Modules
1 -
Introduction
#
Lesson
Duration
Type
1.
Welcome
FREE
8m:27s

2.
Download your free study guide

3.
Lab: Exploring the Lab Environment

4.
Checkpoint: Introduction

2 -
Data Considerations
#
Lesson
Duration
Type
1.
Data Considerations
FREE
0m:57s

2.
Data Security
FREE
3m:44s

3.
Data Classification
FREE
2m:47s

4.
Data Types
5m:24s

5.
Data Retention
6m:56s

6.
Data Destruction
2m:55s

7.
Data Ownership
5m:34s

8.
Data Sovereignty
3m:18s

9.
Checkpoint: Data Considerations

3 -
Risk Management
#
Lesson
Duration
Type
1.
Risk Management
1m:30s

2.
Risk Strategies
4m:30s

3.
Risk Management Lifecycle
11m:52s

4.
Risk Types
3m:3s

5.
Risk Handling
8m:33s

6.
Risk Tracking
5m:7s

7.
Risk Assessment
18m:0s

8.
When Risk Management Fails
3m:44s

9.
Checkpoint: Risk Management

4 -
Policies and Frameworks
#
Lesson
Duration
Type
1.
Policies and Frameworks
1m:23s

2.
Policies
12m:1s

3.
Frameworks
5m:7s

4.
Regulations
8m:8s

5.
Standards
6m:11s

6.
Contracts and Agreements
9m:23s

7.
Legal Considerations
7m:3s

8.
Integrating Industries
3m:29s

9.
Checkpoint: Policies and Frameworks

5 -
Business Continuity
#
Lesson
Duration
Type
1.
Business Continuity
1m:11s

2.
Business Continuity Plan
13m:43s

3.
Business Impact Analysis
13m:52s

4.
Privacy Impact Assessment
3m:53s

5.
Incident Response Plan
10m:58s

6.
Testing Plans
7m:10s

7A.
Lab: Understanding DR capabilities in the Azure Cloud

8.
Checkpoint: Business Continuity

6 -
Risk Strategies
#
Lesson
Duration
Type
1.
Risk Strategies
1m:32s

2.
Asset Value
4m:4s

3.
Access Control
6m:21s

4.
Aggregating Risk
3m:7s

5.
Scenario Planning
8m:21s

6.
Security Controls
9m:16s

7.
Security Solutions
8m:54s

8.
Cost Of A Data Breach
6m:2s

9.
Checkpoint: Risk Strategies

7 -
Vendor Risk
#
Lesson
Duration
Type
1.
Vendor Risk
4m:1s

2.
Business Models
11m:5s

3.
Influences
7m:25s

4.
Organizational Changes
6m:11s

5.
Shared Responsibility Model
4m:50s

6.
Viability and Support
10m:50s

7.
Dependencies
4m:39s

8.
Considerations
10m:35s

9.
Supply Chain
5m:59s

10.
Checkpoint: Vendor Risk

8 -
Securing Networks
#
Lesson
Duration
Type
1.
Securing Networks
6m:48s

2.
Switches
7m:27s

3.
Routers
8m:27s

4.
Wireless and Mesh
3m:23s

5.
Firewalls
11m:30s

6A.
Lab: Implementing a Web Application Firewall

7.
Proxies
7m:13s

8.
Gateways
4m:39s

9.
IDS and IPS
6m:28s

10.
Network Access Control (NAC)
2m:56s

11.
Remote Access
8m:59s

12.
Unified Communications
19m:8s

13.
Cloud vs On-premise
4m:49s

14.
DNSSEC
4m:16s

15A.
Lab: Understanding the Role of SPF Records and DNSSEC

16.
Load Balancer
6m:48s

17.
Checkpoint: Securing Networks

9 -
Securing Architectures
#
Lesson
Duration
Type
1.
Securing Architectures
1m:16s

