Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Title Page
Copyright
Publisher's Note
Dedication
Acknowledgments
About the Author
About the Contributor
Foreword
Introduction
Before You Begin the CompTIA CASP Certification Exam
How to Become a CASP Certified Professional
Who Should Read This Book?
How This Book Is Organized
Exam Strategy
How to Use This Book and Companion Website
The CASP (2014 Edition) Exam Objectives
Assessment Test
Answers to Assessment Test
Chapter 1: Cryptographic Tools and Techniques
The History of Cryptography
Cryptographic Services
Symmetric Encryption
Asymmetric Encryption
Hybrid Encryption
Hashing
Digital Signatures
Public Key Infrastructure
Implementation of Cryptographic Solutions
Cryptographic Attacks
Summary
Exam Essentials
Review Questions
Chapter 2: Comprehensive Security Solutions
Advanced Network Design
TCP/IP
Secure Communication Solutions
Secure Facility Solutions
Secure Network Infrastructure Design
Summary
Exam Essentials
Review Questions
Chapter 3: Securing Virtualized, Distributed, and Shared Computing
Enterprise Security
Cloud Computing
Virtualization
Virtual LANs
Virtual Networking and Security Components
Enterprise Storage
Summary
Exam Essentials
Review Questions
Chapter 4: Host Security
Firewalls and Network Access Control
Host-Based Firewalls
Trusted Operating Systems
Endpoint Security Solutions
Anti-malware
Host Hardening
Asset Management
Data Exfiltration
Intrusion Detection and Prevention
Network Management, Monitoring, and Security Tools
Summary
Exam Essentials
Review Questions
Chapter 5: Application Security and Penetration Testing
Application Security Testing
Specific Application Issues
Application Sandboxing
Application Security Frameworks
Secure Coding Standards
Application Exploits
Escalation of Privilege
Improper Storage of Sensitive Data
Cookie Storage and Transmission
Malware Sandboxing
Memory Dumping
Process Handling at the Client and Server
Security Assessments and Penetration Testing
Summary
Exam Essentials
Review Questions
Chapter 6: Risk Management
Risk Terminology
Identifying Vulnerabilities
Operational Risks
The Risk Assessment Process
Best Practices for Risk Assessments
Summary
Exam Essentials
Review Questions
Chapter 7: Policies, Procedures, and Incident Response
A High-Level View of Documentation
Business Documents Used to Support Security
Documents and Controls Used for Sensitive Information
Training and Awareness for Users
Auditing Requirements and Frequency
The Incident Response Framework
Incident and Emergency Response
Summary
Exam Essentials
Review Questions
Chapter 8: Security Research and Analysis
Apply Research Methods to Determine Industry Trends and Impact to the Enterprise
Analyze Scenarios to Secure the Enterprise
Summary
Exam Essentials
Review Questions
Chapter 9: Enterprise Security Integration
Integrate Enterprise Disciplines to Achieve Secure Solutions
Integrate Hosts, Storage, Networks, and Applications into a Secure Enterprise Architecture
Summary
Exam Essentials
Review Questions
Chapter 10: Security Controls for Communication and Collaboration
Selecting the Appropriate Control to Secure Communications and Collaboration Solutions
Integrate Advanced Authentication and Authorization Technologies to Support Enterprise Objectives
Implement Security Activities across the Technology Life Cycle
Summary
Exam Essentials
Review Questions
Appendix A: CASP Lab Manual
What You'll Need
Lab A1: Verifying a Baseline Security Configuration
Lab A2: Introduction to a Protocol Analyzer
Lab A3: Performing a Wireless Site Survey
Lab A4: Using Windows Remote Access
Lab A5: Configuring a VPN Client
Lab A6: Using the Windows Command-Line Interface (CLI)
Lab A7: Cisco IOS Command-Line Basics
Lab A8: Shopping for Wi-Fi Antennas
Lab A9: Cloud Provisioning
Lab A10: Introduction to Windows Command-Line Forensic Tools
Lab A11: Introduction to Hashing Using a GUI
Lab A12: Hashing from the Command Line
Lab A13: Cracking Encrypted Passwords
Lab A14: Threat Modeling
Lab A15: Social Engineering
Lab A16: Downloading, Verifying, and Installing a Virtual Environment
Lab A17: Exploring Your Virtual Network
Lab A18: Port Scanning
Lab A19: Introduction to the Metasploit Framework
Lab A20: Sniffing NETinVM Traffic with Wireshark
Suggestions for Further Exploration of Security Topics
Appendix B: Answers to Review Questions
Chapter 1: Cryptographic Tools and Techniques
Chapter 2: Comprehensive Security Solutions
Chapter 3: Securing Virtualized, Distributed, and Shared Computing
Chapter 4: Host Security
Chapter 5: Application Security and Penetration Testing
Chapter 6: Risk Management
Chapter 7: Policies, Procedures, and Incident Response
Chapter 8: Security Research and Analysis
Chapter 9: Enterprise Security Integration
Chapter 10: Security Controls for Communication and Collaboration
Appendix C: About the Additional Study Tools
Additional Study Tools
System Requirements
Using the Study Tools
Troubleshooting
Free Online Study Tools
End User License Agreement
← Prev
Back
Next →
← Prev
Back
Next →