CompTIA CASP CAS-002: Technical Integration of Enterprise Components


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description
Tying all the security mechanisms in your organization together is extremely important, as it will bring the overall security into effect. In this course, you'll learn about integrating hosts, storage, networks and applications into a secure enterprise architecture. You will also examine ways to integrate advanced authentication and authorization technologies to support enterprise objectives. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Advanced Security Practitioner (CAS-002) certification exam.

Target Audience
Security candidates looking to certify their technical knowledge and skills required to conceptualize, engineer, integrate, and implement secure solutions across complex environments

Prerequisites
None

Expected Duration (hours)
1.5

Lesson Objectives

CompTIA CASP CAS-002: Technical Integration of Enterprise Components

  • start the course
  • define how secure data flows can be used to meet changing business needs
  • define how standards are used to secure a network environment
  • define how interoperability issues affect network security
  • define how cloud and virtualized environments affect network security
  • define how the vulnerabilities associated with virtual machines will affect network security
  • define how to secure on-demand cloud computing
  • define how data aggregation and isolation is used to aid in securing a network environment
  • identify how provisioning and de-provisioning of resources affects network security
  • understand how to secure virtual environments
  • define how mergers, acquisitions, and divestitures can affect network security
  • define how network secure segmentation and delegation can affect network security
  • define how logical and physical deployment diagrams are used to create secure network environments
  • define how a secure infrastructure design is used when creating network security plans
  • define how storage integration can be used to aid in securing a network environment
  • define how CRM, ERP, and GRC are used to aid in creating a secure network environment
  • define how ESB, SOA, and directory services are used to aid in creating a secure network environment
  • define how DNS, CMDB, and CMS are used to aid in creating a secure network environment
  • identify how advanced authentication can help in creating a secure network environment
  • identify how advanced authorization is used to help create a secure network environment
  • define how attestation and identity propagation can help in creating a secure network environment
  • identify how federation can help in creating a secure network environment
  • identify how the RADIUS trust model can be used to help create a secure network environment
  • identify how the LDAP trust model can be used to help create a secure network environment
  • identify how the Active Directory trust model can be used to help create a secure network environment
  • to integrate hosts, storage, networks and applications into a secure enterprise architecture, and integrate advanced authentication and authorization technologies to support enterprise objectives
  • Course Number:
    sp_capr_a09_it_enus

    Expertise Level
    Expert