2.
Traffic Mirroring
4m:23s

3.
Network Sensors
11m:46s

4.
Host Sensors
6m:15s

5.
Layer 2 Segmentation
5m:14s

6.
Network Segmentation
13m:14s

7.
Server Segmentation
10m:51s

8.
Zero Trust
6m:37s

9.
Merging Networks
5m:32s

10.
Software-Defined Networking (SDN)
5m:27s

11.
Checkpoint: Securing Architectures

10 -
Infrastructure Design
#
Lesson
Duration
Type
1.
Infrastructure Design
1m:9s

2.
Scalability
5m:39s

3.
Resiliency Issues
12m:49s

4.
Automation
6m:26s

5.
Performance Design
6m:3s

6.
Virtualization
8m:19s

7.
Containerization
5m:48s

8A.
Lab: Implementing and Updating Containers on Windows Server 2019

8B.
Lab: Performing Container Update Tasks

9.
Checkpoint: Infrastructure Design

11 -
Cloud and Virtualization
#
Lesson
Duration
Type
1.
Cloud and Virtualization
1m:6s

2.
Cloud Deployment Models
4m:34s

3.
Cloud Service Models
5m:7s

4.
Deployment Considerations
4m:57s

5.
Provider Limitations
2m:59s

6.
Extending Controls
5m:6s

7.
Provision and Deprovision
2m:59s

8.
Storage Models
5m:22s

9.
Virtualization
7m:56s

10A.
Lab: Implementing a VNet in Azure

10B.
Lab: Implementing Virtual Private Cloud (VPC) in AWS

11.
Checkpoint: Cloud and Virtualization

12 -
Software Applications
#
Lesson
Duration
Type
1.
Software Applications
2m:42s

2.
Systems Development Life Cycle
6m:36s

3.
Software Development Life Cycle
5m:52s

4.
Development Approaches
10m:51s

5.
Software Assurance
8m:56s

6.
Baselines and Templates
6m:31s

7.
Best Practices
6m:7s

8.
Integrating Applications
4m:31s

9.
Checkpoint: Software Applications

13 -
Data Security
#
Lesson
Duration
Type
1.
Data Security
3m:36s

2.
Data Life Cycle
10m:29s

3.
Data Classification
6m:55s

4.
Labeling and Tagging
8m:11s

5.
Deidentification
11m:3s

6.
Data Encryption
7m:32s

7.
Data Loss Prevention (DLP)
10m:1s

8.
DLP Detection
6m:42s

9.
Data Loss Detection
11m:34s

10A.
Lab: Using Automation to Identify and Label Sensitive Data

11.
Checkpoint: Data Security

14 -
Authentication and Authorization
#
Lesson
Duration
Type
1.
Authentication and Authorization
1m:44s

2.
Access Control
4m:47s

3.
Credential Management
4m:27s

4.
Password Policies
8m:2s

5.
Multifactor Authentication
8m:25s

6.
Authentication Protocols
10m:0s

7.
Federation
7m:2s

8.
Root of Trust
4m:24s

9.
Attestation
2m:14s

10.
Identity Proofing
3m:33s

11.
Checkpoint: Authentication and Authorization

15 -
Cryptography
#
Lesson
Duration
Type
1.
Cryptography
1m:48s

2.
Privacy and Confidentiality
6m:32s

3.
Integrity and Non-repudiation
6m:30s

4.
Compliance and Policy
3m:33s

5.
Data States
7m:2s

6.
Cryptographic Use Cases
6m:17s

7.
PKI Use Cases
8m:41s

8.
Checkpoint: Cryptography

16 -
Emerging Technology
#
Lesson
Duration
Type
1.
Emerging Technology
4m:18s

2.
Artificial Intelligence & Machine Learning (AI & ML)
8m:55s

3.
Deep Learning
8m:58s

4.
Big Data
4m:40s

5.
Blockchain & Distributed Consensus
5m:36s

6.
Passwordless Authentication
5m:17s

7.
Homomorphic Encryption
3m:37s

8.
Virtual/Augmented Reality
4m:32s

9.
3D Printing
3m:3s

10.
Quantum Computing
5m:34s

11.
Checkpoint: Emerging Technology

17 -
Enterprise Mobility
#
Lesson
Duration
Type
1.
Enterprise Mobility
2m:36s

2.
Enterprise Mobility Management (EMM)
9m:36s

3.
WPA3
7m:20s

4A.
Lab: Analyze and Attack Wireless Network Protections

5.
Connectivity Options
8m:48s

6.
Security Configurations
8m:7s

7.
DNS Protection
3m:15s

8A.
Lab: Understanding DNS over HTTPS (DoH)

