Nicht aus der Schweiz? Besuchen Sie lehmanns.de
CompTIA Advanced Security Practitioner (CASP) CAS-003 Cert Guide - Robin Abernathy, Troy McMillan

CompTIA Advanced Security Practitioner (CASP) CAS-003 Cert Guide

Media-Kombination
912 Seiten
2018 | 2nd edition
Pearson IT Certification
978-0-7897-5944-3 (ISBN)
CHF 78,50 inkl. MwSt
zur Neuauflage
  • Titel erscheint in neuer Auflage
  • Artikel merken
Zu diesem Artikel existiert eine Nachauflage
Learn, prepare, and practice for CompTIA Advanced Security Practitioner (CASP) CAS-003 exam success with this CompTIA Approved Cert Guide from Pearson IT Certification, a leader in IT Certification learning and a CompTIA Authorized Platinum Partner.



Master CompTIA Advanced Security Practitioner (CASP) CAS-003 exam topics
Assess your knowledge with chapter-ending quizzes
Review key concepts with exam preparation tasks
Practice with unique sets of exam-realistic practice questions


CompTIA Advanced Security Practitioner (CASP) CAS-003 Authorized Cert Guide is a best-of-breed exam study guide. Leading security certification training experts Robin Abernathy and Troy McMillan share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.




The book presents you with an organized test preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your final study plan.




The companion website contains the powerful Pearson Test Prep practice test software, complete with hundreds of exam-realistic questions. The assessment engine offers you a wealth of customization options and reporting features, laying out a complete assessment of your knowledge to help you focus your study where it is needed most. This online assessment engine enables you to access the practice tests via the Internet on any desktop, laptop, tablet, or smartphone device with internet connectivity. The web-based version also allows you to download the software to your desktop, so you can use the practice test even when you don't have an internet connection. The desktop version syncs with your online version when an internet connection is established, to update and track your progress. This integrated learning package offers these additional benefits:


• Allows you to focus on individual topic areas or take complete, timed exams
• Presents unique sets of exam-realistic practice questions
• Tracks your performance and provides feedback on a module-by-module basis, laying out a complete assessment of your knowledge to help you focus your study where it is needed most.




Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this CompTIA approved study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time, including:



Enterprise security
Risk management and incident response
Research, analysis, and assessment
Integration of computing, communications, and business disciplines
Technical integration of enterprise components




Companion Website


The website contains two free, complete practice exams.




Includes Exclusive Offer for 70% Off Premium Edition eBook and Practice Test

Robin Abernathy, CASP, is a product developer and technical editor for Kaplan IT training. She has developed and reviewed certification preparation materials in a variety of product lines, including Microsoft, CompTIA, Cisco, ITIL, (ISC)2, and PMI, and holds multiple certifications from these vendors. Her work with Kaplan IT Training includes practice tests and study guides for the Transcender brands. Robin most recently co-authored Pearson’s CISSP Cert Guide with Troy McMillan and Sari Green and authored Pearson’s Project+ Cert Guide. She provides training on computer hardware, software, networking, security, and project management. Robin also presents at technical conferences and hosts webinars on IT certification topics. More recently, Robin has recorded videos for CyberVista’s IT certification training courses. Troy McMillan, CASP, is a product developer and technical editor for Kaplan IT Training as well as a full-time trainer. He became a professional trainer more than 15 years ago, teaching Cisco, Microsoft, CompTIA, and wireless classes. His recent work includes: Contributing subject matter expert for CCNA Cisco Certified Network Associate Certification Exam Preparation Guide (Kaplan) Prep test question writer for Network+ Study Guide (Sybex) Technical editor for Windows 7 Study Guide (Sybex) Contributing author for CCNA-Wireless Study Guide (Sybex) Technical editor for CCNA Study Guide, Revision 7 (Sybex) Author of VCP VMware Certified Professional on vSphere 4 Review Guide: Exam VCP-410 and associated instructional materials (Sybex) Author of Cisco Essentials (Sybex) Co-author of CISSP Cert Guide (Pearson) Prep test question writer for CCNA Wireless 640-722 (Cisco Press) He also has appeared in the following training videos for OnCourse Learning: Security+; Network+; Microsoft 70-410, 411, and 412 exam prep; ICND 1; ICND 2; and Cloud+. He now creates certification practice tests and study guides for the Transcender brands. Troy lives in both Sugarloaf Key, Florida, and Pfafftown, North Carolina, with his wife, Heike.

