Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

CASP+ Cert Prep: 3 Enterprise Security Operations

via LinkedIn Learning

This course may be unavailable.

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn the basic of penetration testing and incident response, while studying for domain 3 of the CompTIA Advanced Security Practitioner (CASP+) certification exam.

Syllabus

Introduction
  • Enterprise Security Operations
  • What you should know
  • About the exam
1. Security Assessments
  • What are security assessments?
  • Vulnerability assessments
  • Physical security assessments
  • Malware analysis
  • Penetration testing
  • Penetration testing methods
  • Penetration testing steps: Reconnaissance
  • Penetration testing steps: Fingerprinting
  • Penetration testing steps: Exploitation
  • Penetration testing steps: Pivoting and covering tracks
  • Penetration testing steps: Social engineering
  • Internal vs. external audits
  • Self-assessments: Team exercises
  • Code reviews
2. Tools Used in Security Assessments
  • What kinds of tools do we use for security assessments?
  • Port scanners
  • Vulnerability scanners
  • Protocol analyzers
  • SCAP scanners and tools
  • Network enumerator
  • Password crackers
  • Fuzzer
  • HTTP interceptor
  • Exploitation tools and frameworks
  • Visualization tools
  • Log reduction and analysis tools
  • File integrity monitoring and antivirus
  • Command line tools
  • Physical security tools
  • Reverse engineering tools
3. Incident Response
  • Why are incident response and recovery so important?
  • E-discovery
  • Electronic inventory and asset control
  • Data retention policies
  • Data recovery and storage
  • Data ownership
  • Data handling
  • Legal holds
  • Data breach
  • Incident detection and response
  • Incident and emergency response
  • Chain of custody
  • Forensic analysis
  • Order of volatility
  • Continuity of operations and disaster recovery
  • Severity of the incident
  • Incident response team
  • Post-incident response
4. Tools Used in Incident Response and Recovery
  • Tools used in incident response
  • Disk imaging
  • Network packet capture and analysis
  • nbtstat and netstat
  • Netcat
  • Memory forensics
  • File carving
  • FTK and EnCase
  • Specialized tools for mobile devices
Conclusion
  • Next steps

Taught by

Jason Dion

Reviews

4.5 rating at LinkedIn Learning based on 42 ratings

Start your review of CASP+ Cert Prep: 3 Enterprise Security Operations

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.