9.
Deployment Options
4m:38s

10.
Reconnaissance Concerns
8m:0s

11.
Mobile Security
7m:50s

12.
Checkpoint: Enterprise Mobility

18 -
Endpoint Security Controls
#
Lesson
Duration
Type
1.
Endpoint Security Controls
2m:24s

2.
Device Hardening
8m:30s

3.
Patching
4m:41s

4.
Security Settings
5m:41s

5.
Mandatory Access Controls (MAC)
6m:44s

6.
Secure Boot
5m:49s

7.
Hardware Encryption
4m:48s

8.
Endpoint Protections
9m:54s

9.
Logging and Monitoring
6m:14s

10A.
Lab: Using Security Incident and Event Management (SIEM) Features

11.
Resiliency
6m:4s

12.
Checkpoint: Endpoint Security Controls

19 -
Cloud Technologies
#
Lesson
Duration
Type
1.
Cloud Technologies
2m:37s

2.
Business Continuity/Disaster Recovery (BC/DR)
7m:51s

3.
Cloud Encryption
5m:22s

4.
Serverless Computing
8m:54s

5.
Software-Defied Networking (SDN)
6m:52s

6.
Log Collection and Analysis
4m:22s

7A.
Lab: Configure Monitoring in the AWS Cloud

8.
Cloud Access Security Broker (CASB)
6m:16s

9.
Cloud Misconfigurations
10m:57s

10A.
Lab: Deploying a Hardened Server Image in the Azure Cloud

11.
Checkpoint: Cloud Technologies

20 -
Operational Technologies
#
Lesson
Duration
Type
1.
Operational Technologies
2m:5s

2.
Embedded Systems
10m:28s

3.
ICS and SCADA
9m:18s

4.
ICS Protocols
10m:54s

5.
Industries and Sectors
4m:48s

6.
Checkpoint: Operational Technologies

21 -
Hashing and Symmetric Algorithms
#
Lesson
Duration
Type
1.
Hashing and Symmetric Algorithms
1m:13s

2.
Hashing
6m:55s

3.
Message Authentication
3m:7s

4.
Symmetric Algorithms
3m:33s

5.
Stream Ciphers
5m:43s

6.
Block Ciphers
4m:32s

7A.
Lab: Implementing Data Protection using Symmetric Encryption

8.
Checkpoint: Hashing and Symmetric Algorithms

22 -
Asymmetric Algorithms
#
Lesson
Duration
Type
1.
Asymmetric Algorithms
2m:11s

2.
Using Asymmetric Algorithms
9m:28s

3.
SSL/TLS and Cipher Suites
8m:21s

4.
S/MIME and SSH
7m:27s

5.
EAP
5m:39s

6.
IPSEC
14m:34s

7.
Elliptic Curve Cryptography (ECC)
3m:33s

8.
Forward Secrecy
3m:35s

9.
Authenticated Encryption with Associated Data (AEAD)
1m:52s

10.
Key Stretching
4m:30s

11.
Checkpoint: Asymmetric Algorithms

23 -
Public Key Infrastructure
#
Lesson
Duration
Type
1.
Public Key Infrastructure
2m:50s

2.
PKI Components
10m:18s

3.
Digital Certificates
7m:44s

4.
Using Digital Certificates
5m:40s

5.
Trust Models
4m:28s

6.
Certificate Management
2m:44s

7.
Certificate Validity (CRL and OCSP)
3m:48s

8.
Protecting Web Traffic
3m:30s

9A.
Lab: Implementing HTTP Server Certificates

10.
Troubleshooting Certificates
5m:22s

11A.
Lab: Troubleshooting HTTP Server Certificates

12.
Troubleshooting Keys
183m:34s

13.
Checkpoint: Public Key Infrastructure

24 -
Threat and Vulnerability Management
#
Lesson
Duration
Type
1.
Threat and Vulnerability Management
1m:56s

2.
Threat Intelligence
6m:19s

3.
Threat Hunting
6m:43s

4.
Intelligence Collection
11m:9s

5.
Threat Actors
9m:21s

6.
Threat Management Frameworks
12m:45s

7A.
Lab: Exploring MITRE ATT&CK Navigator

8.
Vulnerability Management Activities
11m:44s

9.
Security Content Automation Protocol (SCAP)
7m:21s

10.
Checkpoint: Threat and Vulnerability Management

25 -
Vulnerability Assessments
#
Lesson
Duration
Type
1.
Vulnerability Assessments
1m:34s

