CompTIA Advanced Security Practitioner (CASP) CAS-003 Cert Guide, 2nd edition

Published by Pearson IT Certification (May 11, 2018) © 2018

  • Robin Abernathy
  • Troy McMillan
Products list
  • Available for purchase from all major ebook resellers, including InformIT.com
Products list

Details

  • A print text
  • Free shipping
  • Also available for purchase as an ebook from all major ebook resellers, including InformIT.com

The book presents an organized test preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help students drill on key concepts they must know thoroughly. Review questions help them assess their knowledge, and a final preparation chapter guides them through tools and resources to help them craft your final study plan.

The companion website contains the powerful Pearson Test Prep practice test software, complete with hundreds of exam-realistic questions. The assessment engine offers a wealth of customization options and reporting features, laying out a complete assessment of your knowledge to help students focus their study where it is needed most. This online assessment engine enables you to access the practice tests via the Internet on any desktop, laptop, tablet, or smartphone device with internet connectivity. The web-based version also allows you to download the software to your desktop, so you can use the practice test even when you don't have an internet connection. The desktop version syncs with your online version when an internet connection is established, to update and track your progress. 

  • Part 1: Risk Management
  • Chapter 1: Business and Industry Influences and Associated Security Risks
  • Chapter 2: Security, Privacy Policies, and Procedures
  • Chapter 3: Risk Mitigation Strategies and Controls
  • Chapter 4: Risk Metric Scenarios to Secure the Enterprise
  • Part 2: Enterprise Security Architecture
  • Chapter 5: Network and Security Components, Concepts, and Architectures
  • Chapter 6: Security Controls for Host Devices
  • Chapter 7: Security Controls for Mobile and Small Form Factor Devices
  • Chapter 8: Software Vulnerability Security Controls
  • Part 3: Enterprise Security Operations
  • Chapter 9: Security Assessments
  • Chapter 10: Select the Appropriate Security Assessment Tool
  • Chapter 11: Incident Response and Recovery
  • Part 4: Technical Integration of Enterprise Security
  • Chapter 12: Host, Storage, Network, and Application Integration
  • Chapter 13: Cloud and Virtualization Technology Integration
  • Chapter 14: Authentication and Authorization Technology Integration
  • Chapter 15: Cryptographic Technologies
  • Chapter 16: Communications and Collaboration Solutions
  • Part 5: Research, Development, and Collaboration
  • Chapter 17: Researching Industry Trends and Their Impact
  • Chapter 18: Security Activities Across the Technology Life Cycle
  • Chapter 19: Interaction Across Diverse Business Units

Need help? Get in touch