SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Downloaden Sie, um offline zu lesen
CompTIA Advanced Security Practitioner Certification Exam Objectives 1 of 17
Copyright 2011 by the Computing Technology Industry Association. All rights reserved.
The CASP Certification Exam Objectives are subject to change without notice.
CompTIA Advanced Security Practitioner
Certification Exam Objectives (CAS-001)
INTRODUCTION
The CompTIA Advanced Security Practitioner (CASP) Certification is a vendor-neutral
credential. The CASP exam is an internationally targeted validation of advanced-level
security skills and knowledge. While there is no required prerequisite, the CASP
certification is intended to follow CompTIA Security+ or equivalent experience and has a
technical, ―hands-on‖ focus at the enterprise level.
The CASP exam will certify that the successful candidate has the technical knowledge
and skills required to conceptualize, design, and engineer secure solutions across
complex enterprise environments. The candidate will apply critical thinking and
judgment across a broad spectrum of security disciplines to propose and implement
solutions that map to enterprise drivers.
The CompTIA Advanced Security Practitioner (CASP) Certification is aimed at an IT security
professional who has:
 A minimum of 10 years experience in IT administration including at least 5 years
of hands-on technical security experience.
This examination blueprint includes domain weighting, test objectives, and example
content. Example topics and concepts are included to clarify the test objectives and
should not be construed as a comprehensive listing of all the content of this examination.
The table below lists the domain areas measured by this examination and the approximate
extent to which they are represented in the examination:
Domain % of Examination
1.0 Enterprise Security 40%
2.0 Risk Mgmt, Policy/Procedure and Legal 24%
3.0 Research & Analysis 14%
4.0 Integration of Computing, Communications,
and Business Disciplines
22%
Total 100%
**Candidates should have basic knowledge of vendor specific tools and technologies, as
this knowledge may be required for the CompTIA CASP Certification Exam. CompTIA
has included a sample list of hardware and software at the end of this document to
assist candidates as they prepare for the CASP exam. This list may also be helpful for
training companies who wish to create a lab component to their training offering.
CompTIA Advanced Security Practitioner Certification Exam Objectives 2 of 17
Copyright 2011 by the Computing Technology Industry Association. All rights reserved.
The CASP Certification Exam Objectives are subject to change without notice.
The lists of examples provided in bulleted format below each objective are not exhaustive
lists. Other examples of technologies, processes or tasks pertaining to each objective
may also be included on the exam although not listed or covered in this objectives
document.
1.0 Enterprise Security
1.1 Distinguish which cryptographic tools and techniques are appropriate for a given
situation.
 Cryptographic applications and proper implementation
 Advanced PKI concepts
o Wild card
o OCSP vs. CRL
o Issuance to entities
o Users
o Systems
o Applications
 Implications of cryptographic methods and design
o Strength vs. performance vs. feasibility to implement vs. interoperability
 Transport encryption
 Digital signature
 Hashing
 Code signing
 Non-repudiation
 Entropy
 Pseudo random number generation
 Perfect forward secrecy
 Confusion
 Diffusion
1.2 Distinguish and select among different types of virtualized, distributed and shared
computing
 Advantages and disadvantages of virtualizing servers and minimizing physical
space requirements
 VLAN
 Securing virtual environments, appliances and equipment
 Vulnerabilities associated with a single physical server hosting multiple
companies’ virtual machines
 Vulnerabilities associated with a single platform hosting multiple companies’
virtual machines
 Secure use of on-demand / elastic cloud computing
o Provisioning
o De-provisioning
CompTIA Advanced Security Practitioner Certification Exam Objectives 3 of 17
Copyright 2011 by the Computing Technology Industry Association. All rights reserved.
The CASP Certification Exam Objectives are subject to change without notice.
o Data remnants
 Vulnerabilities associated with co-mingling of hosts with different security
requirements
o VMEscape
o Privilege elevation
 Virtual Desktop Infrastructure (VDI)
 Terminal services
1.3 Explain the security implications of enterprise storage
 Virtual storage
 NAS
 SAN
 vSAN
 iSCSI
 FCOE
 LUN masking
 HBA allocation
 Redundancy (location)
 Secure storage management
o Multipath
o Snapshots
o Deduplication
1.4 Integrate hosts, networks, infrastructures, applications and storage into secure
comprehensive solutions
 Advanced network design
o Remote access
o Placement of security devices
o Critical infrastructure / Supervisory Control and Data Acquisition
(SCADA)
o VoIP
o IPv6
 Complex network security solutions for data flow
 Secure data flows to meet changing business needs
 Secure DNS
o Securing zone transfer
o TSIG
 Secure directory services
o LDAP
o AD
o Federated ID
o Single sign on
 Network design consideration
o Building layouts
o Facilities management
CompTIA Advanced Security Practitioner Certification Exam Objectives 4 of 17
Copyright 2011 by the Computing Technology Industry Association. All rights reserved.
The CASP Certification Exam Objectives are subject to change without notice.
 Multitier networking data design considerations
 Logical deployment diagram and corresponding physical deployment diagram of
all relevant devices
 Secure infrastructure design (e.g. decide where to place certain devices)
 Storage integration (security considerations)
 Advanced configuration of routers, switches and other network devices
o Transport security
o Trunking security
o Route protection
 ESB
 SOA
 SIEM
 Database Access Monitor (DAM)
 Service enabled
 WS-security
1.5 Distinguish among security controls for hosts
 Host-based firewalls
 Trusted OS (e.g. how and when to use it)
 End point security software
o Anti-malware
o Anti-virus
o Anti-spyware
o Spam filters
 Host hardening
o Standard operating environment
o Security/group policy implementation
o Command shell restrictions
o Warning banners
o Restricted interfaces
 Asset management (inventory control)
 Data exfiltration
 HIPS / HIDS
 NIPS/NIDS
1.6 Explain the importance of application security
 Web application security design considerations
o Secure: by design, by default, by deployment
 Specific application issues
o XSS
o Click-jacking
o Session management
o Input validation
o SQL injection
 Application sandboxing
CompTIA Advanced Security Practitioner Certification Exam Objectives 5 of 17
Copyright 2011 by the Computing Technology Industry Association. All rights reserved.
The CASP Certification Exam Objectives are subject to change without notice.
 Application security frameworks
o Standard libraries
o Industry accepted approaches
 Secure coding standards
 Exploits resulting from improper error and exception handling
 Privilege escalation
 Improper storage of sensitive data
 Fuzzing/false injection
 Secure cookie storage and transmission
 Client-side processing vs. server-side processing
o AJAX
o State management
o JavaScript
 Buffer overflow
 Memory leaks
 Integer overflows
 Race conditions
o Time of check
o Time of use
 Resource exhaustion
1.7 Given a scenario, distinguish and select the method or tool that is appropriate to
conduct an assessment
 Tool type
o Port scanners
o Vulnerability scanners
o Protocol analyzer
o Switchport analyzer
o Network enumerator
o Password cracker
o Fuzzer
o HTTP interceptor
o Attacking tools/frameworks
 Methods
o Vulnerability assessment
o Penetration testing
o Black box
o White box
o Grey Box
o Fingerprinting
o Code review
o Social engineering
2.0 Risk Management, Policy / Procedure and Legal
CompTIA Advanced Security Practitioner Certification Exam Objectives 6 of 17
Copyright 2011 by the Computing Technology Industry Association. All rights reserved.
The CASP Certification Exam Objectives are subject to change without notice.
2.1 Analyze the security risk implications associated with business decisions
 Risk management of new products, new technologies and user behaviors
 New or changing business models/strategies
o Partnerships
o Outsourcing
o Mergers
 Internal and external influences
o Audit findings
o Compliance
o Client requirements
o Top level management
 Impact of de-perimiterization (e.g. constantly changing network boundary)
o Considerations of enterprise standard operating environment (SOE) vs.
allowing personally managed devices onto corporate networks
2.2 Execute and implement risk mitigation strategies and controls
 Classify information types into levels of CIA based on organization/industry
 Determine aggregate score of CIA
 Determine minimum required security controls based on aggregate score
 Conduct system specific risk analysis
 Make risk determination
o Magnitude of impact
o Likelihood of threat
 Decide which security controls should be applied based on minimum
requirements
o Avoid
o Transfer
o Mitigate
o Accept
 Implement controls
 ESA frameworks
 Continuous monitoring
2.3 Explain the importance of preparing for and supporting the incident response and
recovery process
 E-Discovery
o Electronic inventory and asset control
o Data retention policies
o Data recovery and storage
o Data ownership
o Data handling
 Data breach
o Recovery
o Minimization
o Mitigation and response
CompTIA Advanced Security Practitioner Certification Exam Objectives 7 of 17
Copyright 2011 by the Computing Technology Industry Association. All rights reserved.
The CASP Certification Exam Objectives are subject to change without notice.
 System design to facilitate incident response taking into account types of
violations
o Internal and external
o Privacy policy violations
o Criminal actions
o Establish and review system event and security logs
 Incident and emergency response
2.4 Implement security and privacy policies and procedures based on organizational
requirements.
 Policy development and updates in light of new business, technology and
environment changes
 Process/procedure development and updated in light of policy, environment and
business changes
 Support legal compliance and advocacy by partnering with HR, legal,
management and other entities
 Use common business documents to support security
o Interconnection Security Agreement (ISA)
o Memorandum of Understanding (MOU)
o Service Level Agreement (SLA)
o Operating Level Agreement (OLA)
o Non-Disclosure Agreement (NDA)
o Business Partnership Agreement (BPA)
 Use general privacy principles for PII / Sensitive PII
 Support the development of policies that contain
o Separation of duties
o Job rotation
o Mandatory vacation
o Least privilege
o Incident response
o Forensic tasks
o On-going security
o Training and awareness for users
o Auditing requirements and frequency
3.0 Research and Analysis
3.1 Analyze industry trends and outline potential impact to the enterprise
 Perform on-going research
o Best practices
o New technologies
o New security systems and services
o Technology evolution (e.g. RFCs, ISO)
 Situational awareness
o Latest client-side attacks
CompTIA Advanced Security Practitioner Certification Exam Objectives 8 of 17
Copyright 2011 by the Computing Technology Industry Association. All rights reserved.
The CASP Certification Exam Objectives are subject to change without notice.
o Threats
o Counter zero day
o Emergent issues
 Research security implications of new business tools
o Social media/networking
o Integration within the business (e.g. advising on the placement of
company material for the general public)
 Global IA industry/community
o Conventions
o Attackers
o Emerging threat sources
 Research security requirements for contracts
o Request for Proposal (RFP)
o Request for Quote (RFQ)
o Request for Information (RFI)
o Agreements
3.2 Carry out relevant analysis for the purpose of securing the enterprise
 Benchmark
 Prototype and test multiple solutions
 Cost benefit analysis (ROI, TCO)
 Analyze and interpret trend data to anticipate cyber defense aids
 Review effectiveness of existing security
 Reverse engineer / deconstruct existing solutions
 Analyze security solutions to ensure they meet business needs
o Specify the performance
o Latency
o Scalability
o Capability
o Usability
o Maintainability
o Availability (MTTR, MTBF)
 Conduct a lessons-learned / after-action review
 Use judgment to solve difficult problems that do not have a best solution
 Conduct network traffic analysis
4.0 Integration of Computing, Communications and Business
Disciplines
4.1 Integrate enterprise disciplines to achieve secure solutions
 Interpreting security requirements and goals to communicate with other
disciplines
o Programmers
o Network engineers
o Sales staff
CompTIA Advanced Security Practitioner Certification Exam Objectives 9 of 17
Copyright 2011 by the Computing Technology Industry Association. All rights reserved.
The CASP Certification Exam Objectives are subject to change without notice.
