0%

Prepare to succeed in your new cybersecurity career with the challenging and sought-after CASP+ credential 

In the newly updated Fourth Edition of CASP+ CompTIA Advanced Security Practitioner Study Guide Exam CAS-004, risk management and compliance expert Jeff Parker walks you through critical security topics and hands-on labs designed to prepare you for the new CompTIA Advanced Security Professional exam and a career in cybersecurity implementation. Content and chapter structure of this Fourth edition was developed and restructured to represent the CAS-004 Exam Objectives.  

From operations and architecture concepts, techniques and requirements to risk analysis, mobile and small-form factor device security, secure cloud integration, and cryptography, you’ll learn the cybersecurity technical skills you’ll need to succeed on the new CAS-004 exam, impress interviewers during your job search, and excel in your new career in cybersecurity implementation. 

This comprehensive book offers: 

  • Efficient preparation for a challenging and rewarding career in implementing specific solutions within cybersecurity policies and frameworks 
  • A robust grounding in the technical skills you’ll need to impress during cybersecurity interviews 
  • Content delivered through scenarios, a strong focus of the CAS-004 Exam 
  • Access to an interactive online test bank and study tools, including bonus practice exam questions, electronic flashcards, and a searchable glossary of key terms 

Perfect for anyone preparing for the CASP+ (CAS-004) exam and a new career in cybersecurity, CASP+ CompTIA Advanced Security Practitioner Study Guide Exam CAS-004 is also an ideal resource for current IT professionals wanting to promote their cybersecurity skills or prepare for a career transition into enterprise cybersecurity. 

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright
  4. Acknowledgments
  5. About the Authors
  6. About the Technical Editor
  7. Table of Exercises
  8. Introduction
  9. Chapter 1: Risk Management
  10. Chapter 2: Configure and Implement Endpoint Security Controls
  11. Chapter 3: Security Operations Scenarios
  12. Chapter 4: Security Ops: Vulnerability Assessments and Operational Risk
  13. Chapter 5: Compliance and Vendor Risk
  14. Chapter 6: Cryptography and PKI
  15. Chapter 7: Incident Response and Forensics
  16. Chapter 8: Security Architecture
  17. Chapter 9: Secure Cloud and Virtualization
  18. Chapter 10: Mobility and Emerging Technologies
  19. Appendix: Answers to Review Questions
  20. Index
  21. End User License Agreement
3.23.101.60