Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
Results Page:  Previous Next

Title CASP+ : preparing for security operations domain. [O'Reilly electronic resource]

Edition [First edition].
Publication Info. [Place of publication not identified] : Expanding Security, [2023]
QR Code
Description 1 online resource (1 video file (2 hr., 58 min.)) : sound, color.
Playing Time 025800
Description digital rdatr
video file rdaft
Instructional films lcgft
Performer Dean Bushmiller, presenter.
Summary Dean Bushmiller will help you develop your plan to pass the CASP, but more importantly, help you to know the information in a way that makes you better at cyber security. This certification qualifies you to assess cyber readiness within an enterprise. You will be able to design and implement the proper solutions to ensure the organization is ready for the next attack. You will have the knowledge and skills required to do the following: This domain is about: use monitoring, detection, incident response, and automation to proactively support ongoing security operations in an enterprise environment. This course in the CASP series covers the following topics: Operations Perform threat management activities Intelligence types Actor types Threat actor properties Intelligence collection methods Frameworks Analyze indicators of compromise and formulate an appropriate response Indicators of compromise Response Rules Perform vulnerability management activities Vulnerability scans Security Content Automation Protocol Self-assessment or third party vendor assessment Patch management Information sources Use appropriate vulnerability assessment and penetration testing methods and tools Methods Tools Dependency management Requirements Analyze vulnerabilities and recommend risk mitigations Vulnerabilities Inherently vulnerable system or application Attacks Use processes to reduce risk Proactive and detection Security data analytics Preventive Application control Security automation Physical security Given an incident, implement appropriate response Event classifications Triage event Preescalation tasks Incident response process Specific response playbooks Communication plan Stakeholder management Explain importance of forensic concepts Legal versus internal corporate purposes Forensic process Integrity preservation Cryptanalysis Steganalysis Use forensic analysis tools File carving tools Binary analysis tools Analysis tools Imaging tools Hashing utilities Live collection versus post-mortem tools.
Subject Computing Technology Industry Association -- Examinations -- Study guides.
Computer security -- Examinations -- Study guides.
Computer networks -- Security measures -- Examinations -- Study guides.
Genre Instructional films.
Nonfiction films.
Internet videos.
Added Author Bushmiller, Dean, presenter.
Expanding Security (Firm), publisher.
ISBN 9780996619196 (electronic video)
0996619194 (electronic video)
Patron reviews: add a review
Click for more information
EVIDEO
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information