What's new

Welcome to App4Day.com

Join us now to get access to all our features. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, and so, so much more. It's also quick and totally free, so what are you waiting for?

CASP - Preparing for Security Engineering and Cryptography Domain

V

voska89

Moderator
Joined
Jul 7, 2023
Messages
42,387
Reaction score
0
Points
36
c2c4c7aa433e42882fd42c49b46020ee.jpeg

Free Download CASP - Preparing for Security Engineering and Cryptography Domain
Released 7/2023
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 2h 9m | Size: 1.34 GB
Dean Bushmiller will give you the easiest, best path to learning the CompTIA CASP+​

This certification qualifies you to assess cyber readiness within an enterprise. You will be able to design and implement the proper solutions to ensure the organization is ready for the next attack. You will have the knowledge and skills required to do the following
The Security Engineering and Cryptography Domain is about applying security practices to cloud, on-premises, endpoint, and mobile infrastructure, while considering cryptographic technologies and techniques
This course in the CASP series covers the following topics
Engineering and Cryptography
Apply secure configurations to enterprise mobility
Managed configurations
Deployment scenarios
Security considerations
Configure and implement endpoint security controls
Hardening techniques
Processes
Mandatory access control
Trustworthy computing
Compensating controls
Explain security considerations impacting specific sectors and operational technologies
Embedded
ICS/supervisory control and data acquisition
Protocols
Sectors
Explain how cloud technology adoption impacts organizational security
Automation and orchestration
Encryption configuration
Logs
Monitoring configurations
Key ownership and location
Key life-cycle management
Backup and recovery methods
Infrastructure versus serverless computing
Application virtualization
Software-defined networking
Misconfigurations
Collaboration tools
Storage configurations
Cloud access security broker
Given a business requirement, implement appropriate Public key infrastructure solution
Public key infrastructure hierarchy
Certificate types
Certificate usages/profiles/templates
Extensions
Trusted providers
Trust model
Cross-certification
Configure profiles
Life-cycle management
Public and private keys
Digital signature
Certificate pinning
Certificate stapling
Certificate signing requests
Online Certificate Status Protocol versus certificate revocation list
HTTP Strict Transport Security
Given a business requirement, implement appropriate cryptographic protocols and algorithms
Hashing
Symmetric algorithms
Symetric Complexity Contruction
Asymmetric algorithms
Protocols
Elliptic curve cryptography
Forward secrecy
Authenticated encryption with associated data
Key stretching
Troubleshoot issues with cryptographic implementations
Implementation and configuration issues
Keys

Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
No Password - Links are Interchangeable
 
Top Bottom