |
![]() 10. Application Sandboxing and Runtime Defense Mechanisms [NEW] |
12:04 |
![]() 11. Security Requirements Traceability Matrix (SRTM) |
8:38 |
![]() 12. Software Release Management |
10:33 |
![]() 13. Software Maintenance |
6:08 |
![]() 14. Software Testing |
9:12 |
![]() 15. Writing Secure Code |
8:39 |
![]() 16. Application Security Frameworks Software Assurance and Library Hygiene [NEW] |
12:26 |
![]() 17. Data Handling and Context Aware Application Security Controls [NEW] |
18:12 |
![]() 18. Penetration Testing Overview |
9:59 |
![]() 19. Penetration Testing in Action - Tools and Techniques for Recon/Scanning [NEW] |
13:54 |
![]() 20. Penetration Testing In Action - Tools and Techniques for HOST/APP Testing [NEW] |
15:44 |
![]() 21. Bug Bounty Programs & Bug Hunting |
5:17 |
| Name of Video | Time |
|---|---|
![]() 1. Understand the Policy Document |
04:40 |
![]() 2. Policy Document Attributes and Review of Policy Document |
6:41 |
![]() 3. Standards and Baseline |
4:13 |
![]() 4. Procedures and Guidelines |
4:18 |
![]() 5. HR Security |
11:05 |
![]() 6. HR Policy |
5:23 |
![]() 7. Understand Social Engineering Attacks |
24:47 |
![]() 8. Security Awareness Training |
7:31 |
![]() 9. Auditing and Reviewing Systems |
9:23 |
![]() 10. Outsourcing Security Requirements |
13:58 |
![]() 11. Supply Chain Risk management |
9:42 |
| Name of Video | Time |
|---|---|
![]() 1. Introduction to Cryptography |
8:26 |
![]() 2. Symmetric Encryption |
7:39 |
![]() 3. ASymmetric Encryption |
7:29 |
![]() 4. Cryptography Key Concepts |
6:41 |
![]() 5. PKI |
8:03 |
![]() 6. Certificates |
5:54 |
![]() 7. Certificate Pinning |
5:24 |
![]() 8. SSL & MTLS |
4:59 |
![]() 9. Digital Signature |
3:50 |
![]() 10. Hashing and Integrity |
9:42 |
![]() 11. Cryptographic Applications |
5:31 |
| Name of Video | Time |
|---|---|
![]() 1. Data Lifecycle |
3:39 |
![]() 2. Data Disposal |
4:32 |
![]() 3. Data Classification |
12:06 |
![]() 4. Data Governance |
6:34 |
![]() 5. Privacy and Data Protection |
10:55 |
![]() 6. Privacy Controls and Documentation |
10:52 |
![]() 7. Cloud Computing and Data Dispersion |
5:05 |
![]() 8. Measures for Data Protection |
6:41 |
![]() 9. Data Classification and Protection Policies |
8:14 |
| Name of Video | Time |
|---|---|
![]() 1. Incident Management |
9:09 |
![]() 2. Building Incident Response Plan |
13:52 |
![]() 3. Digital Forsensics |
7:44 |
![]() 4. Business Continuity Planning |
11:15 |
![]() 5. RTO & RPO and Recovery Metrics |
10:46 |
![]() 6. Recovery Sites |
10:54 |
![]() 7. BCP Policy |
8:51 |
100% Latest & Updated CompTIA CAS-005 Practice Test Questions, Exam Dumps & Verified Answers!
30 Days Free Updates, Instant Download!
CAS-005 Premium Bundle

CompTIA CAS-005 Training Course
Want verified and proven knowledge for CompTIA SecurityX? Believe it's easy when you have ExamSnap's CompTIA SecurityX certification video training course by your side which along with our CompTIA CAS-005 Exam Dumps & Practice Test questions provide a complete solution to pass your exam Read More.
Prepared by Top Experts, the top IT Trainers ensure that when it comes to your IT exam prep and you can count on ExamSnap CompTIA SecurityX certification video training course that goes in line with the corresponding CompTIA CAS-005 exam dumps, study guide, and practice test questions & answers.
Purchase Individually



CompTIA Training Courses


















Only Registered Members can View Training Courses
Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.

SPECIAL OFFER: GET 10% OFF
This is ONE TIME OFFER

A confirmation link will be sent to this email address to verify your login. *We value your privacy. We will not rent or sell your email address.
Download Free Demo of VCE Exam Simulator
Experience Avanset VCE Exam Simulator for yourself.
Simply submit your e-mail address below to get started with our interactive software demo of your free trial.