
$7.00
Data Considerations (Domain 4) | ||
---|---|---|
1. Data Considerations (OBJ 4.3) | 1:00 | |
2. Data Security (OBJ. 4.3) | 4:00 | |
3. Data Classification (OBJ. 4.3) | 3:00 | |
4. Data Types (OBJ. 4.3) | 5:00 | |
5. Data Retention (OBJ. 4.3) | 7:00 | |
6. Data Destruction (OBJ. 4.3) | 3:00 | |
7. Data Ownership (OBJ. 4.3) | 6:00 | |
8. Data Sovereignty (OBJ. 4.3) | 3:00 |
Risk Management (Domain 4) | ||
---|---|---|
1. Risk Management (OBJ 4.1) | 2:00 | |
2. Risk Strategies (OBJ. 4.1) | 5:00 | |
3. Risk Management Lifecycle (OBJ. 4.1) | 12:00 | |
4. Risk Types (OBJ. 4.1) | 3:00 | |
5. Risk Handling (OBJ. 4.1) | 9:00 | |
6. Risk Tracking (OBJ. 4.1) | 5:00 | |
7. Risk Assessment (OBJ. 4.1) | 18:00 | |
8. When Risk Management Fails (OBJ. 4.1) | 4:00 |
Policies and Frameworks (Domain 4) | ||
---|---|---|
1. Policies and Frameworks (OBJ. 4.1 & 4.3) | 1:00 | |
2. Policies (OBJ. 4.1) | 12:00 | |
3. Frameworks (OBJ. 4.1) | 5:00 | |
4. Regulations (OBJ. 4.3) | 8:00 | |
5. Standards (OBJ. 4.3) | 6:00 | |
6. Contracts and Agreements (OBJ. 4.3) | 9:00 | |
7. Legal Considerations (OBJ. 4.3) | 7:00 | |
8. Integrating Industries (OBJ. 4.3) | 3:00 |
Business Continuity (Domain 4) | ||
---|---|---|
1. Business Continuity (OBJ 4.4) | 1:00 | |
2. Business Continuity Plan (OBJ 4.4) | 14:00 | |
3. Business Impact Analysis (OBJ 4.4) | 14:00 | |
4. Privacy Impact Assessment (OBJ 4.4) | 4:00 | |
5. Incident Response Plan (OBJ 4.4) | 11:00 | |
6. Testing Plans (OBJ 4.4) | 7:00 |
Risk Strategies (Domain 4) | ||
---|---|---|
1. Risk Strategies (OBJ 4.1) | 2:00 | |
2. Asset Value (OBJ 4.1) | 4:00 | |
3. Access Control (OBJ 4.1) | 6:00 | |
4. Aggregating Risk (OBJ 4.1) | 3:00 | |
5. Scenario Planning (OBJ 4.1) | 8:00 | |
6. Security Controls (OBJ 4.1) | 9:00 | |
7. Security Solutions (OBJ 4.1) | 9:00 | |
8. Cost of a Data Breach (OBJ 4.1) | 6:00 |
Vendor Risk (Domain 4) | ||
---|---|---|
1. Vendor Risk (OBJ 4.2) | 4:00 | |
2. Business Models (OBJ 4.2) | 11:00 | |
3. Influences (OBJ 4.2) | 7:00 | |
4. Organizational Changes (OBJ 4.2) | 6:00 | |
5. Shared Responsibility Model (OBJ 4.2) | 5:00 | |
6. Viability and Support (OBJ 4.2) | 11:00 | |
7. Dependencies (OBJ 4.2) | 5:00 | |
8. Considerations (OBJ 4.2) | 11:00 | |
9. Supply Chain (OBJ 4.2) | 6:00 |
Securing Networks (Domain 1) | ||
---|---|---|
1. Securing Networks (OBJ 1.1) | 7:00 | |
2. Switches (OBJ 1.1) | 7:00 | |
3. Routers (OBJ 1.1) | 8:00 | |
4. Wireless and Mesh (OBJ 1.1) | 3:00 | |
5. Firewalls (OBJ 1.1) | 12:00 | |
6. Configuring Firewalls (OBJ 1.1) | 7:00 | |
7. Proxies (OBJ 1.1) | 7:00 | |
8. Gateways (OBJ 1.1) | 5:00 | |
9. IDS and IPS (OBJ 1.1) | 6:00 | |
10. Network Access Control (NAC) (OBJ 1.1) | 3:00 | |
11. Remote Access (OBJ 1.1) | 9:00 | |
12. Unified Communications (OBJ 1.1) | 19:00 | |
13. Cloud vs On-premise (OBJ 1.1) | 5:00 | |
14. DNSSEC (OBJ 1.1) | 4:00 | |
15. Load Balancer (OBJ 1.1) | 7:00 |
Securing Architectures (Domain 1) | ||
---|---|---|
1. Securing Architectures (OBJ 1.1) | 1:00 | |
2. Traffic Mirroring (OBJ 1.1) | 4:00 | |
3. Network Sensors (OBJ 1.1) | 12:00 | |
4. Host Sensors (OBJ 1.1) | 6:00 | |
5. Layer 2 Segmentation (OBJ 1.1) | 5:00 | |
6. Network Segmentation (OBJ 1.1) | 13:00 | |
7. Implement Network Segmentation (OBJ 1.1) | 10:00 | |
8. Server Segmentation (OBJ 1.1) | 11:00 | |
9. Zero Trust (OBJ 1.1) | 7:00 | |
10. Merging Networks (OBJ 1.1) | 6:00 | |
11. Software-Defined Networking (SDN) (OBJ 1.1) | 5:00 |
Infrastructure Design (Domain 1) | ||
---|---|---|
1. Infrastructure Design (OBJ 1.2) | 1:00 | |
2. Scalability (OBJ 1.2) | 6:00 | |
3. Resiliency Issues (OBJ 1.2) | 13:00 | |
4. Automation (OBJ 1.2) | 6:00 | |
5. Performance Design (OBJ 1.2) | 6:00 | |
6. Virtualization (OBJ 1.2) | 8:00 | |
7. Securing VMs (OBJ 1.2) | 5:00 | |
8. Containerization (OBJ 1.2) | 6:00 |
Cloud and Virtualization (Domain 1) | ||
---|---|---|
1. Cloud and Virtualization (OBJ 1.6) | 1:00 | |
2. Cloud Deployment Models (OBJ 1.6) | 5:00 | |
3. Cloud Service Models (OBJ 1.6) | 5:00 | |
4. Deployment Considerations (OBJ 1.6) | 5:00 | |
5. Provider Limitations (OBJ 1.6) | 3:00 | |
6. Extending Controls (OBJ 1.6) | 5:00 | |
7. Provision and Deprovision (OBJ 1.6) | 3:00 | |
8. Storage Models (OBJ 1.6) | 5:00 | |
9. Virtualization (OBJ 1.6) | 8:00 |
Software Applications (Domain 1) | ||
---|---|---|
1. Software Applications (OBJ 1.3) | 3:00 | |
2. Systems Development Life Cycle (OBJ 1.3) | 7:00 | |
3. Software Development Life Cycle (OBJ 1.3) | 6:00 | |
4. Development Approaches (OBJ 1.3) | 11:00 | |
5. Software Assurance (OBJ 1.3) | 9:00 | |
6. Baselins and Templates (OBJ 1.3) | 7:00 | |
7. Best Practices (OBJ 1.3) | 6:00 | |
8. Integrating Applications (OBJ 1.3) | 5:00 |
Data Security (Domain 1) | ||
---|---|---|
1. Data Security (OBJ 1.4) | 4:00 | |
2. Data Life Cycle (OBJ 1.4) | 10:00 | |
3. Data Classification (OBJ 1.4) | 7:00 | |
4. Labeling and Tagging (OBJ 1.4) | 8:00 | |
5. Deidentification (OBJ 1.4) | 11:00 | |
6. Data Encryption (OBJ 1.4) | 8:00 | |
7. Data Loss Prevention (DLP) (OBJ 1.4) | 10:00 | |
8. DLP Detection (OBJ 1.4) | 7:00 | |
9. Data Loss Detection (OBJ 1.4) | 12:00 | |
10. Auditing Files (OBJ 1.4) | 4:00 |
Authentication and Authorization (Domain 1) | ||
---|---|---|
1. Authentication and Authorization (OBJ 1.5) | 2:00 | |
2. Access Control (OBJ 1.5) | 5:00 | |
3. Credential Management (OBJ 1.5) | 4:00 | |
4. Password Policies (OBJ 1.5) | 8:00 | |
5. Implementing Password Policies (OBJ 1.5) | 5:00 | |
6. Cracking Weak Passwords (OBJ 1.5) | 3:00 | |
7. Multifactor Authentication (OBJ 1.5) | 8:00 | |
8. Authentication Protocols (OBJ 1.5) | 10:00 | |
9. Federation (OBJ 1.5) | 7:00 | |
10. Root of Trust (OBJ 1.5) | 4:00 | |
11. Attestation (OBJ 1.5) | 2:00 | |
12. Identity Proofing (OBJ 1.5) | 4:00 |
Cryptography (Domain 1) | ||
---|---|---|
1. Cryptography (OBJ 1.7) | 2:00 | |
2. Privacy and Confidentiality (OBJ 1.7) | 7:00 | |
3. Integrity and Non-repudiation (OBJ 1.7) | 7:00 | |
4. Compliance and Policy (OBJ 1.7) | 4:00 | |
5. Data States (OBJ 1.7) | 7:00 | |
6. Cryptographic Use Cases (OBJ 1.7) | 6:00 | |
7. PKI Use Cases (OBJ 1.7) | 9:00 |
Emerging Technology (Domain 1) | ||
---|---|---|
1. Emerging Technology (OBJ 1.8) | 4:00 | |
2. Artificial Intelligence (AI) & Machine Learning (ML) (OBJ 1.8) | 9:00 | |
3. Deep Learning (OBJ 1.8) | 9:00 | |
4. Big Data (OBJ 1.8) | 5:00 | |
5. Blockchain & Distributed Consensus (OBJ 1.8) | 6:00 | |
6. Passwordless Authentication (OBJ 1.8) | 5:00 | |
7. Homomorphic Encryption (OBJ 1.8) | 4:00 | |
8. Virtual/Augmented Reality (OBJ 1.8) | 5:00 | |
9. 3D Printing (OBJ 1.8) | 3:00 | |
10. Quantum Computing (OBJ 1.8) | 6:00 |
Enterprise Mobility (Domain 3) | ||
---|---|---|
1. Enterprise Mobility | 3:00 | |
2. Enterprise Mobility Management (EMM) (OBJ. 3.1) | 10:00 | |
3. WPA3 (OBJ. 3.1) | 7:00 | |
4. Connectivity Options (OBJ. 3.1) | 9:00 | |
5. Security Configurations (OBJ. 3.1) | 8:00 | |
6. DNS Protection (OBJ. 3.1) | 3:00 | |
7. Deployment Options (OBJ. 3.1) | 5:00 | |
8. Reconnaissance Concerns (OBJ. 3.1) | 8:00 | |
9. Mobile Security (OBJ. 3.1) | 8:00 |
Endpoint Security Controls (Domain 3) | ||
---|---|---|
1. Endpoint Security Controls | 2:00 | |
2. Device Hardening (OBJ. 3.2) | 9:00 | |
3. Unnecessary Services (OBJ. 3.2) | 6:00 | |
4. Patching (OBJ. 3.2) | 5:00 | |
5. Security Settings (OBJ. 3.2) | 6:00 | |
6. Mandatory Access Controls (MAC) (OBJ. 3.2) | 7:00 | |
7. Secure Boot (OBJ. 3.2) | 6:00 | |
8. Hardware Encryption (OBJ. 3.2) | 5:00 | |
9. Endpoint Protections (OBJ. 3.2) | 10:00 | |
10. Logging and Monitoring (OBJ. 3.2) | 6:00 | |
11. Configuring SIEM Agents (OBJ. 3.2) | 19:00 | |
12. Resiliency (OBJ. 3.2) | 6:00 |
Operational Technologies (Domain 3) | ||
---|---|---|
1. Operational Technologies | 2:00 | |
2. Embedded Systems (OBJ. 3.3) | 10:00 | |
3. ICS and SCADA (OBJ. 3.3) | 9:00 | |
4. ICS Protocols (OBJ. 3.3) | 11:00 | |
5. Industries and Sectors (OBJ. 3.3) | 5:00 |
Hashing and Symmetric Algorithms (Domain 3) | ||
---|---|---|
1. Hashing and Symmetric Algorithms | 1:00 | |
2. Hashing (OBJ. 3.6) | 7:00 | |
3. Calculating Hash Digests (OBJ. 3.6) | 3:00 | |
4. Message Authentication (OBJ. 3.6) | 4:00 | |
5. Symmetric Algorithms (OBJ. 3.6) | 6:00 | |
6. Stream Ciphers (OBJ. 3.6) | 5:00 | |
7. Block Ciphers (OBJ. 3.6) | 10:00 |
Asymmetric Algorithms (Domain 3) | ||
---|---|---|
1. Asymmetric Algorithms | 2:00 | |
2. Using Asymmetric Algortihms | 9:00 | |
3. SSL/TLS and Cipher Suites (OBJ. 3.6) | 8:00 | |
4. S/MIME and SSH (OBJ. 3.6) | 7:00 | |
5. EAP (OBJ. 3.6) | 6:00 | |
6. IPSec (OBJ. 3.6) | 15:00 | |
7. Elliptic Curve Cryptography (ECC) (OBJ. 3.6) | 4:00 | |
8. Forward Secrecy (OBJ. 3.6) | 4:00 | |
9. Authenticated Encryption with Associated Data (AEAD) (OBJ. 3.6) | 2:00 | |
10. Key Stretching (OBJ. 3.6) | 5:00 |
Public Key Infrastructure (Domain 3) | ||
---|---|---|
1. Public Key Infrastructure | 3:00 | |
2. PKI Components (OBJ. 3.5) | 10:00 | |
3. Digital Certificates (OBJ. 3.5) | 8:00 | |
4. Using Digital Certificates (OBJ. 3.5) | 6:00 | |
5. Exploring Server Certificates (OBJ. 3.5) | 4:00 | |
6. Trust Models (OBJ. 3.5) | 4:00 | |
7. Certificate Management (OBJ. 3.5) | 3:00 | |
8. Certificate Validity (CRL and OCSP) (OBJ. 3.5) | 4:00 | |
9. Protecting Web Traffic (OBJ. 3.5) | 4:00 | |
10. Troubleshooting Certificates (OBJ. 3.7) | 5:00 | |
11. Troubleshooting Keys (OBJ. 3.7) | 4:00 |
Threat and Vulnerability Management | ||
---|---|---|
1. Threat and Vulnerability Management | 2:00 | |
2. Threat Intelligence (OBJ. 2.1) | 6:00 | |
3. Threat Hunting (OBJ. 2.1) | 7:00 | |
4. Intelligence Collection (OBJ. 2.1) | 11:00 | |
5. Threat Actors (OBJ. 2.1) | 9:00 | |
6. Threat Management Frameworks (OBJ. 2.1) | 13:00 | |
7. Vulnerability Management Activities (OBJ. 2.3) | 12:00 | |
8. Security Content Automation Protocol (SCAP) (OBJ. 2.3) | 7:00 |
Vulnerability Assessments (Domain 2) | ||
---|---|---|
1. Vulnerability Assessments | 2:00 | |
2. Penetration Test (OBJ. 2.4) | 5:00 | |
3. PenTest Steps (OBJ. 2.4) | 7:00 | |
4. PenTest Requirements (OBJ. 2.4) | 11:00 | |
5. Code Analysis (OBJ. 2.4) | 8:00 | |
6. Protocol Analysis (OBJ. 2.4) | 8:00 | |
7. TCPDump (OBJ. 2.4) | 8:00 | |
8. Wireshark (OBJ. 2.4) | 10:00 | |
9. Nmap (OBJ. 2.4) | 11:00 | |
10. Analysis Utilities (OBJ. 2.4) | 5:00 | |
11. Vulnerability Scanning (OBJ. 2.4) | 9:00 | |
12. Analyzing Scan Outputs (OBJ. 2.4) | 14:00 |
Risk Reduction (Domain 2) | ||
---|---|---|
1. Risk Reduction | 2:00 | |
2. Deceptive Technologies (OBJ. 2.6) | 5:00 | |
3. Security Data Analytics (OBJ. 2.6) | 8:00 | |
4. Preventative Controls (OBJ. 2.6) | 5:00 | |
5. Application Controls (OBJ. 2.6) | 10:00 | |
6. Security Automation (OBJ. 2.6) | 11:00 | |
7. Physical Security (OBJ. 2.6) | 7:00 | |
8. Lock Picking (OBJ. 2.6) | 2:00 |
Analyzing Vulnerabilities (Domain 2) | ||
---|---|---|
