PDA

View Full Version : ITU CompTIA CAS-001 - Advanced Security Practitioner (CASP)



BoomBoom
03-16-2016, 04:56 PM
http://i76.fastpic.ru/big/2016/0314/a6/89e00b2b04cb6dc2ce9bb30d1de26aa6.jpg
ITU CompTIA CAS-001 - Advanced Security Practitioner (CASP)
Size: 6.98 GB Type: eLearning






The CASP exam covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers, while managing risk.
Module 1: Underlying Security Models
1.0 Course Guide
1.1 Underlying Security Models Part 1
1.2 Underlying Security Models Part 2
1.3 Underlying Security Models Part 3
1.4 Underlying Security Models Part 4
1.5 Underlying Security Models Part 5
1.6 Underlying Security Models Part 6
1.7 Underlying Security Models Part 7
1.8 General Security Part 1
1.9 General Security Part 2
Module 2: Selecting Security
2.0 Selecting Security Products Part 1
2.1 Selecting Security Products Part 2
2.2 Selecting Security Products Part 3
2.3 Control Selection Process Part 1
2.4 Control Selection Process Part 2
Module 3: Cryptography
3.0 Cryptography Symmetric and Asymmetric Part 1
3.1 Cryptography Symmetric and Asymmetric Part 2
3.2 Cryptography Symmetric and Asymmetric Part 3
3.3 Cryptography Symmetric and Asymmetric Part 4
3.4 Cryptography Message Integrity Controls Part 1
3.5 Cryptography Message Integrity Controls Part 2
3.6 Cryptography Message Integrity Controls Part 3
3.7 Cryptography Digital Signatures Part 1
3.8 Cryptography Digital Signatures Part 2
3.9 Cryptography PKI and PGP Part 1
3.10 Cryptography PKI and PGP Part 2
3.11 Cryptography PKI and PGP Part 3
3.12 Cryptography PKI and PGP Part 4
Module 4: Storage
4.0 Storage Part 1
4.1 Storage Part 2
4.2 Storage Part 3
4.3 Storage Part 4
Module 5: Virtual Computing
5.0 Virtual Computing
5.1 Cloud Computing Part 1
5.2 Cloud Computing Part 2
5.3 Cloud Computing Part 3
5.4 Cloud Computing Part 4
5.5 Cloud Computing Part 5
Module 6: IPv6
6.0 IPV6 Part 1
6.1 IPV6 Part 2
Module 7: Remote Access Security
7.0 Remote Access Security Part 1
7.1 Remote Access Security Part 2
Module 8: Domain Name System
8.0 Domain Name System Part 1
8.1 Domain Name System Part 2
8.2 Domain Name System Part 3
8.3 Domain Name System Part 4
8.4 Domain Name System Part 5
8.5 Domain Name System Part 6
8.6 Domain Name System Part 7
8.7 Domain Name System Part 8
Module 9: Directory Services
9.0 Directory Services
Module 10: Firewall and VPN
10.0 Firewall and VPN Part 1
10.1 Firewall and VPN Part 2
10.2 Firewall and VPN Part 3
10.3 Firewall and VPN Part 4
10.4 Firewall Policy Part 1
10.5 Firewall Policy Part 2
10.6 Firewall Policy Part 3
10.7 Firewall Policy Part 4
Module 11: Security Configuration Management
11.0 Security Configuration Management Part 1
11.1 Security Configuration Management Part 2
11.2 Security Configuration Management Part 3
Module 12: Network Infrastructure Security
12.0 Network Infrastructure Security Part 1
12.1 Network Infrastructure Security Part 2
12.2 Network Infrastructure Security Part 3
12.3 Network Infrastructure Security Part 4
Module 13: Secure Web Services
13.0 Secure Web Services Part 1
13.1 Secure Web Services Part 2
13.2 OWASP top Ten Part 1
13.3 OWASP top Ten Part 2
13.4 OWASP top Ten Part 3
13.5 OWASP top Ten Part 4
13.6 OWASP top Ten Part 5
Module 14: Buffer Overflows
14.0 Buffer Overflows Part 1
14.1 Buffer Overflows Part 2
Module 15: SQL Injection
15.0 SQL Injection Part 1
15.1 SQL Injection Part 2
Module 16: Access Control
16.0 Access Control Part 1
16.1 Access Control Part 2
Module 17: Single Sign-On
17.0 Single Sign-On Part 1
17.1 Single Sign-On Part 2
17.2 Single Sign-On Part 3
Module 18: Risk Assessment
18.0 Risk Assessment Part 1
18.1 Risk Assessment Part 2
Module 19: Testing and Assessment
19.0 Testing and Assessment Part 1
19.1 Testing and Assessment Part 2
19.2 Testing and Assessment Part 3
Module 20: Common Vulnerability
20.0 Common Vulnerability Scoring System Part 1
20.1 Common Vulnerability Scoring System Part 2
20.2 Common Vulnerability Scoring System Part 3
20.3 Common Vulnerability Scoring System Part 4
Module 21: Common Criteria
21.0 Common Criteria Part 1
21.1 Common Criteria Part 2
21.2 Common Criteria Part 3
21.3 Common Criteria Part 4
21.4 Common Criteria Part 5
Module 22: Personally Identifiable Information
22.0 Personally Identifiable Information Part 1
22.1 Personally Identifiable Information Part 2
Module 23: Risk Management
23.0 Risk Management Part 1
23.1 Risk Management Part 2
23.2 Risk Management Part 3
Module 24: Frameworks
24.0 Frameworks Part 1
24.1 Frameworks Part 2
24.2 Frameworks Part 3
24.3 Frameworks Part 4
Module 25: Interconnecting Systems
25.0 Interconnecting Systems Part 1
25.1 Interconnecting Systems Part 2
Module 26: Security Services
26.0 Security Services Part 1
26.1 Security Services Part 2
26.2 Security Services Part 3
26.3 Security Services Part 4
Module 27: Continuous Monitoring
27.0 Continuous Monitoring Part 1
27.1 Continuous Monitoring Part 2
27.2 Continuous Monitoring Part 3
27.3 Continuous Monitoring Part 4
Module 28: Incident Handling
28.0 Incident Handling Part 1
28.1 Incident Handling Part 2
28.2 Incident Handling Part 3
28.3 Incident Handling Part 4
Module 29: Forensic & Incident Response
29.0 Forensic and Incident Response Part 1
29.1 Forensic and Incident Response Part 2
29.2 Forensic and Incident Response Part 3
Module 30: Requirements Processing
30.0 Requirements Processing Part 1
30.1 Requirements Processing Part 2
30.2 Requirements Processing Part 3
Module 31: Standards Bodies
31.0 Standards Bodies
Module 32: Secure System Life Cycle
32.0 Secure System Life Cycle Part 1
32.1 Secure System Life Cycle Part 2
32.2 Secure System Life Cycle Part 3
Module 33: Email
33.0 Email
Module 34: Mobile and BYOD
34.0 Mobile and BYOD Part 1
34.1 Mobile and BYOD Part 2
Module 35: Voiceover IP
35.0 Voice over IP
Module 36: Physical Facilities Assessment Process
36.0 Physical Facilities Assessment Process Part 1
36.1 Physical Facilities Assessment Process Part 2
Module 37: Security Requirements Traceability Matrix
37.0 Security Requirements Traceability Matrix







