CASP CompTIA Advanced Security Practitioner Study Guide
Home > Computing and Information Technology > Computer certification > Computer certification: CompTIA > CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)
CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)

|
     0     
5
4
3
2
1




Out of Stock


Notify me when this book is in stock
About the Book

Get Prepared for CompTIA Advanced Security Practitioner (CASP) Exam Targeting security professionals who either have their CompTIA Security+ certification or are looking to achieve a more advanced security certification, this CompTIA Authorized study guide is focused on the new CompTIA Advanced Security Practitioner (CASP) Exam CAS-001. Veteran IT security expert and author Michael Gregg details the technical knowledge and skills you need to conceptualize, design, and engineer secure solutions across complex enterprise environments. He prepares you for aspects of the certification test that assess how well you apply critical thinking and judgment across a broad spectrum of security disciplines. Featuring clear and concise information on crucial security topics, this study guide includes examples and insights drawn from real-world experience to help you not only prepare for the exam, but also your career. You will get complete coverage of exam objectives for all topic areas including: Securing Enterprise-level Infrastructures Conducting Risk Management Assessment Implementing Security Policies and Procedures Researching and Analyzing Industry Trends Integrating Computing, Communications and Business Disciplines Additionally, you can download a suite of study tools to help you prepare including an assessment test, two practice exams, electronic flashcards, and a glossary of key terms. Go to www.sybex.com/go/casp and download the full set of electronic test prep tools.

Table of Contents:
Foreword xxi Introduction xxvii Assessment Test xliv Chapter 1 Cryptographic Tools and Techniques 1 The History of Cryptography 2 Cryptographic Services 3 Cryptographic Goals 3 Cryptographic Terms 4 Cipher Types and Methods 6 Symmetric Encryption 8 Data Encryption Standard 10 Triple-DES 11 Advanced Encryption Standard 12 International Data Encryption Algorithm 12 Rivest Cipher Algorithms 13 Asymmetric Encryption 13 Diffie-Hellman 14 RSA 15 Elliptic Curve Cryptography 16 El Gamal 16 Merkle-Hellman Knapsack 16 Hybrid Encryption 16 Hashing 17 Hashing and Message Digests 17 MD Series 19 SHA 19 HAVAL 19 Message Authentication Code 20 HMAC 20 Digital Signatures 20 Public Key Infrastructure 22 Certificate Authority 22 Registration Authority 23 Certificate Revocation List 23 Digital Certificates 24 Certificate Distribution 26 The Client's Role in PKI 26 Cryptographic Solutions 27 Application Layer Encryption 27 Transport Layer Encryption 28 Internet Layer Controls 28 Physical Layer Controls 29 Cryptographic Attacks 30 Summary 31 Exam Essentials 31 Review Questions 33 Chapter 2 Comprehensive Security Solutions 37 Advanced Network Design 39 Remote Access 40 Placement of Security Devices 41 SCADA 44 VoIP 45 TCP/IP 47 Network Interface Layer 48 Internet Layer 50 Transport Layer 55 Application Layer 57 Secure Communication Solutions 60 Secure Facility Solutions 66 Building Layouts 66 Facilities Management 67 Secure Network Infrastructure Design 67 Router Configuration 68 Enterprise Service Bus 69 Web Services Security 70 Summary 70 Exam Essentials 71 Review Questions 73 Chapter 3 Securing Virtualized, Distributed, and Shared Computing 77 Enterprise Security 79 Cloud Computing 81 Cloud Computing Models 82 Cloud Computing Providers 83 Benefits of Cloud Computing 83 Security of Cloud Computing 86 Cloud Computing Vulnerabilities 90 Virtualization 92 Virtualized Servers 93 Virtual LANs 97 Enterprise Storage 98 Summary 103 Exam Essentials 103 Review Questions 105 Chapter 4 Host Security 109 Firewalls and Access Control Lists 110 Host-Based Firewalls 114 Trusted Operating System 117 Endpoint Security Software 121 Anti-malware 124 Antivirus 124 Anti-spyware 126 Spam Filters 128 Host Hardening 129 Asset Management 133 Data Exfiltration 134 Intrusion Detection and Prevention 135 Summary 139 Exam Essentials 139 Review Questions 141 Chapter 5 Application Security and Penetration Testing 145 Application Security 147 Specific Application Issues 149 Cross-Site Scripting 150 Clickjacking 151 Session Management 151 Input Validation 152 SQL Injection 153 Application Sandboxing 154 Application Security Framework 154 Standard Libraries 155 Secure Coding Standards 156 Application Exploits 157 Escalation of Privilege 158 Improper Storage of Sensitive Data 159 Cookie Storage and Transmission 159 Process Handling at the Client and Server 160 Ajax 161 JavaScript 161 Buffer Overflow 162 Memory Leaks 163 Integer Overflow 163 Race Conditions (TOC/TOU) 163 Resource Exhaustion 164 Security Assessments and Penetration Testing 165 Test Methods 166 Penetration Testing Steps 166 Assessment Types 167 Assessment Areas 168 Security Assessment and Penetration Test Tools 170 Summary 182 Exam Essentials 182 Review Questions 184 Chapter 6 Risk Management 189 Risk Terminology 191 Identifying Vulnerabilities 192 Operational Risks 195 Risk in Business Models 195 Risk in External and Internal Influences 201 Risks with Data 204 The Risk Assessment Process 210 Asset Identification 210 Information Classification 212 Risk Assessment 213 Risk Analysis Options 217 Implementing Controls 218 Continuous Monitoring 219 Enterprise Security Architecture Frameworks 220 Best Practices for Risk Assessments 220 Summary 221 Exam Essentials 222 Review Questions 224 Chapter 7 Policies, Procedures, and Incident Response 229 A High-Level View of Documentation 231 The Policy Development Process 232 Policies and Procedures 233 Business Documents Used to Support Security 237 Documents and Controls Used for Sensitive Information 239 Why Security? 240 Personally Identifiable Information Controls 240 Data Breach 242 Policies Used to Manage Employees 243 Auditing Requirements and Frequency 247 The Incident Response Framework 248 Digital Forensics 250 The Role of Training and Employee Awareness 254 Summary 255 Exam Essentials 256 Review Questions 258 Chapter 8 Security Research and Analysis 263 Analyzing Industry Trends and Outlining Potential Impact 266 Performing Ongoing Research 266 Best Practices 270 New Technologies 273 Situational Awareness 281 Research Security Implications of New Business Tools 290 Global IA Industry Community 293 Research Security Requirements for Contracts 296 Carrying Out Relevant Analysis to Secure the Enterprise 298 Benchmarking 298 Prototyping and Testing Multiple Solutions 298 Cost-Benefit Analysis 299 Analyzing and Interpreting Trend Data to Anticipate Cyber Defense Aids 299 Reviewing Effectiveness of Existing Security 299 Reverse Engineering or Deconstructing Existing Solutions 301 Analyzing Security Solutions to Ensure They Meet Business Needs 301 Conducting a Lessons Learned/After-Action Review 302 Using Judgment to Solve Difficult Problems 303 Conducting Network Traffic Analysis 303 Summary 304 Exam Essentials 305 Review Questions 306 Chapter 9 Enterprise Security Integration 311 Integrate Enterprise Disciplines to Achieve Secure Solutions 313 The Role of Governance in Achieving Enterprise Security 315 Interpreting Security Requirements and Goals to Communicate with Other Disciplines 317 Guidance to Management 320 Establish Effective Collaboration within Teams to Implement Secure Solutions 322 Disciplines 325 Explain the Security Impact of Interorganizational Change 328 Security Concerns of Interconnecting Multiple Industries 330 Design Considerations During Mergers, Acquisitions, and De-mergers 331 Assuring Third-Party Products Only Introduce Acceptable Risk 332 Network Secure Segmentation and Delegation 334 Integration of Products and Services 336 Summary 337 Exam Essentials 338 Review Questions 339 Chapter 10 Security Controls for Communication and Collaboration 343 Selecting and Distinguishing the Appropriate Security Controls 345 Unified Communication Security 345 VoIP Security 354 VoIP Implementation 356 Remote Access 357 Enterprise Configuration Management of Mobile Devices 358 Secure External Communications 359 Secure Implementation of Collaboration Platforms 360 Prioritizing Traffic with QoS 362 Mobile Devices 363 Advanced Authentication Tools, Techniques, and Concepts 365 Federated Identity Management 365 XACML 366 SOAP 366 SSO 367 Service Provisioning Markup Language 368 Certificate-Based Authentication 369 Carrying Out Security Activities across the Technology Life Cycle 370 End-to-End Solution Ownership 370 Understanding the Results of Solutions in Advance 371 Systems Development Life Cycle 373 Addressing Emerging Threats and Security Trends 375 Validating System Designs 376 Summary 378 Exam Essentials 378 Review Questions 380 Appendix A CASP Lab Manual 385 What You'll Need 386 Lab A1: Download, Verify, and Install a Virtual Environment 389 Lab A2: Explore Your Virtual Network 392 Lab A3: Port Scanning 396 Lab A4: Introduction to a Protocol Analyzer 400 Lab A5: Web Vulnerabilities 406 Lab A6: Introduction to the Nessus Vulnerability Scanner 408 Lab A7: Verify a Baseline Security Configuration 411 Lab A8: Basic Introduction to Windows Forensic Tools 413 Lab A9: Introduction to Helix 421 Lab A10: Introduction to Hashing 425 Lab A11: File Encryption 428 Lab A12: Cracking Encrypted Files 429 Lab A13: Intrusion Detection 431 Lab A14: An Introduction to Signature-Based Scanning 433 Lab A15: Rootkit Detection 437 Lab A16: Threat Modeling 440 Lab A17: Introduction to the Metasploit Framework 442 Lab A18: Social Engineering 445 Lab A19: Routing, Switching, and Security 449 Lab A20: Further Exploration 460 Appendix B Answers to Review Questions 463 Chapter 1: Cryptographic Tools and Techniques 464 Chapter 2: Comprehensive Security Solutions 465 Chapter 3: Securing Virtualized, Distributed, and Shared Computing 466 Chapter 4: Host Security 467 Chapter 5: Application Security and Penetration Testing 468 Chapter 6: Risk Management 469 Chapter 7: Policies, Procedures, and Incident Response 471 Chapter 8: Security Research and Analysis 472 Chapter 9: Enterprise Security Integration 473 Chapter 10: Security Controls for Communication and Collaboration 474 Appendix C About the Additional Study Tools 475 Additional Study Tools 476 Sybex Test Engine 476 Electronic Flashcards 476 PDF of Glossary of Terms 476 Adobe Reader 476 System Requirements 477 Using the Study Tools 477 Troubleshooting 477 Customer Care 478 Index 479


Best Sellers


Product Details
  • ISBN-13: 9781118083192
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: John Wiley & Sons Inc
  • Height: 230 mm
  • Returnable: N
  • Sub Title: (Exam CAS-001)
  • Width: 188 mm
  • ISBN-10: 1118083199
  • Publisher Date: 28 Feb 2012
  • Binding: Paperback
  • Language: English
  • Spine Width: 31 mm
  • Weight: 820 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)
John Wiley & Sons Inc -
CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!