 Provide guidance and recommendations to staff and senior management on
security processes and controls
 Establish effective collaboration within teams to implement secure solutions
 Disciplines
o Programmer
o Database administrator
o Network administrator
o Management
o Stake holders
o Financial
o HR
o Emergency response team
o Facilities manager
o Physical security manager
4.2 Explain the security impact of inter-organizational change
 Security concerns of interconnecting multiple industries
o Rules, policies and regulations
 Design considerations during mergers, acquisitions and de-mergers
 Assuring third party products - only introduce acceptable risk
o Custom developed
o COTS
 Network secure segmentation and delegation
 Integration of products and services
4.3 Select and distinguish the appropriate security controls with regard to
communications and collaboration
 Unified communication security
o Web conferencing
o Video conferencing
o Instant messaging
o Desktop sharing
o Remote assistance
o Presence
o Email
o Telephony
 VoIP security
 VoIP implementation
 Remote access
 Enterprise configuration management of mobile devices
 Secure external communications
 Secure implementation of collaboration platforms
 Prioritizing traffic (QoS)
 Mobile devices
o Smart phones, IP cameras, laptops, IP based devices
CompTIA Advanced Security Practitioner Certification Exam Objectives 10 of 17
Copyright 2011 by the Computing Technology Industry Association. All rights reserved.
The CASP Certification Exam Objectives are subject to change without notice.
4.4 Explain advanced authentication tools, techniques and concepts
 Federated identity management (SAML)
 XACML
 SOAP
 Single sign on
 SPML
 Certificate based authentication
 Attestation
4.5 Carry out security activities across the technology life cycle
 End to end solution ownership
 Understanding results of solutions in advance
o Operational activities
o Maintenance
o Decommissioning
o General change management
 Systems Development Life Cycle
o Security System Development Life Cycle (SSDLC) / Security
Development Life Cycle (SDL)
o Security Requirements Traceability Matrix (SRTM)
 Adapt solutions to address emerging threats and security trends
 Validate system designs
CompTIA Advanced Security Practitioner Certification Exam Objectives 11 of 17
Copyright 2011 by the Computing Technology Industry Association. All rights reserved.
The CASP Certification Exam Objectives are subject to change without notice.
CASP ACRONYMS
3DES – Triple Digital Encryption Standard
AAA – Authentication, Authorization, and Accounting
ACL – Access Control List
AD—Active Directory
AES - Advanced Encryption Standard
AES256 – Advanced Encryption Standards 256bit
AH - Authentication Header
ALE - Annualized Loss Expectancy
AP - Access Point
ARO - Annualized Rate of Occurrence
ARP - Address Resolution Protocol
AUP - Acceptable Use Policy
BCP – Business Continuity Planning
BIOS – Basic Input / Output System
BOTS – Network Robots
BPA - Business Partnership Agreement
CA – Certificate Authority
CAC - Common Access Card
CAN - Controller Area Network
CCMP – Counter-Mode/CBC-Mac Protocol
CCTV - Closed-circuit television
CERT – Computer Emergency Response Team
CHAP – Challenge Handshake Authentication Protocol
CIA - Cryptographic Information Application
CIA – Confidentiality, Integrity, and Availability
CIFS- Common Internet File System
CIRT – Computer Incident Response Team
CISO – Chief Information Security Officer
CMDB- Configuration Management Database
COOP- Continuity of Operations
CRC – Cyclical Redundancy Check
CredSSP – Credential Security Support Provider
CRL – Certification Revocation List
CRM- Customer Relationship Management
DAC – Discretionary Access Control
DDOS – Distributed Denial of Service
DEP – Data Execution Prevention
DES – Digital Encryption Standard
DHCP – Dynamic Host Configuration Protocol
DLL - Dynamic Link Library
DLP - Data Loss Prevention
DMZ – Demilitarized Zone
DNS – Domain Name Service (Server)
DOS – Denial of Service
CompTIA Advanced Security Practitioner Certification Exam Objectives 12 of 17
Copyright 2011 by the Computing Technology Industry Association. All rights reserved.
The CASP Certification Exam Objectives are subject to change without notice.
DRP – Disaster Recovery Plan
DSA – Digital Signature Algorithm
EAP - Extensible Authentication Protocol
ECC - Elliptic Curve Cryptography
EFS – Encrypted File System
ELA- Enterprise License Agreement
EMI – Electromagnetic Interference
ESA- Enterprise Security Architecture
ESB—Enterprise Service Bus
ESP – Encapsulated Security Payload
FCOE – Fiber Channel Over Ethernet
FTP – File Transfer Protocol
GPU - Graphic Processing Unit
GRC – Governance, Risk, & Compliance
GRE - Generic Routing Encapsulation
HBA- Host Based Adapter
HBA – Host Based Authentication
HDD – Hard Disk Drive
HIDS – Host Based Intrusion Detection System
HIPS – Host Based Intrusion Prevention System
HMAC – Hashed Message Authentication Code
HSM – Hardware Security Module
HTTP – Hypertext Transfer Protocol
HTTPS – Hypertext Transfer Protocol over SSL
HVAC – Heating, Ventilation Air Conditioning
IaaS - Infrastructure as a Service
ICMP - Internet Control Message Protocol
ID – Identification
IDF- Intermediate Distribution Frame
IdM- Identity Management
IDP- Identity Provider
IDS – Intrusion Detection System
IETF – Internet Engineering Task Force
IKE – Internet Key Exchange
IM - Instant messaging
IMAP4 - Internet Message Access Protocol v4
IP - Internet Protocol
IPS – Intrusion Prevention Systems
IPSec – Internet Protocol Security
IRC - Internet Relay Chat
ISA--Interconnection Security Agreement
ISP – Internet Service Provider
IV - Initialization Vector
KDC - Key Distribution Center
L2TP – Layer 2 Tunneling Protocol
LANMAN – Local Area Network Manager
CompTIA Advanced Security Practitioner Certification Exam Objectives 13 of 17
Copyright 2011 by the Computing Technology Industry Association. All rights reserved.
The CASP Certification Exam Objectives are subject to change without notice.
LDAP – Lightweight Directory Access Protocol
LEAP – Lightweight Extensible Authentication Protocol
LUN – Link Uninhibit
MAC – Mandatory Access Control / Media Access Control
MAC - Message Authentication Code
MAN - Metropolitan Area Network
MBR – Master Boot Record
MD5 – Message Digest 5
MDF- Main Distribution Frame
MFD- Multifunction Device
MOA- Memorandum of Agreement
MOU--Memorandum of Understanding
MPLS – Multiprotocol Label Switching
MSCHAP – Microsoft Challenge Handshake Authentication Protocol
MSS – Managed Security Service
MTBF- Mean-Time Between Failure
MTTR- Mean Time To Recovery
MTU - Maximum Transmission Unit
NAC – Network Access Control
NAS- Network Attached Storage
NAT – Network Address Translation
NDA--Non-Disclosure Agreement
NIDS – Network Based Intrusion Detection System
NIPS – Network Based Intrusion Prevention System
NIST – National Institute of Standards & Technology
NLA – Network Level Authentication
NOS – Network Operating System
NTFS - New Technology File System
NTLM – New Technology LANMAN
NTP - Network Time Protocol
OCSP—Online Certificate Status Protocol
OLA--Operating Level Agreement
ORB- Object Request Broker
OS – Operating System
OVAL – Open Vulnerability Assessment Language
PaaS- Platform as a Service
PAP – Password Authentication Protocol
PAT - Port Address Translation
PBX – Private Branch Exchange
PCI-DSS- Payment Card Industry Data Security Standard
PDP- Policy Distribution Point
PEAP – Protected Extensible Authentication Protocol
PED - Personal Electronic Device
PEP- Policy Enforcement Point
PFS- Perfect Forward Secrecy
PGP – Pretty Good Privacy
CompTIA Advanced Security Practitioner Certification Exam Objectives 14 of 17
Copyright 2011 by the Computing Technology Industry Association. All rights reserved.
The CASP Certification Exam Objectives are subject to change without notice.
PII – Personally Identifiable Information
PII-Personal Identifiable Information
PIP- Policy Information Point
PKI – Public Key Infrastructure
POTS – Plain Old Telephone Service
PPP - Point-to-point Protocol
PPTP – Point to Point Tunneling Protocol
PSK – Pre-Shared Key
PTZ – Pan-Tilt-Zoom
QoS- Quality of Service
RA – Recovery Agent
RAD - Rapid application development
RADIUS – Remote Authentication Dial-in User Server
RAID – Redundant Array of Inexpensive Disks
RAS – Remote Access Server
RBAC – Role Based Access Control
RBAC – Rule Based Access Control
RFI- Request for Information
RFP- Request for Proposal
RFQ- Request for Quote
RSA – Rivest, Shamir, & Adleman
RTO – Recovery Time Objective
RTP – Real-Time Transport Protocol
S/MIME – Secure / Multipurpose internet Mail Extensions
SaaS - Software as a Service
SAML--Security Assertions Markup Language
SAN – Storage Area Network
SCADA—Supervisory Control and Data Acquisition
SCAP - Security Content Automation Protocol
SCP- Secure Copy
SCSI - Small Computer System Interface
SDL- Security Development Life Cycle
SDLC - Software Development Life Cycle
SDLM - Software Development Life Cycle Methodology
SHA – Secure Hashing Algorithm
SHTTP – Secure Hypertext Transfer Protocol
SIEM- Security Information Event Management
SIM – Subscriber Identity Module
SLA – Service Level Agreement
SLA--Service Level Agreement
SLE - Single Loss Expectancy
S/MIME – Secure / Multipurpose Internet Mail Extensions
SMS - Short Message Service
SMTP – Simple Mail Transfer Protocol
SNMP - Simple Network Management Protocol
SOAP--Simple Object Access Protocol
CompTIA Advanced Security Practitioner Certification Exam Objectives 15 of 17
Copyright 2011 by the Computing Technology Industry Association. All rights reserved.
The CASP Certification Exam Objectives are subject to change without notice.
SOA- Service Oriented Architecture
SOA--Start of Authority
SOE- Standard Operating Environment
SONET – Synchronous Optical Network Technologies
SOX- Sarbanes–Oxley Act
SP- Service Provider
SPIM - Spam over Internet Messaging
SPIT- Spam over Internet Telephony
SPML- Service Provisioning Markup Language
SRTM- Software Requirements Traceability Matrix
SRTP – Secure Real-time Protocol
SSD- Solid State Drive
SSDLC-- Security System Development Life Cycle
SSH – Secure Shell
SSL – Secure Sockets Layer
SSO – Single Sign On
STP – Shielded Twisted Pair
TACACS – Terminal Access Controller Access Control System
TCO – Total Cost of Ownership
TCP/IP – Transmission Control Protocol / Internet Protocol
TKIP - Temporal Key Integrity Protocol
TLS – Transport Layer Security
TOS- Type of Service
TPM – Trusted Platform Module
TSIG- Transaction Signature Interoperability Group
UAC – User Access Control
UAT - User Acceptance Testing
UDDI- Universal Description Discovery and Integration
UDP – User Datagram Protocol
UPS - Uninterruptable Power Supply
URL - Universal Resource Locator
USB – Universal Serial Bus
UTP – Unshielded Twisted Pair
VDI—Virtual Desktop Infrastructure
VLAN – Virtual Local Area Network
VoIP - Voice over IP
VPN – Virtual Private Network
vSAN – Virtual Storage Area Network
VTC – Video Teleconferencing
WAC- Web Access Control
WAF- Web-Application Firewall
WAP – Wireless Access Point
WAYF- Where Are You From
WEP – Wired Equivalent Privacy
WIDS – Wireless Intrusion Detection System
WIPS – Wireless Intrusion Prevention System
CompTIA Advanced Security Practitioner Certification Exam Objectives 16 of 17
Copyright 2011 by the Computing Technology Industry Association. All rights reserved.
The CASP Certification Exam Objectives are subject to change without notice.
WPA – Wireless Protected Access
WSDL- Web Services Description Language
XSRF - Cross-Site Request Forgery
CSRF- Cross-Site Request Forgery
XACML- eXtensible Access Control Markup Language
XSS - Cross-Site Scripting
CASP Proposed Hardware and Software List
**Candidates should have basic knowledge of vendor specific tools and technologies, as
this knowledge may be required for the CompTIA CASP Certification Exam. CompTIA
has included this sample list of hardware and software to assist candidates as they prepare
for the CASP exam. This list may also be helpful for training companies who wish to
create a lab component to their training offering.
Equipment
 Laptops
 Virtualized appliances (firewall, IPS, SIEM solution, RSA authentication,
Asterisk PBX)
 Basic server hardware (Email server/active directory server, trusted OS)
 Basic NAS (―Free NAS‖)
 Tokens
 Mobile devices
 2 switches (managed switch) – IPv6 capable
 Router - IPv6 capable
 Gateway
 WAP
 WAF
 IPv6 and IPv4
 Proxy server
 Load balancer
 CA server
Spare hardware
 NICs
 Power supplies
 External USB flash drive
 Access points
Spare parts
 Patch cables
CompTIA Advanced Security Practitioner Certification Exam Objectives 17 of 17
Copyright 2011 by the Computing Technology Industry Association. All rights reserved.
The CASP Certification Exam Objectives are subject to change without notice.
Software
 Packet Sniffer
 Vulnerable web applications (web-goat, hacme bank, dvl)
 Windows
 Linux
 VMWare player / Virtualbox
 Vulnerability assessment tools
 Visio (diagramming software)
 Port scanner
 SSH and Telnet utilities
 Threat modeling tool
 Host IPS
 Helix software
 Backtrack CD
Other
 Sample logs
 Sample network traffic (pcap)
 Sample organizational structure
 Sample network documentation

