CompTIA Advanced Security Practitioner (CASP) CAS-003 Cert Guide
Home > Computing and Information Technology > Computer certification > CompTIA Advanced Security Practitioner (CASP) CAS-003 Cert Guide: (Certification Guide)
CompTIA Advanced Security Practitioner (CASP) CAS-003 Cert Guide: (Certification Guide)

CompTIA Advanced Security Practitioner (CASP) CAS-003 Cert Guide: (Certification Guide)


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

This is the eBook version of the print title. Note that the eBook may not provide access to the practice test software that accompanies the print book. Learn, prepare, and practice for CompTIA Advanced Security Practitioner (CASP) CAS-003 exam success with this CompTIA Approved Cert Guide from Pearson IT Certification, a leader in IT Certification learning and a CompTIA Authorized Platinum Partner. Master CompTIA Advanced Security Practitioner (CASP) CAS-003 exam topics Assess your knowledge with chapter-ending quizzes Review key concepts with exam preparation tasks CompTIA Advanced Security Practitioner (CASP) CAS-003 Cert Guide is a best-of-breed exam study guide. Leading security certification training experts Robin Abernathy and Troy McMillan share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. The book presents you with an organized test preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your final study plan. Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this CompTIA approved study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time, including: Enterprise security Risk management and incident response Research, analysis, and assessment Integration of computing, communications, and business disciplines Technical integration of enterprise components

Table of Contents:
Introduction The CASP Exam 2     The Goals of the CASP Certification 3     The Value of the CASP Certification 5     CASP Exam Objectives 7     Steps to Becoming a CASP 35     CompTIA Authorized Materials Use Policy 35 Chapter 1 Business and Industry Influences and Associated Security Risks 38     Risk Management of New Products, New Technologies, and User Behaviors 39     New or Changing Business Models/Strategies 40     Security Concerns of Integrating Diverse Industries 44     Internal and External Influences 52     Impact of De-perimeterization (e.g., Constantly Changing Network Boundary) 54     Exam Preparation Tasks 60     Review All Key Topics 60     Define Key Terms 60     Review Questions 61 Chapter 2 Security, Privacy Policies, and Procedures 64     Policy and Process Life Cycle Management 65     Support Legal Compliance and Advocacy 70     Common Business Documents to Support Security 71     Security Requirements for Contracts 75     General Privacy Principles for Sensitive Information 77     Support the Development of Policies Containing Standard Security Practices 78     Exam Preparation Tasks 91     Review All Key Topics 91     Define Key Terms 92     Review Questions 92 Chapter 3 Risk Mitigation Strategies and Controls 96     Categorize Data Types by Impact Levels Based on CIA 98     Incorporate Stakeholder Input into CIA Impact-Level Decisions 100     Determine the Aggregate CIA Score 101     Determine Minimum Required Security Controls Based on Aggregate Score 102     Select and Implement Controls Based on CIA Requirements and Organizational Policies 102     Extreme Scenario Planning/Worst-Case Scenario 123     Conduct System-Specific Risk Analysis 125     Make Risk Determination Based upon Known Metrics 126     Translate Technical Risks in Business Terms 134     Recommend Which Strategy Should Be Applied Based on Risk Appetite 135     Risk Management Processes 137     Continuous Improvement/Monitoring 141     Business Continuity Planning 141     IT Governance 148     Enterprise Resilience 168     Exam Preparation Tasks 170     Review All Key Topics 170     Define Key Terms 171     Review Questions 171 Chapter 4 Risk Metric Scenarios to Secure the Enterprise 174     Review Effectiveness of Existing Security Controls 175     Reverse Engineer/Deconstruct Existing Solutions 177     Creation, Collection, and Analysis of Metrics 177     Prototype and Test Multiple Solutions 180     Create Benchmarks and Compare to Baselines 181     Analyze and Interpret Trend Data to Anticipate Cyber Defense Needs 182     Analyze Security Solution Metrics and Attributes to Ensure They Meet Business Needs 183     Use Judgment to Solve Problems Where the Most Secure Solution Is Not Feasible 187     Exam Preparation Tasks 187     Review All Key Topics 187     Define Key Terms 188     Review Questions 189 Chapter 5 Network and Security Components, Concepts, and Architectures 192     Physical and Virtual Network and Security Devices 194     Application and Protocol-Aware Technologies 212     Advanced Network Design (Wired/Wireless) 215     Complex Network Security Solutions for Data Flow 241     Secure Configuration and Baselining of Networking and Security Components 246     Software-Defined Networking 254     Network Management and Monitoring Tools 255     Advanced Configuration of Routers, Switches, and Other Network Devices 260     Security Zones 268     Network Access Control 269     Network-Enabled Devices 271     Critical Infrastructure 279     Exam Preparation Tasks 280     Review All Key Topics 280     Define Key Terms 282     Review Questions 282 Chapter 6 Security Controls for Host Devices 286     Trusted OS (e.g., How and When to Use It) 287     Endpoint Security Software 290     Host Hardening 298     Boot Loader Protections 316     Vulnerabilities Associated with Hardware 322     Terminal Services/Application Delivery Services 322     Exam Preparation Tasks 323     Review All Key Topics 323     Define Key Terms 324     Review Questions 324 Chapter 7 Security Controls for Mobile and Small Form Factor Devices 328     Enterprise Mobility Management 329     Security Implications/Privacy Concerns 336     Wearable Technology 345     Exam Preparation Tasks 350     Review All Key Topics 350     Define Key Terms 351     Review Questions 351 Chapter 8 Software Vulnerability Security Controls 354     Application Security Design Considerations 355     Specific Application Issues 356     Application Sandboxing 370     Secure Encrypted Enclaves 371     Database Activity Monitor 371     Web Application Firewalls 371     Client-Side Processing vs. Server-Side Processing 371     Operating System Vulnerabilities 377     Firmware Vulnerabilities 377     Exam Preparation Tasks 378     Review All Key Topics 378     Define Key Terms 378     Review Questions 379 Chapter 9 Security Assessments 382     Methods 383     Test Types 398     Exam Preparation Tasks 405     Review All Key Topics 405     Define Key Terms 406     Review Questions 407 Chapter 10 Select the Appropriate Security Assessment Tool 410     Network Tool Types 411     Host Tool Types 427     Physical Security Tools 441     Exam Preparation Tasks 444     Review All Key Topics 444     Define Key Terms 445     Review Questions 446 Chapter 11 Incident Response and Recovery 448     E-Discovery 449     Data Breach 454     Facilitate Incident Detection and Response 457     Incident and Emergency Response 461     Incident Response Support Tools 471     Severity of Incident or Breach 478     Post-incident Response 480     Exam Preparation Tasks 481     Review All Key Topics 481     Define Key Terms 482     Review Questions 483 Chapter 12 Host, Storage, Network, and Application Integration 486     Adapt Data Flow Security to Meet Changing Business Needs 487     Standards 489     Interoperability Issues 491     Resilience Issues 494     Data Security Considerations 496     Resources Provisioning and Deprovisioning 500     Design Considerations During Mergers, Acquisitions and Demergers/Divestitures 501     Network Secure Segmentation and Delegation 502     Logical Deployment Diagram and Corresponding Physical Deployment Diagram of All Relevant Devices 502     Security and Privacy Considerations of Storage Integration 504     Security Implications of Integrating Enterprise Applications 504     Exam Preparation Tasks 507     Review All Key Topics 507     Define Key Terms 508     Review Questions 508 Chapter 13 Cloud and Virtualization Technology Integration 512     Technical Deployment Models (Outsourcing/Insourcing/Managed Services/Partnership) 513     Security Advantages and Disadvantages of Virtualization 518     Cloud Augmented Security Services 521     Vulnerabilities Associated with Comingling of Hosts with Different Security Requirements 527     Data Security Considerations 529     Resources Provisioning and Deprovisioning 531     Exam Preparation Tasks 532     Review All Key Topics 532     Define Key Terms 532     Review Questions 533 Chapter 14 Authentication and Authorization Technology Integration 536     Authentication 537     Authorization 550     Attestation 557     Identity Propagation 558     Federation 559     Trust Models 563     Exam Preparation Tasks 566     Review All Key Topics 566     Define Key Terms 567     Review Questions 567 Chapter 15 Cryptographic Techniques 570     Techniques 572     Implementations 592     Exam Preparation Tasks 611     Review All Key Topics 611     Define Key Terms 612     Review Questions 613 Chapter 16 Secure Communication and Collaboration 616     Remote Access 617     Unified Collaboration Tools 621     Exam Preparation Tasks 634     Review All Key Topics 634     Define Key Terms 635     Review Questions 635 Chapter 17 Industry Trends and Their Impact to the Enterprise 638     Perform Ongoing Research 639     Threat Intelligence 643     Research Security Implications of Emerging Business Tools 649     Global IA Industry/Community 653     Exam Preparation Tasks 660     Review All Key Topics 660     Define Key Terms 661     Review Questions 661 Chapter 18 Security Activities Across the Technology Life Cycle 664     Systems Development Life Cycle 665     Software Development Life Cycle 673     Adapt Solutions 706     Asset Management (Inventory Control) 709     Exam Preparation Tasks 711     Review All Key Topics 711     Define Key Terms 712     Review Questions 713 Chapter 19 Business Unit Interaction 716     Interpreting Security Requirements and Goals to Communicate with Stakeholders from Other Disciplines 717     Provide Objective Guidance and Impartial Recommendations to Staff and Senior Management on Security Processes and Controls 724     Establish Effective Collaboration Within Teams to Implement Secure Solutions 725     Governance, Risk, and Compliance Committee 726     Exam Preparation Tasks 727     Review All Key Topics 727     Define Key Terms 728     Review Questions 729 Appendix A Answers 732 Glossary 754 Online-only Elements: Appendix B Memory Tables Appendix C Memory Table Answers Appendix D Study Planner 9780789759443, TOC, 4/16/2018