Introduction The CASP Exam 2
    The Goals of the CASP Certification 3
    The Value of the CASP Certification 5
    CASP Exam Objectives 7
    Steps to Becoming a CASP 35
    CompTIA Authorized Materials Use Policy 35
Chapter 1 Business and Industry Influences and Associated Security Risks 38
    Risk Management of New Products, New Technologies, and User Behaviors 39
    New or Changing Business Models/Strategies 40
    Security Concerns of Integrating Diverse Industries 44
    Internal and External Influences 52
    Impact of De-perimeterization (e.g., Constantly Changing Network Boundary) 54
    Exam Preparation Tasks 60
    Review All Key Topics 60
    Define Key Terms 60
    Review Questions 61
Chapter 2 Security, Privacy Policies, and Procedures 64
    Policy and Process Life Cycle Management 65
    Support Legal Compliance and Advocacy 70
    Common Business Documents to Support Security 71
    Security Requirements for Contracts 75
    General Privacy Principles for Sensitive Information 77
    Support the Development of Policies Containing Standard Security Practices 78
    Exam Preparation Tasks 91
    Review All Key Topics 91
    Define Key Terms 92
    Review Questions 92
Chapter 3 Risk Mitigation Strategies and Controls 96
    Categorize Data Types by Impact Levels Based on CIA 98
    Incorporate Stakeholder Input into CIA Impact-Level Decisions 100
    Determine the Aggregate CIA Score 101
    Determine Minimum Required Security Controls Based on Aggregate Score 102
    Select and Implement Controls Based on CIA Requirements and Organizational Policies 102
    Extreme Scenario Planning/Worst-Case Scenario 123
    Conduct System-Specific Risk Analysis 125
    Make Risk Determination Based upon Known Metrics 126
    Translate Technical Risks in Business Terms 134
    Recommend Which Strategy Should Be Applied Based on Risk Appetite 135
    Risk Management Processes 137
    Continuous Improvement/Monitoring 141
    Business Continuity Planning 141
    IT Governance 148
    Enterprise Resilience 168
    Exam Preparation Tasks 170
    Review All Key Topics 170
    Define Key Terms 171
    Review Questions 171
Chapter 4 Risk Metric Scenarios to Secure the Enterprise 174
    Review Effectiveness of Existing Security Controls 175
    Reverse Engineer/Deconstruct Existing Solutions 177
    Creation, Collection, and Analysis of Metrics 177
    Prototype and Test Multiple Solutions 180
    Create Benchmarks and Compare to Baselines 181
    Analyze and Interpret Trend Data to Anticipate Cyber Defense Needs 182
    Analyze Security Solution Metrics and Attributes to Ensure They Meet Business Needs 183
    Use Judgment to Solve Problems Where the Most Secure Solution Is Not Feasible 187
    Exam Preparation Tasks 187
    Review All Key Topics 187
    Define Key Terms 188
    Review Questions 189
Chapter 5 Network and Security Components, Concepts, and Architectures 192
    Physical and Virtual Network and Security Devices 194
    Application and Protocol-Aware Technologies 212
    Advanced Network Design (Wired/Wireless) 215
    Complex Network Security Solutions for Data Flow 241
    Secure Configuration and Baselining of Networking and Security Components 246
    Software-Defined Networking 254
    Network Management and Monitoring Tools 255
    Advanced Configuration of Routers, Switches, and Other Network Devices 260
    Security Zones 268
    Network Access Control 269
    Network-Enabled Devices 271
    Critical Infrastructure 279
    Exam Preparation Tasks 280
    Review All Key Topics 280
    Define Key Terms 282
    Review Questions 282
Chapter 6 Security Controls for Host Devices 286
    Trusted OS (e.g., How and When to Use It) 287
    Endpoint Security Software 290
    Host Hardening 298
    Boot Loader Protections 316
    Vulnerabilities Associated with Hardware 322
    Terminal Services/Application Delivery Services 322
    Exam Preparation Tasks 323
    Review All Key Topics 323
    Define Key Terms 324
    Review Questions 324
Chapter 7 Security Controls for Mobile and Small Form Factor Devices 328
    Enterprise Mobility Management 329
    Security Implications/Privacy Concerns 336
    Wearable Technology 345
    Exam Preparation Tasks 350
    Review All Key Topics 350
    Define Key Terms 351
    Review Questions 351
Chapter 8 Software Vulnerability Security Controls 354
    Application Security Design Considerations 355
    Specific Application Issues 356
    Application Sandboxing 370
    Secure Encrypted Enclaves 371
    Database Activity Monitor 371
    Web Application Firewalls 371
    Client-Side Processing vs. Server-Side Processing 371
    Operating System Vulnerabilities 377
    Firmware Vulnerabilities 377