1. Analyzing Vulnerabilities | 1:00 | |
2. Race Conditions (OBJ. 2.5) | 5:00 | |
3. Buffer Overflows (OBJ. 2.5) | 12:00 | |
4. Buffer Overflow Attack (OBJ. 2.6) | 6:00 | |
5. Authentication and References (OBJ. 2.5) | 6:00 | |
6. Ciphers and Certificates (OBJ. 2.5) | 11:00 | |
7. Improper Headers (OBJ. 2.5) | 6:00 | |
8. Software Composition (OBJ. 2.5) | 10:00 | |
9. Vulnerable Web Applications (OBJ. 2.5) | 12:00 |
Attacking Vulnerabilities (Domain 2) | ||
---|---|---|
1. Attacking Vulnerabilities | 1:00 | |
2. Directory Traversals (OBJ. 2.5) | 10:00 | |
3. Cross-Site Scripting (XSS) (OBJ. 2.5) | 9:00 | |
4. Cross-Site Request Forgery (CSRF) (OBJ. 2.5) | 7:00 | |
5. SQL Injections (OBJ. 2.5) | 7:00 | |
6. XML Injections (OBJ. 2.5) | 6:00 | |
7. Other Injection Attacks (OBJ. 2.5) | 4:00 | |
8. Authentication Bypass (OBJ. 2.5) | 7:00 | |
9. Web Application Vulnerabilities (OBJ. 2.5) | 9:00 | |
10. VM Attacks (OBJ. 2.5) | 5:00 | |
11. Network Attacks (OBJ. 2.5) | 11:00 | |
12. Analyzing Web Applications (OBJ. 2.5) | 16:00 | |
13. Social Engineering (OBJ. 2.5) | 7:00 | |
14. Phishing Campaigns (OBJ. 2.5) | 5:00 |
Indicators of Compromise (Domain 2) | ||
---|---|---|
1. Indicators of Compromise | 2:00 | |
2. Types of IoCs (OBJ. 2.2) | 4:00 | |
3. PCAP Files (OBJ. 2.2) | 4:00 | |
4. Conduct Packet Analysis (OBJ. 2.2) | 6:00 | |
5. NetFlow (OBJ. 2.2) | 7:00 | |
6. Logs (OBJ. 2.2) | 7:00 | |
7. IoC Notifications (OBJ. 2.2) | 8:00 | |
8. Response to IoCs (OBJ. 2.2) | 5:00 | |
9. Security Appliances (OBJ. 2.2) | 16:00 |
Incident Response (Domain 2) | ||
---|---|---|
1. Incident Response | 1:00 | |
2. Triage (OBJ. 2.7) | 8:00 | |
3. Communication Plan (OBJ. 2.7) | 10:00 | |
4. Stakeholder Management (OBJ. 2.7) | 7:00 | |
5. Incident Response Process (OBJ. 2.7) | 10:00 | |
6. Playbooks (OBJ. 2.7) | 8:00 |
Digital Forensics (Domain 2) | ||
---|---|---|
1. Digital Forensics | 1:00 | |
2. Forensic Process (OBJ. 2.8) | 5:00 | |
3. Chain of Custody (OBJ. 2.8) | 7:00 | |
4. Order of Volatility (OBJ. 2.8) | 7:00 | |
5. Forensic Analysis (OBJ. 2.8) | 7:00 | |
6. Steganography | 4:00 |
Get 100% Latest Exam Questions, Accurate & Verified Answers!
30 Days Free Updates, Instant Download!
Free CAS-004 Exam Questions & CompTIA CAS-004 Dumps | ||
Comptia.examlabs.cas-004.v2024-12-11.by.energizer.49q.ete |
Size: 1.89 MB
Downloads: 78
|
Only Registered Members
Can View Online Video Courses
Please fill out your email address below in order to view Online Courses.. Registration is Free and Easy, You Simply need to provide an email address.
Log into your Prepaway Account
Please Log In to view Online Course
Registration is free and easy - just provide your E-mail address.
Click Here to Register