About the Author :
Robin Abernathy, CASP, is a product developer and technical editor for Kaplan IT training. She has developed and reviewed certification preparation materials in a variety of product lines, including Microsoft, CompTIA, Cisco, ITIL, (ISC)2, and PMI, and holds multiple certifications from these vendors. Her work with Kaplan IT Training includes practice tests and study guides for the Transcender brands. Robin most recently co-authored Pearson’s CISSP Cert Guide with Troy McMillan and Sari Green and authored Pearson’s Project+ Cert Guide. She provides training on computer hardware, software, networking, security, and project management. Robin also presents at technical conferences and hosts webinars on IT certification topics. More recently, Robin has recorded videos for CyberVista’s IT certification training courses. Troy McMillan, CASP, is a product developer and technical editor for Kaplan IT Training as well as a full-time trainer. He became a professional trainer more than 15 years ago, teaching Cisco, Microsoft, CompTIA, and wireless classes. His recent work includes: Contributing subject matter expert for CCNA Cisco Certified Network Associate Certification Exam Preparation Guide (Kaplan) Prep test question writer for Network+ Study Guide (Sybex) Technical editor for Windows 7 Study Guide (Sybex) Contributing author for CCNA-Wireless Study Guide (Sybex) Technical editor for CCNA Study Guide, Revision 7 (Sybex) Author of VCP VMware Certified Professional on vSphere 4 Review Guide: Exam VCP-410 and associated instructional materials (Sybex) Author of Cisco Essentials (Sybex) Co-author of CISSP Cert Guide (Pearson) Prep test question writer for CCNA Wireless 640-722 (Cisco Press) He also has appeared in the following training videos for OnCourse Learning: Security+; Network+; Microsoft 70-410, 411, and 412 exam prep; ICND 1; ICND 2; and Cloud+. He now creates certification practice tests and study guides for the Transcender brands. Troy lives in both Sugarloaf Key, Florida, and Pfafftown, North Carolina, with his wife, Heike.


Best Sellers


Product Details
  • ISBN-13: 9780134858852
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Pearson IT Certification
  • Language: English
  • Series Title: Certification Guide
  • ISBN-10: 0134858859
  • Publisher Date: 11 May 2018
  • Binding: Digital download
  • No of Pages: 912


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
CompTIA Advanced Security Practitioner (CASP) CAS-003 Cert Guide: (Certification Guide)
Pearson Education (US) -
CompTIA Advanced Security Practitioner (CASP) CAS-003 Cert Guide: (Certification Guide)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

CompTIA Advanced Security Practitioner (CASP) CAS-003 Cert Guide: (Certification Guide)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!