My Account Details
ISBN10: 1260441334 | ISBN13: 9781260441338
* The estimated amount of time this product will be on the market is based on a number of factors, including faculty input to instructional design and the prior revision cycle and updates to academic research-which typically results in a revision cycle ranging from every two to four years for this product. Pricing subject to change at any time.
Instructor Information
Quick Actions (Only for Validated Instructor Accounts):
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Complete coverage of every topic on the CompTIA Advanced Security Practitioner certification exam by the experts!
Get complete coverage of all objectives included on the CompTIA CASP+ exam CAS-003 from this comprehensive resource. Written by a team of leading information security experts, this authoritative guide fully addresses the skills required for securing a network and managing risk. You’ll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this definitive volume also serves as an essential on-the-job reference. Also includes a voucher coupon for a 10% discount on your CompTIA exam!
Covers all exam domains, including:
- Threats, attacks, and vulnerabilities
- Technologies and tools
- Architecture and design
- Identity and access management
- Risk management
- Cryptography and PKI
Online content includes:
- 200 realistic practice exam questions
- Interactive performance-based question quiz
Chapter 1: Security Influences and Risk
Chapter 2: Security Policies and Procedures
Chapter 3: Risk Mitigation, Strategies, and Controls
Chapter 4: Risk Metrics
PART II: Enterprise Security Architecture
Chapter 5: Network Security Components, Concepts and Architectures
Chapter 6: Security Controls for Host Devices
Chapter 7: Mobile Security Controls
Chapter 8: Vulnerabilities and Security Controls
PART III: Enterprise Security Operations
Chapter 9: Security Assessment
Chapter 10: Security Assessment Tools
Chapter 11: Incident Response and Recovery Procedures
PART IV: Technical Integration of Enterprise Security
Chapter 12: Hosts, Storage, Networks, and Applications
Chapter 13: Cloud and Virtualization
Chapter 14: Authentication and Authorization
Chapter 15: Cryptographic Techniques
Chapter 16: Securing Communications and Collaboration
PART V: Research, Development and Collaboration
Chapter 17: Research Methods and Industry Trends
Chapter 18: Technology Life Cycles and Security Activities
Chapter 19: Business Unit Interactions
Glossary
Need support? We're here to help - Get real-world support and resources every step of the way.