CompTIA CASP+ CAS-004 Certification Guide: Develop CASP+ skills and learn all the key topics needed to prepare for the certification examMaster architecting and implementing advanced security strategies across complex enterprise networks with this hands-on guide Key Features
This CompTIA book is for CASP+ CAS-004 exam candidates who want to achieve CASP+ certification to advance their career. Security architects, senior security engineers, SOC managers, security analysts, IT cybersecurity specialists/INFOSEC specialists, and cyber risk analysts will benefit from this book. Experience in an IT technical role or CompTIA Security+ certification or equivalent is assumed. |
Contents
| 1 | |
| 3 | |
| 57 | |
Enterprise Data Security Including Secure Cloud and Virtualization Solutions | 97 |
Deploying Enterprise Authentication and Authorization Controls | 147 |
Security Operations | 179 |
Threat and Vulnerability Management | 181 |
Vulnerability Assessment and Penetration Testing Methods and Tools | 217 |
Security Considerations Impacting Specific Sectors and Operational Technologies | 379 |
Implementing Cryptographic Protocols and Algorithms | 401 |
Implementing Appropriate PKI Solutions Cryptographic Protocols and Algorithms for Business Needs | 433 |
Governance Risk and Compliance | 459 |
Applying Appropriate Risk Strategies | 461 |
Compliance Frameworks Legal Considerations and Their Organizational Impact | 491 |
Business Continuity and Disaster Recovery Concepts | 517 |
Mock Exam 1 | 543 |
Other editions - View all
CompTIA CASP+ CAS-004 Certification Guide: Develop CASP+ Skills and Learn ... Mark Birch No preview available - 2022 |
Common terms and phrases
access control alerts algorithms allows analysis application server assessment attacks authentication automation block block cipher browser certificate Chapter cipher client cloud providers configuration cybersecurity data center database deployed desktop detection document encryption Endpoint ensure enterprise environment example Figure firewall following link forensic functions hardware hash host hypervisor identify impact Implementing important incident response industrial information systems infrastructure integrity Internet IPSec LDAP Linux logs malware Microsoft Microsoft Windows mitigate mobile devices Modbus monitoring NetFlow NIST operating systems organization OWASP password PCI DSS perform policies port private key protect Protocol public key ransomware Recovery Recovery point objective remote requirements risk routers SCADA scan security professionals SELinux solution standard storage stored tcpdump testing threat actors traffic understand updates vendor vulnerabilities web application Windows Wireshark workloads Zigbee