DOWNLOAD
(Buy premium account for maximum speed and resumming ability)


http://nitroflare.com/view/3BA4F41ED1610E2/206xc.I.part1.rar
http://nitroflare.com/view/06BF333E7E93D22/206xc.I.part2.rar
http://nitroflare.com/view/C77994121608D12/206xc.I.part3.rar
http://nitroflare.com/view/4215B749EEF9836/206xc.I.part4.rar
http://nitroflare.com/view/9FA5488912C0B17/206xc.I.part5.rar
http://nitroflare.com/view/140BBB2F4A6B190/206xc.I.part6.rar
http://nitroflare.com/view/C2094BE1D08CC7C/206xc.I.part7.rar

http://rapidgator.net/file/c9c242ff178f45a5a08b6eb26e84bca8/206xc.I.part1.rar
http://rapidgator.net/file/f3a17e0834097585996b7de02efa2127/206xc.I.part2.rar
http://rapidgator.net/file/5d1dc88ad795fcfeb2e75482d4ee6f99/206xc.I.part3.rar
http://rapidgator.net/file/ead4c3087d8709924528e6fbce6c8e9e/206xc.I.part4.rar
http://rapidgator.net/file/920f4dbc407da6e317f1e65beb76b7d4/206xc.I.part5.rar
http://rapidgator.net/file/c3290f67a75b4282fbe9bd944994f73f/206xc.I.part6.rar
http://rapidgator.net/file/36800cc26d1f669d04a280411433d0f2/206xc.I.part7.rar

http://uploaded.net/file/zmo2rmcc/206xc.I.part1.rar
http://uploaded.net/file/g09n53mo/206xc.I.part2.rar
http://uploaded.net/file/sr3ckb7v/206xc.I.part3.rar
http://uploaded.net/file/uy3gm2zg/206xc.I.part4.rar
http://uploaded.net/file/t7e702w1/206xc.I.part5.rar
http://uploaded.net/file/dx2fhvos/206xc.I.part6.rar
http://uploaded.net/file/paw1zg49/206xc.I.part7.rar