Curriculum
- 4 Sections
- 57 Lessons
- 365 Days
Expand all sectionsCollapse all sections
- Domain 1 - Security Architecture17
- 1.1Analyze the security requirements and objectives to provide the appropriate authentication and authorization controls – Part 127 Minutes
- 1.2Analyze the security requirements and objectives to provide the appropriate authentication and authorization controls – Part 262 Minutes
- 1.3Explain the impact of emerging technologies on enterprise security and privacy.51 Minutes
- 1.4Analyze the security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network – Part 343 Minutes
- 1.5Analyze the security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network – Part 426 Minutes
- 1.6Analyze the security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network – Part 537 Minutes
- 1.7CASP+ 004 Introductions35 Minutes
- 1.8Analyze the security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network – Part 628 Minutes
- 1.9Analyze the organizational requirements to determine the proper infrastructure security design.41 Minutes
- 1.10Analyze the security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network – Part 174 Minutes
- 1.11Analyze the security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network – Part 223 Minutes
- 1.12Integrate software applications securely into an enterprise architecture – Part 155 Minutes
- 1.13Integrate software applications securely into an enterprise architecture – Part 271 Minutes
- 1.14Implement data security techniques for securing enterprise architecture.60 Minutes
- 1.15Given a set of requirements, implement secure cloud and virtualization solutions – Part 151 Minutes
- 1.16Given a set of requirements, implement secure cloud and virtualization solutions -Part 224 Minutes
- 1.17Explain how cryptography and public key infrastructure (PKI) support security objectives and requirements40 Minutes
- Domain 2 - Security Operations15
- 2.1Given a scenario, perform threat management activities.71 Minutes
- 2.2Given a scenario, use processes to reduce risk.48 Minutes
- 2.3Explain the importance of forensic concepts.41 Minutes
- 2.4Given a scenario, use forensic analysis tools – Part 136 Minutes
- 2.5Given a scenario, analyze indicators of compromise and formulate an appropriate response.60 Minutes
- 2.6Given a scenario, perform vulnerability management activities.42 Minutes
- 2.7Given a scenario, use the appropriate vulnerability assessment and penetration testing methods and tools.60 Minutes
- 2.8Given a scenario, analyze vulnerabilities and recommend risk mitigations – Part 155 Minutes
- 2.9Given a scenario, analyze vulnerabilities and recommend risk mitigations – Part 232 Minutes
- 2.10Given a scenario, analyze vulnerabilities and recommend risk mitigations – Part 344 Minutes
- 2.11Given a scenario, use forensic analysis tools – Part 221 Minutes
- 2.12Given an incident, implement the appropriate response – Part 131 Minutes
- 2.13Given an incident, implement the appropriate response – Part 211 Minutes
- 2.14Given a scenario, use forensic analysis tools – Part 3
- 2.15Given a scenario, use forensic analysis tools – Part 4
- Domain 3 - Security Engineering and Cryptography16
- 3.1Given a scenario, apply secure configurations to enterprise mobility – Part 145 Minutes
- 3.2Given a scenario, configure and implement endpoint security controls – Part 131 Minutes
- 3.3Given a scenario, apply secure configurations to enterprise mobility – Part 216 Minutes
- 3.4Given a scenario, apply secure configurations to enterprise mobility – Part 334 Minutes
- 3.5Given a scenario, configure and implement endpoint security controls – Part 233 Minutes
- 3.6Given a scenario, configure and implement endpoint security controls – Part 331 Minutes
- 3.7Given a scenario, configure and implement endpoint security controls – Part 415 Minutes
- 3.8Explain security considerations impacting specific sectors and operational technologies – Part 116 Minutes
- 3.9Explain security considerations impacting specific sectors and operational technologies – Part 228 Minutes
- 3.10Explain security considerations impacting specific sectors and operational technologies – Part 346 Minutes
- 3.11Explain how cloud technology adoption impacts organizational security – Part 141 Minutes
- 3.12Explain how cloud technology adoption impacts organizational security – Part 214 Minutes
- 3.13Given a business requirement, implement the appropriate PKI solution – Part 148 Minutes
- 3.14Given a business requirement, implement the appropriate PKI solution – Part 217 Minutes
- 3.15Given a scenario, troubleshoot issues with cryptographic implementations36 Minutes
- 3.16Given a business requirement, implement the appropriate cryptographic protocols and algorithms64 Minutes
- Domain 4 - Governance, Risk, and Compliance9
- 4.1Given a set of requirements, apply the appropriate risk strategies – Part 153 Minutes
- 4.2Given a set of requirements, apply the appropriate risk strategies – Part 220 Minutes
- 4.3Given a set of requirements, apply the appropriate risk strategies – Part 349 Minutes
- 4.4Given a set of requirements, apply the appropriate risk strategies – Part 422 Minutes
- 4.5Explain the importance of managing and mitigating vendor risk41 Minutes
- 4.6Explain compliance frameworks and legal considerations, and their organizational impact – Part 138 Minutes
- 4.7Explain compliance frameworks and legal considerations, and their organizational impact – Part 261 Minutes
- 4.8Explain the importance of business continuity and disaster recovery concepts – Part 156 Minutes
- 4.9Explain the importance of business continuity and disaster recovery concepts – Part 248 Minutes
Explain the importance of business continuity and disaster recovery concepts – Part 1
Prev