Weitere ähnliche Inhalte

Was ist angesagt?

How the Cloud Shifts the Burden of Security to Development
How the Cloud Shifts the Burden of Security to DevelopmentHow the Cloud Shifts the Burden of Security to Development
How the Cloud Shifts the Burden of Security to DevelopmentErika Barron
 
Aricent Highly Automated Vulnerability Assessment Orchestration Containers (H...
Aricent Highly Automated Vulnerability Assessment Orchestration Containers (H...Aricent Highly Automated Vulnerability Assessment Orchestration Containers (H...
Aricent Highly Automated Vulnerability Assessment Orchestration Containers (H...Aricent
 
Datasheet app vulnerability_assess
Datasheet app vulnerability_assessDatasheet app vulnerability_assess
Datasheet app vulnerability_assessBirodh Rijal
 
What’s making way for secure sdlc
What’s making way for secure sdlcWhat’s making way for secure sdlc
What’s making way for secure sdlcAvancercorp
 
The What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsThe What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsCprime
 
24may 1200 valday eric anklesaria 'secure sdlc – core banking'
24may 1200 valday eric anklesaria 'secure sdlc – core banking'24may 1200 valday eric anklesaria 'secure sdlc – core banking'
24may 1200 valday eric anklesaria 'secure sdlc – core banking'Positive Hack Days
 
AKS IT Corporate Presentation
AKS IT Corporate PresentationAKS IT Corporate Presentation
AKS IT Corporate Presentationaksit_services
 
Owasp Proactive Controls for Web developer
Owasp  Proactive Controls for Web developerOwasp  Proactive Controls for Web developer
Owasp Proactive Controls for Web developerSameer Paradia
 
Integrating Security Across SDLC Phases
Integrating Security Across SDLC PhasesIntegrating Security Across SDLC Phases
Integrating Security Across SDLC PhasesIshrath Sultana
 
Michael.aguilar
Michael.aguilarMichael.aguilar
Michael.aguilarNASAPMC
 
Secure SDLC Framework
Secure SDLC FrameworkSecure SDLC Framework
Secure SDLC FrameworkRishi Kant
 
Virtualization and cloud impact overview auditor spin enterprise gr-cv3
Virtualization and cloud impact overview auditor spin   enterprise gr-cv3Virtualization and cloud impact overview auditor spin   enterprise gr-cv3
Virtualization and cloud impact overview auditor spin enterprise gr-cv3EnterpriseGRC Solutions, Inc.
 
Fact vs-hype top10
Fact vs-hype top10Fact vs-hype top10
Fact vs-hype top10Usman Arif
 
Cybersecurity Vendor Considerations
Cybersecurity Vendor ConsiderationsCybersecurity Vendor Considerations
Cybersecurity Vendor ConsiderationsEnergySec
 
Unsustainable Regaining Control of Uncontrollable Apps
Unsustainable Regaining Control of Uncontrollable AppsUnsustainable Regaining Control of Uncontrollable Apps
Unsustainable Regaining Control of Uncontrollable AppsCAST
 
Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...
Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...
Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...CSCJournals
 
Safeguarding Against the Risks of Improper Open Source Licensing - Valuable...
Safeguarding Against the Risks of Improper Open Source Licensing - Valuable...Safeguarding Against the Risks of Improper Open Source Licensing - Valuable...
Safeguarding Against the Risks of Improper Open Source Licensing - Valuable...ActiveState
 

Was ist angesagt? (20)

How the Cloud Shifts the Burden of Security to Development
How the Cloud Shifts the Burden of Security to DevelopmentHow the Cloud Shifts the Burden of Security to Development
How the Cloud Shifts the Burden of Security to Development
 
Aricent Highly Automated Vulnerability Assessment Orchestration Containers (H...
Aricent Highly Automated Vulnerability Assessment Orchestration Containers (H...Aricent Highly Automated Vulnerability Assessment Orchestration Containers (H...
Aricent Highly Automated Vulnerability Assessment Orchestration Containers (H...
 
Datasheet app vulnerability_assess
Datasheet app vulnerability_assessDatasheet app vulnerability_assess
Datasheet app vulnerability_assess
 
What’s making way for secure sdlc
What’s making way for secure sdlcWhat’s making way for secure sdlc
What’s making way for secure sdlc
 
The What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsThe What, Why, and How of DevSecOps
The What, Why, and How of DevSecOps
 
24may 1200 valday eric anklesaria 'secure sdlc – core banking'
24may 1200 valday eric anklesaria 'secure sdlc – core banking'24may 1200 valday eric anklesaria 'secure sdlc – core banking'
24may 1200 valday eric anklesaria 'secure sdlc – core banking'
 
AKS IT Corporate Presentation
AKS IT Corporate PresentationAKS IT Corporate Presentation
AKS IT Corporate Presentation
 
Aksit profile final
Aksit profile finalAksit profile final
Aksit profile final
 
Owasp Proactive Controls for Web developer
Owasp  Proactive Controls for Web developerOwasp  Proactive Controls for Web developer
Owasp Proactive Controls for Web developer
 
Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10
 
Integrating Security Across SDLC Phases
Integrating Security Across SDLC PhasesIntegrating Security Across SDLC Phases
Integrating Security Across SDLC Phases
 
Michael.aguilar
Michael.aguilarMichael.aguilar
Michael.aguilar
 
Information Security and the SDLC
Information Security and the SDLCInformation Security and the SDLC
Information Security and the SDLC
 
Secure SDLC Framework
Secure SDLC FrameworkSecure SDLC Framework
Secure SDLC Framework
 
Virtualization and cloud impact overview auditor spin enterprise gr-cv3
Virtualization and cloud impact overview auditor spin   enterprise gr-cv3Virtualization and cloud impact overview auditor spin   enterprise gr-cv3
Virtualization and cloud impact overview auditor spin enterprise gr-cv3
 
Fact vs-hype top10
Fact vs-hype top10Fact vs-hype top10
Fact vs-hype top10
 
Cybersecurity Vendor Considerations
Cybersecurity Vendor ConsiderationsCybersecurity Vendor Considerations
Cybersecurity Vendor Considerations
 
Unsustainable Regaining Control of Uncontrollable Apps
Unsustainable Regaining Control of Uncontrollable AppsUnsustainable Regaining Control of Uncontrollable Apps
Unsustainable Regaining Control of Uncontrollable Apps
 
Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...
Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...
Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...
 
Safeguarding Against the Risks of Improper Open Source Licensing - Valuable...
Safeguarding Against the Risks of Improper Open Source Licensing - Valuable...Safeguarding Against the Risks of Improper Open Source Licensing - Valuable...
Safeguarding Against the Risks of Improper Open Source Licensing - Valuable...
 

Ähnlich wie CompTIA CASP Objectives

CompTIA CAS-002 VCE Outline
CompTIA CAS-002 VCE OutlineCompTIA CAS-002 VCE Outline
CompTIA CAS-002 VCE OutlineExamcollection
 
CompTIA Security+ Objectives
CompTIA Security+ ObjectivesCompTIA Security+ Objectives
CompTIA Security+ Objectivessombat nirund
 
John kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultantJohn kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultantJohn Kingsley
 
Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation Cisco DevNet
 
Oak Systems - When you build Software, we build Quality in it
Oak Systems - When you build Software, we build Quality in it Oak Systems - When you build Software, we build Quality in it
Oak Systems - When you build Software, we build Quality in it Oak Systems
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsEnergySec
 
CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)
CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)
CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)CISQ - Consortium for IT Software Quality
 
"Exploring the Diverse World of CCNP Certifications" .pdf
"Exploring the Diverse World of CCNP Certifications"  .pdf"Exploring the Diverse World of CCNP Certifications"  .pdf
"Exploring the Diverse World of CCNP Certifications" .pdfarjunnegi34
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM
 
TIANQIANG_Carl_Network_Security
TIANQIANG_Carl_Network_SecurityTIANQIANG_Carl_Network_Security
TIANQIANG_Carl_Network_Securitycarl yu
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsBen Rothke
 
Bangalore based Test automation and Testing service Company - Oak Systems Pvt...
Bangalore based Test automation and Testing service Company - Oak Systems Pvt...Bangalore based Test automation and Testing service Company - Oak Systems Pvt...
Bangalore based Test automation and Testing service Company - Oak Systems Pvt...OAK Systems Pvt Ltd
 
Didiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - EnglishDidiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - EnglishDidiet Kusumadihardja
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessMicrosoft Tech Community
 
Plataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação CibernéticaPlataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação CibernéticaHamilton Oliveira
 
Maintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixMaintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixHCLSoftware
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소GE코리아
 
Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...Hassan EL ALLOUSSI
 

Ähnlich wie CompTIA CASP Objectives (20)

CompTIA CAS-002 VCE Outline
CompTIA CAS-002 VCE OutlineCompTIA CAS-002 VCE Outline
CompTIA CAS-002 VCE Outline
 
CompTIA Security+ Objectives
CompTIA Security+ ObjectivesCompTIA Security+ Objectives
CompTIA Security+ Objectives
 
John kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultantJohn kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultant
 
CMMC Breakdown
CMMC BreakdownCMMC Breakdown
CMMC Breakdown
 
Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation
 
Oak Systems - When you build Software, we build Quality in it
Oak Systems - When you build Software, we build Quality in it Oak Systems - When you build Software, we build Quality in it
Oak Systems - When you build Software, we build Quality in it
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and Mitigations
 
CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)
CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)
CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)
 
"Exploring the Diverse World of CCNP Certifications" .pdf
"Exploring the Diverse World of CCNP Certifications"  .pdf"Exploring the Diverse World of CCNP Certifications"  .pdf
"Exploring the Diverse World of CCNP Certifications" .pdf
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
TIANQIANG_Carl_Network_Security
TIANQIANG_Carl_Network_SecurityTIANQIANG_Carl_Network_Security
TIANQIANG_Carl_Network_Security
 
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  YrsFinto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applications
 
Bangalore based Test automation and Testing service Company - Oak Systems Pvt...
Bangalore based Test automation and Testing service Company - Oak Systems Pvt...Bangalore based Test automation and Testing service Company - Oak Systems Pvt...
Bangalore based Test automation and Testing service Company - Oak Systems Pvt...
 
Didiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - EnglishDidiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - English
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
Plataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação CibernéticaPlataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação Cibernética
 
Maintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixMaintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFix
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...
 

Mehr von sombat nirund

การทาปุ๋ยหมักชีวภาพจากขี้เลื่อย
การทาปุ๋ยหมักชีวภาพจากขี้เลื่อยการทาปุ๋ยหมักชีวภาพจากขี้เลื่อย
การทาปุ๋ยหมักชีวภาพจากขี้เลื่อยsombat nirund
 
ผลของการใช้วัสดุเพาะและวัสดุอาหารเสริมชนิดต่าง ๆ ร่วมกับกลุ่มจุลินทรีย์และนํ้...
ผลของการใช้วัสดุเพาะและวัสดุอาหารเสริมชนิดต่าง ๆ ร่วมกับกลุ่มจุลินทรีย์และนํ้...ผลของการใช้วัสดุเพาะและวัสดุอาหารเสริมชนิดต่าง ๆ ร่วมกับกลุ่มจุลินทรีย์และนํ้...
ผลของการใช้วัสดุเพาะและวัสดุอาหารเสริมชนิดต่าง ๆ ร่วมกับกลุ่มจุลินทรีย์และนํ้...sombat nirund
 
ประสิทธิภาพของน้าหมักชีวภาพในการเพาะเห็ด
ประสิทธิภาพของน้าหมักชีวภาพในการเพาะเห็ดประสิทธิภาพของน้าหมักชีวภาพในการเพาะเห็ด
ประสิทธิภาพของน้าหมักชีวภาพในการเพาะเห็ดsombat nirund
 
การศึกษาประสิทธิภาพของน้ำหมักชีวภาพจากเศษดอกเห็ดที่มีผลต่อผลผลิตของเห็ดนางฟ้า
การศึกษาประสิทธิภาพของน้ำหมักชีวภาพจากเศษดอกเห็ดที่มีผลต่อผลผลิตของเห็ดนางฟ้าการศึกษาประสิทธิภาพของน้ำหมักชีวภาพจากเศษดอกเห็ดที่มีผลต่อผลผลิตของเห็ดนางฟ้า
การศึกษาประสิทธิภาพของน้ำหมักชีวภาพจากเศษดอกเห็ดที่มีผลต่อผลผลิตของเห็ดนางฟ้าsombat nirund
 
8.ถ่ายเชื้อข้างฟ่างลงก้อนเห็ด
8.ถ่ายเชื้อข้างฟ่างลงก้อนเห็ด8.ถ่ายเชื้อข้างฟ่างลงก้อนเห็ด
8.ถ่ายเชื้อข้างฟ่างลงก้อนเห็ดsombat nirund
 
6.การต่อเชื้อข้าวฟ่างสู่ข้าวฟ่าง
6.การต่อเชื้อข้าวฟ่างสู่ข้าวฟ่าง6.การต่อเชื้อข้าวฟ่างสู่ข้าวฟ่าง
6.การต่อเชื้อข้าวฟ่างสู่ข้าวฟ่างsombat nirund
 
3.การต่อเชื้อวุ้นสู่วุ้น
3.การต่อเชื้อวุ้นสู่วุ้น3.การต่อเชื้อวุ้นสู่วุ้น
3.การต่อเชื้อวุ้นสู่วุ้นsombat nirund
 
1.การเขี่ยเนื้อเยื่อเห็ดดอเห็ดเพื่อทำพันธุ์(ดอกสู่วุ้น)
1.การเขี่ยเนื้อเยื่อเห็ดดอเห็ดเพื่อทำพันธุ์(ดอกสู่วุ้น)1.การเขี่ยเนื้อเยื่อเห็ดดอเห็ดเพื่อทำพันธุ์(ดอกสู่วุ้น)
1.การเขี่ยเนื้อเยื่อเห็ดดอเห็ดเพื่อทำพันธุ์(ดอกสู่วุ้น)sombat nirund
 
4.การเตรียมข้าวฟ่าง
4.การเตรียมข้าวฟ่าง4.การเตรียมข้าวฟ่าง
4.การเตรียมข้าวฟ่างsombat nirund
 
2.การเตรียมอาหารวุ้น
2.การเตรียมอาหารวุ้น2.การเตรียมอาหารวุ้น
2.การเตรียมอาหารวุ้นsombat nirund
 
12.การดูแลก้อนเห็ด
12.การดูแลก้อนเห็ด12.การดูแลก้อนเห็ด
12.การดูแลก้อนเห็ดsombat nirund
 
9.การเปิดดอก
9.การเปิดดอก9.การเปิดดอก
9.การเปิดดอกsombat nirund
 
7.การทำก้อน ตอนที่3
7.การทำก้อน ตอนที่37.การทำก้อน ตอนที่3
7.การทำก้อน ตอนที่3sombat nirund
 
7.การทำก้อน ตอนที่2
7.การทำก้อน ตอนที่27.การทำก้อน ตอนที่2
7.การทำก้อน ตอนที่2sombat nirund
 
7.การทำก้อน ตอนที่1
7.การทำก้อน ตอนที่17.การทำก้อน ตอนที่1
7.การทำก้อน ตอนที่1sombat nirund
 
11.การนึ่งแบบไม่ใช้หม้อแรงดัน
11.การนึ่งแบบไม่ใช้หม้อแรงดัน11.การนึ่งแบบไม่ใช้หม้อแรงดัน
11.การนึ่งแบบไม่ใช้หม้อแรงดันsombat nirund
 
Business case CompTIA by DragonsMove
Business case CompTIA by DragonsMoveBusiness case CompTIA by DragonsMove
Business case CompTIA by DragonsMovesombat nirund
 
CompTIA IT Skills Presentation
CompTIA IT Skills PresentationCompTIA IT Skills Presentation
CompTIA IT Skills Presentationsombat nirund
 
CompTIA Green IT Objectives
CompTIA Green IT ObjectivesCompTIA Green IT Objectives
CompTIA Green IT Objectivessombat nirund
 
CompTIA CTT+ Overview
CompTIA CTT+ OverviewCompTIA CTT+ Overview
CompTIA CTT+ Overviewsombat nirund
 

Mehr von sombat nirund (20)

การทาปุ๋ยหมักชีวภาพจากขี้เลื่อย
การทาปุ๋ยหมักชีวภาพจากขี้เลื่อยการทาปุ๋ยหมักชีวภาพจากขี้เลื่อย
การทาปุ๋ยหมักชีวภาพจากขี้เลื่อย
 
ผลของการใช้วัสดุเพาะและวัสดุอาหารเสริมชนิดต่าง ๆ ร่วมกับกลุ่มจุลินทรีย์และนํ้...
ผลของการใช้วัสดุเพาะและวัสดุอาหารเสริมชนิดต่าง ๆ ร่วมกับกลุ่มจุลินทรีย์และนํ้...ผลของการใช้วัสดุเพาะและวัสดุอาหารเสริมชนิดต่าง ๆ ร่วมกับกลุ่มจุลินทรีย์และนํ้...
ผลของการใช้วัสดุเพาะและวัสดุอาหารเสริมชนิดต่าง ๆ ร่วมกับกลุ่มจุลินทรีย์และนํ้...
 
ประสิทธิภาพของน้าหมักชีวภาพในการเพาะเห็ด
ประสิทธิภาพของน้าหมักชีวภาพในการเพาะเห็ดประสิทธิภาพของน้าหมักชีวภาพในการเพาะเห็ด
ประสิทธิภาพของน้าหมักชีวภาพในการเพาะเห็ด
 
การศึกษาประสิทธิภาพของน้ำหมักชีวภาพจากเศษดอกเห็ดที่มีผลต่อผลผลิตของเห็ดนางฟ้า
การศึกษาประสิทธิภาพของน้ำหมักชีวภาพจากเศษดอกเห็ดที่มีผลต่อผลผลิตของเห็ดนางฟ้าการศึกษาประสิทธิภาพของน้ำหมักชีวภาพจากเศษดอกเห็ดที่มีผลต่อผลผลิตของเห็ดนางฟ้า
การศึกษาประสิทธิภาพของน้ำหมักชีวภาพจากเศษดอกเห็ดที่มีผลต่อผลผลิตของเห็ดนางฟ้า
 
8.ถ่ายเชื้อข้างฟ่างลงก้อนเห็ด
8.ถ่ายเชื้อข้างฟ่างลงก้อนเห็ด8.ถ่ายเชื้อข้างฟ่างลงก้อนเห็ด
8.ถ่ายเชื้อข้างฟ่างลงก้อนเห็ด
 
6.การต่อเชื้อข้าวฟ่างสู่ข้าวฟ่าง
6.การต่อเชื้อข้าวฟ่างสู่ข้าวฟ่าง6.การต่อเชื้อข้าวฟ่างสู่ข้าวฟ่าง
6.การต่อเชื้อข้าวฟ่างสู่ข้าวฟ่าง
 