2.
Penetration Test
4m:49s

3.
PenTest Steps
7m:2s

4.
PenTest Requirements
11m:25s

5.
Code Analysis
8m:29s

6A.
Lab: Performing Static Code Analysis

7.
Protocol Analysis
7m:52s

8.
Analysis Utilities
5m:19s

9.
Checkpoint: Vulnerability Assessments

26 -
Risk Reduction
#
Lesson
Duration
Type
1.
Risk Reduction
1m:32s

2.
Deceptive Technologies
5m:1s

3.
Security Data Analytics
8m:4s

4.
Preventative Controls
5m:10s

5.
Application Controls
9m:42s

6A.
Lab: Implementing an Application Blocklist Policy

7.
Security Automation
10m:42s

8.
Physical Security
6m:44s

9.
Checkpoint: Risk Reduction

27 -
Analyzing Vulnerabilities
#
Lesson
Duration
Type
1.
Analyzing Vulnerabilities
1m:22s

2.
Race Conditions
4m:58s

3.
Buffer Overflows
12m:26s

4.
Authentication and References
5m:55s

5.
Ciphers and Certificates
10m:45s

6.
Improper Headers
6m:9s

7.
Software Composition
9m:49s

8.
Vulnerable Web Applications
11m:45s

9A.
Lab: Analyzing Web Application Vulnerabilities

10.
Checkpoint: Analyzing Vulnerabilities

28 -
Attacking Vulnerabilities
#
Lesson
Duration
Type
1.
Attacking Vulnerabilities
1m:15s

2.
Directory Traversals
9m:48s

3.
Cross-Site Scripting (XSS)
8m:59s

4.
Cross-Site Request Forgery (CSRF)
7m:15s

5.
SQL Injections
7m:5s

6.
XML Injections
6m:29s

7.
Other Injection Attacks
4m:21s

8A.
Lab: Exploiting Web Applications – Stored XSS, SQL Injection

9.
Authentication Bypass
6m:45s

10.
VM Attacks
8m:41s

11.
Network Attacks
4m:52s

12A.
Lab: Exploiting the Server Message Block (SMB) Protocol

12B.
Lab: Analyzing SMB Vulnerabilities

13.
Social Engineering
7m:15s

14.
Checkpoint: Attacking Vulnerabilities

29 -
Indicators of Compromise
#
Lesson
Duration
Type
1.
Indicators of Compromise
1m:49s

2.
Types of IoCs
3m:55s

3.
PCAP Files
4m:16s

4.
NetFlow
7m:5s

5.
Logs
7m:1s

6.
IoC Notifications
7m:38s

7A.
Lab: Exploring and Interpreting Intrusion Detection System (IDS) Alerts

7B.
Lab: Analyzing Intrusion Detection System Logs

8.
Response to IoCs
5m:15s

9.
Checkpoint: Indicators of Compromise

30 -
Incident Response
#
Lesson
Duration
Type
1.
Incident Response
1m:26s

2.
Triage
8m:4s

3.
Communication Plan
10m:3s

4.
Stakeholder Management
7m:9s

5.
Incident Response Process
10m:20s

6.
Playbooks
8m:25s

7.
Checkpoint: Incident Response

31 -
Digital Forensics
#
Lesson
Duration
Type
1.
Digital Forensics
1m:4s

2.
Forensic Process
4m:36s

3.
Chain of Custody
7m:4s

4.
Order of Volatility
6m:28s

5.
Forensic Analysis
6m:38s

6A.
Lab: Exploring Cryptography and Cryptanalysis Using Visual Tools

7.
Checkpoint: Digital Forensics

32 -
Digital Forensic Tools
#
Lesson
Duration
Type
1.
Digital Forensic Tools
2m:22s

2.
Forensic Workstations
5m:8s

3.
File Carving Tools
3m:33s

4.
Binary Analysis Tools
7m:9s

5A.
Lab: Analyzing Firmware using Binary Analysis and Hardware Emulation

6.
Forensic Analysis Tools
8m:8s

7.
Imaging Tools
7m:45s

8.
Collection Tools
6m:14s

9.
Checkpoint: Digital Forensic Tools

33 -
Conclusion
#
Lesson
Duration
Type
1.
Conclusion
10m:19s

2.
CASP+ (CAS-004) Practice Exam