    Exam Preparation Tasks 378
    Review All Key Topics 378
    Define Key Terms 378
    Review Questions 379
Chapter 9 Security Assessments 382
    Methods 383
    Test Types 398
    Exam Preparation Tasks 405
    Review All Key Topics 405
    Define Key Terms 406
    Review Questions 407
Chapter 10 Select the Appropriate Security Assessment Tool 410
    Network Tool Types 411
    Host Tool Types 427
    Physical Security Tools 441
    Exam Preparation Tasks 444
    Review All Key Topics 444
    Define Key Terms 445
    Review Questions 446
Chapter 11 Incident Response and Recovery 448
    E-Discovery 449
    Data Breach 454
    Facilitate Incident Detection and Response 457
    Incident and Emergency Response 461
    Incident Response Support Tools 471
    Severity of Incident or Breach 478
    Post-incident Response 480
    Exam Preparation Tasks 481
    Review All Key Topics 481
    Define Key Terms 482
    Review Questions 483
Chapter 12 Host, Storage, Network, and Application Integration 486
    Adapt Data Flow Security to Meet Changing Business Needs 487
    Standards 489
    Interoperability Issues 491
    Resilience Issues 494
    Data Security Considerations 496
    Resources Provisioning and Deprovisioning 500
    Design Considerations During Mergers, Acquisitions and Demergers/Divestitures 501
    Network Secure Segmentation and Delegation 502
    Logical Deployment Diagram and Corresponding Physical Deployment Diagram of All Relevant Devices 502
    Security and Privacy Considerations of Storage Integration 504
    Security Implications of Integrating Enterprise Applications 504
    Exam Preparation Tasks 507
    Review All Key Topics 507
    Define Key Terms 508
    Review Questions 508
Chapter 13 Cloud and Virtualization Technology Integration 512
    Technical Deployment Models (Outsourcing/Insourcing/Managed Services/Partnership) 513
    Security Advantages and Disadvantages of Virtualization 518
    Cloud Augmented Security Services 521
    Vulnerabilities Associated with Comingling of Hosts with Different Security Requirements 527
    Data Security Considerations 529
    Resources Provisioning and Deprovisioning 531
    Exam Preparation Tasks 532
    Review All Key Topics 532
    Define Key Terms 532
    Review Questions 533
Chapter 14 Authentication and Authorization Technology Integration 536
    Authentication 537
    Authorization 550
    Attestation 557
    Identity Propagation 558
    Federation 559
    Trust Models 563
    Exam Preparation Tasks 566
    Review All Key Topics 566
    Define Key Terms 567
    Review Questions 567
Chapter 15 Cryptographic Techniques 570
    Techniques 572
    Implementations 592
    Exam Preparation Tasks 611
    Review All Key Topics 611
    Define Key Terms 612
    Review Questions 613
Chapter 16 Secure Communication and Collaboration 616
    Remote Access 617
    Unified Collaboration Tools 621
    Exam Preparation Tasks 634
    Review All Key Topics 634
    Define Key Terms 635
    Review Questions 635
Chapter 17 Industry Trends and Their Impact to the Enterprise 638
    Perform Ongoing Research 639
    Threat Intelligence 643
    Research Security Implications of Emerging Business Tools 649
    Global IA Industry/Community 653
    Exam Preparation Tasks 660
    Review All Key Topics 660
    Define Key Terms 661
    Review Questions 661
Chapter 18 Security Activities Across the Technology Life Cycle 664
    Systems Development Life Cycle 665
    Software Development Life Cycle 673
    Adapt Solutions 706
    Asset Management (Inventory Control) 709
    Exam Preparation Tasks 711
    Review All Key Topics 711
    Define Key Terms 712
    Review Questions 713
Chapter 19 Business Unit Interaction 716
    Interpreting Security Requirements and Goals to Communicate with Stakeholders from Other Disciplines 717
    Provide Objective Guidance and Impartial Recommendations to Staff and Senior Management on Security Processes and Controls 724
    Establish Effective Collaboration Within Teams to Implement Secure Solutions 725
    Governance, Risk, and Compliance Committee 726
    Exam Preparation Tasks 727
    Review All Key Topics 727
    Define Key Terms 728
    Review Questions 729
Appendix A Answers 732
Glossary 754




Online-only Elements:
Appendix B Memory Tables
Appendix C Memory Table Answers
Appendix D Study Planner


9780789759443, TOC, 4/16/2018

Erscheint lt. Verlag 26.6.2018
Reihe/Serie Certification Guide
Verlagsort Upper Saddle River
Sprache englisch
Maße 194 x 240 mm
Gewicht 1659 g
Themenwelt Informatik Weitere Themen Zertifizierung
ISBN-10 0-7897-5944-6 / 0789759446
ISBN-13 978-0-7897-5944-3 / 9780789759443
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich