CompTIA CASP CAS-002: Industry Influences, Risk Planning, Strategy, and Control
Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number
Expertise Level
Overview/Description
The strategic plan that an organization uses is often driven from industry standards and information classification procedures. In this course, you'll interpret business and industry influences and explain associated security risks. You will also look at risk mitigation planning, strategies, and controls. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Advanced Security Practitioner (CAS-002) certification exam.
Target Audience
Security candidates looking to certify their technical knowledge and skills required to conceptualize, engineer, integrate, and implement secure solutions across complex environments
Prerequisites
None
Expected Duration (hours)
2.2
Lesson Objectives CompTIA CASP CAS-002: Industry Influences, Risk Planning, Strategy, and Control
start the course
identify risk management techniques used to secure a network environment
define new and changing models and strategies that are used to secure a network environment
identify the security concerns that are associated with integrating diverse industries
define the implications of creating third party information security
identify the impact of de-perimeterization of network resources
identify how internal and external influences affect network security
define the information classification techniques and how they can be used when securing a network environment
discuss CIA decisions and the requirements and policies that can be put in place when securing a network environment
work with CIA aggregate scores in order to secure a network environment
define how to create plans for worse case scenarios that can affect your organization
define the system specific risk analysis techniques used to secure a network environment
analyze the magnitude of impacts caused by events when you are securing a network environment
calculate the likelihood of threats that can affect network security
calculate the ROI and TCO of resources when securing a network environment
define risk appetite strategies when securing a network environment
define the risk management process when securing a network environment
define the enterprise security architecture frameworks that can be used when securing a network environment
define the methods for continuous improvement and monitoring when securing a network environment
define how to use business continuity planning when securing a network environment
define the role IT Governance plays when securing a network environment
to understand basic security risks, mitigation, and prevention
Course Number: sp_capr_a05_it_enus
Expertise Level
Expert