3.การต่อเชื้อวุ้นสู่วุ้น
3.การต่อเชื้อวุ้นสู่วุ้น3.การต่อเชื้อวุ้นสู่วุ้น
3.การต่อเชื้อวุ้นสู่วุ้น
 
1.การเขี่ยเนื้อเยื่อเห็ดดอเห็ดเพื่อทำพันธุ์(ดอกสู่วุ้น)
1.การเขี่ยเนื้อเยื่อเห็ดดอเห็ดเพื่อทำพันธุ์(ดอกสู่วุ้น)1.การเขี่ยเนื้อเยื่อเห็ดดอเห็ดเพื่อทำพันธุ์(ดอกสู่วุ้น)
1.การเขี่ยเนื้อเยื่อเห็ดดอเห็ดเพื่อทำพันธุ์(ดอกสู่วุ้น)
 
4.การเตรียมข้าวฟ่าง
4.การเตรียมข้าวฟ่าง4.การเตรียมข้าวฟ่าง
4.การเตรียมข้าวฟ่าง
 
2.การเตรียมอาหารวุ้น
2.การเตรียมอาหารวุ้น2.การเตรียมอาหารวุ้น
2.การเตรียมอาหารวุ้น
 
12.การดูแลก้อนเห็ด
12.การดูแลก้อนเห็ด12.การดูแลก้อนเห็ด
12.การดูแลก้อนเห็ด
 
9.การเปิดดอก
9.การเปิดดอก9.การเปิดดอก
9.การเปิดดอก
 
7.การทำก้อน ตอนที่3
7.การทำก้อน ตอนที่37.การทำก้อน ตอนที่3
7.การทำก้อน ตอนที่3
 
7.การทำก้อน ตอนที่2
7.การทำก้อน ตอนที่27.การทำก้อน ตอนที่2
7.การทำก้อน ตอนที่2
 
7.การทำก้อน ตอนที่1
7.การทำก้อน ตอนที่17.การทำก้อน ตอนที่1
7.การทำก้อน ตอนที่1
 
11.การนึ่งแบบไม่ใช้หม้อแรงดัน
11.การนึ่งแบบไม่ใช้หม้อแรงดัน11.การนึ่งแบบไม่ใช้หม้อแรงดัน
11.การนึ่งแบบไม่ใช้หม้อแรงดัน
 
Business case CompTIA by DragonsMove
Business case CompTIA by DragonsMoveBusiness case CompTIA by DragonsMove
Business case CompTIA by DragonsMove
 
CompTIA IT Skills Presentation
CompTIA IT Skills PresentationCompTIA IT Skills Presentation
CompTIA IT Skills Presentation
 
CompTIA Green IT Objectives
CompTIA Green IT ObjectivesCompTIA Green IT Objectives
CompTIA Green IT Objectives
 
CompTIA CTT+ Overview
CompTIA CTT+ OverviewCompTIA CTT+ Overview
CompTIA CTT+ Overview
 

Kürzlich hochgeladen

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Kürzlich hochgeladen (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

CompTIA CASP Objectives

  • 1. CompTIA Advanced Security Practitioner Certification Exam Objectives 1 of 17 Copyright 2011 by the Computing Technology Industry Association. All rights reserved. The CASP Certification Exam Objectives are subject to change without notice. CompTIA Advanced Security Practitioner Certification Exam Objectives (CAS-001) INTRODUCTION The CompTIA Advanced Security Practitioner (CASP) Certification is a vendor-neutral credential. The CASP exam is an internationally targeted validation of advanced-level security skills and knowledge. While there is no required prerequisite, the CASP certification is intended to follow CompTIA Security+ or equivalent experience and has a technical, ―hands-on‖ focus at the enterprise level. The CASP exam will certify that the successful candidate has the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. The candidate will apply critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers. The CompTIA Advanced Security Practitioner (CASP) Certification is aimed at an IT security professional who has:  A minimum of 10 years experience in IT administration including at least 5 years of hands-on technical security experience. This examination blueprint includes domain weighting, test objectives, and example content. Example topics and concepts are included to clarify the test objectives and should not be construed as a comprehensive listing of all the content of this examination. The table below lists the domain areas measured by this examination and the approximate extent to which they are represented in the examination: Domain % of Examination 1.0 Enterprise Security 40% 2.0 Risk Mgmt, Policy/Procedure and Legal 24% 3.0 Research & Analysis 14% 4.0 Integration of Computing, Communications, and Business Disciplines 22% Total 100% **Candidates should have basic knowledge of vendor specific tools and technologies, as this knowledge may be required for the CompTIA CASP Certification Exam. CompTIA has included a sample list of hardware and software at the end of this document to assist candidates as they prepare for the CASP exam. This list may also be helpful for training companies who wish to create a lab component to their training offering.
  • 2. CompTIA Advanced Security Practitioner Certification Exam Objectives 2 of 17 Copyright 2011 by the Computing Technology Industry Association. All rights reserved. The CASP Certification Exam Objectives are subject to change without notice. The lists of examples provided in bulleted format below each objective are not exhaustive lists. Other examples of technologies, processes or tasks pertaining to each objective may also be included on the exam although not listed or covered in this objectives document. 1.0 Enterprise Security 1.1 Distinguish which cryptographic tools and techniques are appropriate for a given situation.  Cryptographic applications and proper implementation  Advanced PKI concepts o Wild card o OCSP vs. CRL o Issuance to entities o Users o Systems o Applications  Implications of cryptographic methods and design o Strength vs. performance vs. feasibility to implement vs. interoperability  Transport encryption  Digital signature  Hashing  Code signing  Non-repudiation  Entropy  Pseudo random number generation  Perfect forward secrecy  Confusion  Diffusion 1.2 Distinguish and select among different types of virtualized, distributed and shared computing  Advantages and disadvantages of virtualizing servers and minimizing physical space requirements  VLAN  Securing virtual environments, appliances and equipment  Vulnerabilities associated with a single physical server hosting multiple companies’ virtual machines  Vulnerabilities associated with a single platform hosting multiple companies’ virtual machines  Secure use of on-demand / elastic cloud computing o Provisioning o De-provisioning
  • 3. CompTIA Advanced Security Practitioner Certification Exam Objectives 3 of 17 Copyright 2011 by the Computing Technology Industry Association. All rights reserved. The CASP Certification Exam Objectives are subject to change without notice. o Data remnants  Vulnerabilities associated with co-mingling of hosts with different security requirements o VMEscape o Privilege elevation  Virtual Desktop Infrastructure (VDI)  Terminal services 1.3 Explain the security implications of enterprise storage  Virtual storage  NAS  SAN  vSAN  iSCSI  FCOE  LUN masking  HBA allocation  Redundancy (location)  Secure storage management o Multipath o Snapshots o Deduplication 1.4 Integrate hosts, networks, infrastructures, applications and storage into secure comprehensive solutions  Advanced network design o Remote access o Placement of security devices o Critical infrastructure / Supervisory Control and Data Acquisition (SCADA) o VoIP o IPv6  Complex network security solutions for data flow  Secure data flows to meet changing business needs  Secure DNS o Securing zone transfer o TSIG  Secure directory services o LDAP o AD o Federated ID o Single sign on  Network design consideration o Building layouts o Facilities management
  • 4. CompTIA Advanced Security Practitioner Certification Exam Objectives 4 of 17 Copyright 2011 by the Computing Technology Industry Association. All rights reserved. The CASP Certification Exam Objectives are subject to change without notice.  Multitier networking data design considerations  Logical deployment diagram and corresponding physical deployment diagram of all relevant devices  Secure infrastructure design (e.g. decide where to place certain devices)  Storage integration (security considerations)  Advanced configuration of routers, switches and other network devices o Transport security o Trunking security o Route protection  ESB  SOA  SIEM  Database Access Monitor (DAM)  Service enabled  WS-security 1.5 Distinguish among security controls for hosts  Host-based firewalls  Trusted OS (e.g. how and when to use it)  End point security software o Anti-malware o Anti-virus o Anti-spyware o Spam filters  Host hardening o Standard operating environment o Security/group policy implementation o Command shell restrictions o Warning banners o Restricted interfaces  Asset management (inventory control)  Data exfiltration  HIPS / HIDS  NIPS/NIDS 1.6 Explain the importance of application security  Web application security design considerations o Secure: by design, by default, by deployment  Specific application issues o XSS o Click-jacking o Session management o Input validation o SQL injection  Application sandboxing
  • 5. CompTIA Advanced Security Practitioner Certification Exam Objectives 5 of 17 Copyright 2011 by the Computing Technology Industry Association. All rights reserved. The CASP Certification Exam Objectives are subject to change without notice.  Application security frameworks o Standard libraries o Industry accepted approaches  Secure coding standards  Exploits resulting from improper error and exception handling  Privilege escalation  Improper storage of sensitive data  Fuzzing/false injection  Secure cookie storage and transmission  Client-side processing vs. server-side processing o AJAX o State management o JavaScript  Buffer overflow  Memory leaks  Integer overflows  Race conditions o Time of check o Time of use  Resource exhaustion 1.7 Given a scenario, distinguish and select the method or tool that is appropriate to conduct an assessment  Tool type o Port scanners o Vulnerability scanners o Protocol analyzer o Switchport analyzer o Network enumerator o Password cracker o Fuzzer o HTTP interceptor o Attacking tools/frameworks  Methods o Vulnerability assessment o Penetration testing o Black box o White box o Grey Box o Fingerprinting o Code review o Social engineering 2.0 Risk Management, Policy / Procedure and Legal
  • 6. CompTIA Advanced Security Practitioner Certification Exam Objectives 6 of 17 Copyright 2011 by the Computing Technology Industry Association. All rights reserved. The CASP Certification Exam Objectives are subject to change without notice. 2.1 Analyze the security risk implications associated with business decisions  Risk management of new products, new technologies and user behaviors  New or changing business models/strategies o Partnerships o Outsourcing o Mergers  Internal and external influences o Audit findings o Compliance o Client requirements o Top level management  Impact of de-perimiterization (e.g. constantly changing network boundary) o Considerations of enterprise standard operating environment (SOE) vs. allowing personally managed devices onto corporate networks 2.2 Execute and implement risk mitigation strategies and controls  Classify information types into levels of CIA based on organization/industry  Determine aggregate score of CIA  Determine minimum required security controls based on aggregate score  Conduct system specific risk analysis  Make risk determination o Magnitude of impact o Likelihood of threat  Decide which security controls should be applied based on minimum requirements o Avoid o Transfer o Mitigate o Accept  Implement controls  ESA frameworks  Continuous monitoring 2.3 Explain the importance of preparing for and supporting the incident response and recovery process  E-Discovery o Electronic inventory and asset control o Data retention policies o Data recovery and storage o Data ownership o Data handling  Data breach o Recovery o Minimization o Mitigation and response
  • 7. CompTIA Advanced Security Practitioner Certification Exam Objectives 7 of 17 Copyright 2011 by the Computing Technology Industry Association. All rights reserved. The CASP Certification Exam Objectives are subject to change without notice.  System design to facilitate incident response taking into account types of violations o Internal and external o Privacy policy violations o Criminal actions o Establish and review system event and security logs  Incident and emergency response 2.4 Implement security and privacy policies and procedures based on organizational requirements.  Policy development and updates in light of new business, technology and environment changes  Process/procedure development and updated in light of policy, environment and business changes  Support legal compliance and advocacy by partnering with HR, legal, management and other entities  Use common business documents to support security o Interconnection Security Agreement (ISA) o Memorandum of Understanding (MOU) o Service Level Agreement (SLA) o Operating Level Agreement (OLA) o Non-Disclosure Agreement (NDA) o Business Partnership Agreement (BPA)  Use general privacy principles for PII / Sensitive PII  Support the development of policies that contain o Separation of duties o Job rotation o Mandatory vacation o Least privilege o Incident response o Forensic tasks o On-going security o Training and awareness for users o Auditing requirements and frequency 3.0 Research and Analysis 3.1 Analyze industry trends and outline potential impact to the enterprise  Perform on-going research o Best practices o New technologies o New security systems and services o Technology evolution (e.g. RFCs, ISO)  Situational awareness o Latest client-side attacks
  • 8. CompTIA Advanced Security Practitioner Certification Exam Objectives 8 of 17 Copyright 2011 by the Computing Technology Industry Association. All rights reserved. The CASP Certification Exam Objectives are subject to change without notice. o Threats o Counter zero day o Emergent issues  Research security implications of new business tools o Social media/networking o Integration within the business (e.g. advising on the placement of company material for the general public)  Global IA industry/community o Conventions o Attackers o Emerging threat sources  Research security requirements for contracts o Request for Proposal (RFP) o Request for Quote (RFQ) o Request for Information (RFI) o Agreements 3.2 Carry out relevant analysis for the purpose of securing the enterprise  Benchmark  Prototype and test multiple solutions  Cost benefit analysis (ROI, TCO)  Analyze and interpret trend data to anticipate cyber defense aids  Review effectiveness of existing security  Reverse engineer / deconstruct existing solutions  Analyze security solutions to ensure they meet business needs o Specify the performance o Latency o Scalability o Capability o Usability o Maintainability o Availability (MTTR, MTBF)  Conduct a lessons-learned / after-action review  Use judgment to solve difficult problems that do not have a best solution  Conduct network traffic analysis 4.0 Integration of Computing, Communications and Business Disciplines 4.1 Integrate enterprise disciplines to achieve secure solutions  Interpreting security requirements and goals to communicate with other disciplines o Programmers o Network engineers o Sales staff
  • 9. CompTIA Advanced Security Practitioner Certification Exam Objectives 9 of 17 Copyright 2011 by the Computing Technology Industry Association. All rights reserved. The CASP Certification Exam Objectives are subject to change without notice.  Provide guidance and recommendations to staff and senior management on security processes and controls  Establish effective collaboration within teams to implement secure solutions  Disciplines o Programmer o Database administrator o Network administrator o Management o Stake holders o Financial o HR o Emergency response team o Facilities manager o Physical security manager 4.2 Explain the security impact of inter-organizational change  Security concerns of interconnecting multiple industries o Rules, policies and regulations  Design considerations during mergers, acquisitions and de-mergers  Assuring third party products - only introduce acceptable risk o Custom developed o COTS  Network secure segmentation and delegation  Integration of products and services 4.3 Select and distinguish the appropriate security controls with regard to communications and collaboration  Unified communication security o Web conferencing o Video conferencing o Instant messaging o Desktop sharing o Remote assistance o Presence o Email o Telephony  VoIP security  VoIP implementation  Remote access  Enterprise configuration management of mobile devices  Secure external communications  Secure implementation of collaboration platforms  Prioritizing traffic (QoS)  Mobile devices o Smart phones, IP cameras, laptops, IP based devices
  • 10. CompTIA Advanced Security Practitioner Certification Exam Objectives 10 of 17 Copyright 2011 by the Computing Technology Industry Association. All rights reserved. The CASP Certification Exam Objectives are subject to change without notice. 4.4 Explain advanced authentication tools, techniques and concepts  Federated identity management (SAML)  XACML  SOAP  Single sign on  SPML  Certificate based authentication  Attestation 4.5 Carry out security activities across the technology life cycle  End to end solution ownership  Understanding results of solutions in advance o Operational activities o Maintenance o Decommissioning o General change management  Systems Development Life Cycle o Security System Development Life Cycle (SSDLC) / Security Development Life Cycle (SDL) o Security Requirements Traceability Matrix (SRTM)  Adapt solutions to address emerging threats and security trends  Validate system designs
  • 11. CompTIA Advanced Security Practitioner Certification Exam Objectives 11 of 17 Copyright 2011 by the Computing Technology Industry Association. All rights reserved. The CASP Certification Exam Objectives are subject to change without notice. CASP ACRONYMS 3DES – Triple Digital Encryption Standard AAA – Authentication, Authorization, and Accounting ACL – Access Control List AD—Active Directory AES - Advanced Encryption Standard AES256 – Advanced Encryption Standards 256bit AH - Authentication Header ALE - Annualized Loss Expectancy AP - Access Point ARO - Annualized Rate of Occurrence ARP - Address Resolution Protocol AUP - Acceptable Use Policy BCP – Business Continuity Planning BIOS – Basic Input / Output System BOTS – Network Robots BPA - Business Partnership Agreement CA – Certificate Authority CAC - Common Access Card CAN - Controller Area Network CCMP – Counter-Mode/CBC-Mac Protocol CCTV - Closed-circuit television CERT – Computer Emergency Response Team CHAP – Challenge Handshake Authentication Protocol CIA - Cryptographic Information Application CIA – Confidentiality, Integrity, and Availability CIFS- Common Internet File System CIRT – Computer Incident Response Team CISO – Chief Information Security Officer CMDB- Configuration Management Database COOP- Continuity of Operations CRC – Cyclical Redundancy Check CredSSP – Credential Security Support Provider CRL – Certification Revocation List CRM- Customer Relationship Management DAC – Discretionary Access Control DDOS – Distributed Denial of Service DEP – Data Execution Prevention DES – Digital Encryption Standard DHCP – Dynamic Host Configuration Protocol DLL - Dynamic Link Library DLP - Data Loss Prevention DMZ – Demilitarized Zone DNS – Domain Name Service (Server) DOS – Denial of Service
  • 12. CompTIA Advanced Security Practitioner Certification Exam Objectives 12 of 17 Copyright 2011 by the Computing Technology Industry Association. All rights reserved. The CASP Certification Exam Objectives are subject to change without notice. DRP – Disaster Recovery Plan DSA – Digital Signature Algorithm EAP - Extensible Authentication Protocol ECC - Elliptic Curve Cryptography EFS – Encrypted File System ELA- Enterprise License Agreement EMI – Electromagnetic Interference ESA- Enterprise Security Architecture ESB—Enterprise Service Bus ESP – Encapsulated Security Payload FCOE – Fiber Channel Over Ethernet FTP – File Transfer Protocol GPU - Graphic Processing Unit GRC – Governance, Risk, & Compliance GRE - Generic Routing Encapsulation HBA- Host Based Adapter HBA – Host Based Authentication HDD – Hard Disk Drive HIDS – Host Based Intrusion Detection System HIPS – Host Based Intrusion Prevention System HMAC – Hashed Message Authentication Code HSM – Hardware Security Module HTTP – Hypertext Transfer Protocol HTTPS – Hypertext Transfer Protocol over SSL HVAC – Heating, Ventilation Air Conditioning IaaS - Infrastructure as a Service ICMP - Internet Control Message Protocol ID – Identification IDF- Intermediate Distribution Frame IdM- Identity Management IDP- Identity Provider IDS – Intrusion Detection System IETF – Internet Engineering Task Force IKE – Internet Key Exchange IM - Instant messaging IMAP4 - Internet Message Access Protocol v4 IP - Internet Protocol IPS – Intrusion Prevention Systems IPSec – Internet Protocol Security IRC - Internet Relay Chat ISA--Interconnection Security Agreement ISP – Internet Service Provider IV - Initialization Vector KDC - Key Distribution Center L2TP – Layer 2 Tunneling Protocol LANMAN – Local Area Network Manager
  • 13. CompTIA Advanced Security Practitioner Certification Exam Objectives 13 of 17 Copyright 2011 by the Computing Technology Industry Association. All rights reserved. The CASP Certification Exam Objectives are subject to change without notice. LDAP – Lightweight Directory Access Protocol LEAP – Lightweight Extensible Authentication Protocol LUN – Link Uninhibit MAC – Mandatory Access Control / Media Access Control MAC - Message Authentication Code MAN - Metropolitan Area Network MBR – Master Boot Record MD5 – Message Digest 5 MDF- Main Distribution Frame MFD- Multifunction Device MOA- Memorandum of Agreement MOU--Memorandum of Understanding MPLS – Multiprotocol Label Switching MSCHAP – Microsoft Challenge Handshake Authentication Protocol MSS – Managed Security Service MTBF- Mean-Time Between Failure MTTR- Mean Time To Recovery MTU - Maximum Transmission Unit NAC – Network Access Control NAS- Network Attached Storage NAT – Network Address Translation NDA--Non-Disclosure Agreement NIDS – Network Based Intrusion Detection System NIPS – Network Based Intrusion Prevention System NIST – National Institute of Standards & Technology NLA – Network Level Authentication NOS – Network Operating System NTFS - New Technology File System NTLM – New Technology LANMAN NTP - Network Time Protocol OCSP—Online Certificate Status Protocol OLA--Operating Level Agreement ORB- Object Request Broker OS – Operating System OVAL – Open Vulnerability Assessment Language PaaS- Platform as a Service PAP – Password Authentication Protocol PAT - Port Address Translation PBX – Private Branch Exchange PCI-DSS- Payment Card Industry Data Security Standard PDP- Policy Distribution Point PEAP – Protected Extensible Authentication Protocol PED - Personal Electronic Device PEP- Policy Enforcement Point PFS- Perfect Forward Secrecy PGP – Pretty Good Privacy
  • 14. CompTIA Advanced Security Practitioner Certification Exam Objectives 14 of 17 Copyright 2011 by the Computing Technology Industry Association. All rights reserved. The CASP Certification Exam Objectives are subject to change without notice. PII – Personally Identifiable Information PII-Personal Identifiable Information PIP- Policy Information Point PKI – Public Key Infrastructure POTS – Plain Old Telephone Service PPP - Point-to-point Protocol PPTP – Point to Point Tunneling Protocol PSK – Pre-Shared Key PTZ – Pan-Tilt-Zoom QoS- Quality of Service RA – Recovery Agent RAD - Rapid application development RADIUS – Remote Authentication Dial-in User Server RAID – Redundant Array of Inexpensive Disks RAS – Remote Access Server RBAC – Role Based Access Control RBAC – Rule Based Access Control RFI- Request for Information RFP- Request for Proposal RFQ- Request for Quote RSA – Rivest, Shamir, & Adleman RTO – Recovery Time Objective RTP – Real-Time Transport Protocol S/MIME – Secure / Multipurpose internet Mail Extensions SaaS - Software as a Service SAML--Security Assertions Markup Language SAN – Storage Area Network SCADA—Supervisory Control and Data Acquisition SCAP - Security Content Automation Protocol SCP- Secure Copy SCSI - Small Computer System Interface SDL- Security Development Life Cycle SDLC - Software Development Life Cycle SDLM - Software Development Life Cycle Methodology SHA – Secure Hashing Algorithm SHTTP – Secure Hypertext Transfer Protocol SIEM- Security Information Event Management SIM – Subscriber Identity Module SLA – Service Level Agreement SLA--Service Level Agreement SLE - Single Loss Expectancy S/MIME – Secure / Multipurpose Internet Mail Extensions SMS - Short Message Service SMTP – Simple Mail Transfer Protocol SNMP - Simple Network Management Protocol SOAP--Simple Object Access Protocol
  • 15. CompTIA Advanced Security Practitioner Certification Exam Objectives 15 of 17 Copyright 2011 by the Computing Technology Industry Association. All rights reserved. The CASP Certification Exam Objectives are subject to change without notice. SOA- Service Oriented Architecture SOA--Start of Authority SOE- Standard Operating Environment SONET – Synchronous Optical Network Technologies SOX- Sarbanes–Oxley Act SP- Service Provider SPIM - Spam over Internet Messaging SPIT- Spam over Internet Telephony SPML- Service Provisioning Markup Language SRTM- Software Requirements Traceability Matrix SRTP – Secure Real-time Protocol SSD- Solid State Drive SSDLC-- Security System Development Life Cycle SSH – Secure Shell SSL – Secure Sockets Layer SSO – Single Sign On STP – Shielded Twisted Pair TACACS – Terminal Access Controller Access Control System TCO – Total Cost of Ownership TCP/IP – Transmission Control Protocol / Internet Protocol TKIP - Temporal Key Integrity Protocol TLS – Transport Layer Security TOS- Type of Service TPM – Trusted Platform Module TSIG- Transaction Signature Interoperability Group UAC – User Access Control UAT - User Acceptance Testing UDDI- Universal Description Discovery and Integration UDP – User Datagram Protocol UPS - Uninterruptable Power Supply URL - Universal Resource Locator USB – Universal Serial Bus UTP – Unshielded Twisted Pair VDI—Virtual Desktop Infrastructure VLAN – Virtual Local Area Network VoIP - Voice over IP VPN – Virtual Private Network vSAN – Virtual Storage Area Network VTC – Video Teleconferencing WAC- Web Access Control WAF- Web-Application Firewall WAP – Wireless Access Point WAYF- Where Are You From WEP – Wired Equivalent Privacy WIDS – Wireless Intrusion Detection System WIPS – Wireless Intrusion Prevention System
  • 16. CompTIA Advanced Security Practitioner Certification Exam Objectives 16 of 17 Copyright 2011 by the Computing Technology Industry Association. All rights reserved. The CASP Certification Exam Objectives are subject to change without notice. WPA – Wireless Protected Access WSDL- Web Services Description Language XSRF - Cross-Site Request Forgery CSRF- Cross-Site Request Forgery XACML- eXtensible Access Control Markup Language XSS - Cross-Site Scripting CASP Proposed Hardware and Software List **Candidates should have basic knowledge of vendor specific tools and technologies, as this knowledge may be required for the CompTIA CASP Certification Exam. CompTIA has included this sample list of hardware and software to assist candidates as they prepare for the CASP exam. This list may also be helpful for training companies who wish to create a lab component to their training offering. Equipment  Laptops  Virtualized appliances (firewall, IPS, SIEM solution, RSA authentication, Asterisk PBX)  Basic server hardware (Email server/active directory server, trusted OS)  Basic NAS (―Free NAS‖)  Tokens  Mobile devices  2 switches (managed switch) – IPv6 capable  Router - IPv6 capable  Gateway  WAP  WAF  IPv6 and IPv4  Proxy server  Load balancer  CA server Spare hardware  NICs  Power supplies  External USB flash drive  Access points Spare parts  Patch cables
  • 17. CompTIA Advanced Security Practitioner Certification Exam Objectives 17 of 17 Copyright 2011 by the Computing Technology Industry Association. All rights reserved. The CASP Certification Exam Objectives are subject to change without notice. Software  Packet Sniffer  Vulnerable web applications (web-goat, hacme bank, dvl)  Windows  Linux  VMWare player / Virtualbox  Vulnerability assessment tools  Visio (diagramming software)  Port scanner  SSH and Telnet utilities  Threat modeling tool  Host IPS  Helix software  Backtrack CD Other  Sample logs  Sample network traffic (pcap)  Sample organizational structure  Sample network documentation