CAS-005: CompTIA SecurityX Certification Video Training Course
The complete solution to prepare for for your exam with CAS-005: CompTIA SecurityX certification video training course. The CAS-005: CompTIA SecurityX certification video training course contains a complete set of videos that will provide you with thorough knowledge to understand the key concepts. Top notch prep including CompTIA CAS-005 exam dumps, study guide & practice test questions and answers.
CAS-005: CompTIA SecurityX Certification Video Training Course Exam Curriculum
Corse Introduction
-
4:52
1. Introduction to CASP+ (CAS-005) / SecurityX Training
Security Foundations (Refresh)
-
7:15
1. Understand the CIA Triad and Security Objective
-
8:41
2. Security Terminologies
-
5:09
3. Security Vulnerabilities
-
4:44
4. Vulnerability Key Terms
-
5:34
5. Cyber Attack Process
-
4:51
6. Adversaries and Threat Actors
-
8:00
7. APTs
-
5:52
8. Threat Intel & CERT
-
8:01
9. Understanding Attack Surface
-
11:26
10. Understand Malware
-
9:00
11. DOS & DDOS
-
9:20
12. In-Path Attacks
-
5:51
13. Buffer overFlow Attack
-
7:47
14. Race Condition
-
6:36
15. Privilege Escalation
-
8:14
16. Side Channel Attacks
-
6:13
17. Mobile Threats
Governance of Security
-
7:07
1. Governance and Management
-
13:43
2. Security Program
-
8:40
3. Security Senior Roles
-
6:15
4. Security and Business Integration
-
7:04
5. Information Security Governance
-
11:17
6. Governance Frameworks
-
5:02
7. GRC
-
3:57
8. Information Security vs GRC
-
3:42
9. Security Program Documentation
Security Controls and Acquiring and Investing in controls
-
11:20
1. Security Controls Overview
-
7:16
2. Compensating Controls and Control Objective
-
8:05
3. Layered Defenses & Control References
-
5:42
4. Control Review and Assessment
-
5:28
5. SMART Metrics
-
6:09
6. Understand the Enterprise Architecture
-
5:59
7. The Process of Acquiring New Controls
-
8:46
8. Project Management in Security Investments
-
4:38
9. Business Case and Feasibility Analaysis
-
4:41
10. Management Buy In to support the Security Investment
Risk Management
-
10:06
1. Risk Management Overview
-
5:30
2. Risk Appetite & Tolerance and Capacity
-
6:42
3. Risk Identification
-
8:24
4. Digital Risk Protection Solutions
-
6:13
5. Threat Modeling
-
8:38
6. Use case & Abuse Case
-
8:46
7. Risk Analysis
-
12:36
8. Risk Evaluation and Risk Response
-
9:17
9. Risk Reporting and Monitoring
-
2:38
10. Risk Management Frameworks
-
8:38
11. NIST SP800-30
-
5:52
12. NIST RMF
Foundational Network Knowledge
-
11:34
1. Understanding Networks
-
9:56
2. OSI Model & TCP/IP Model
-
8:45
3. OSI Layer 1
-
7:28
4. OSI Layer 2
-
8:09
5. OSI Layer 3
-
7:37
6. Network Addressing & ARP
-
6:30
7. Layer 4-7 Deep Dive
-
8:59
8. Network Security Best Practices
Secure System Design
-
9:27
1. Zero Trust
-
7:08
2. Key Security Design Concepts
-
12:52
3. Deperimeterization & Security Boundaries [NEW]
-
6:46
4. Abstraction as a Security Strategy
-
5:33
5. Trusted Computing Base
Security Controls and Network Foundations
-
9:14
1. Understand Segmentation & VLANs
-
14:02
2. Understand NAC & Dot1X
-
8:28
3. Firewalls
-
7:08
4. DMZ
-
8:12
5. IDS & IPS
-
6:58
6. Network Access Policies and BYOD
-
8:58
7. Content Filtering
-
15:08
8. VPN, SSL vpn & IPSEC & Split Tunnel
-
7:01
9. Internet, Email Security Policies
-
7:24
10. Securing Network Management Best Practices and Policies
-
12:42
11. Wireless Security
-
12:15
12. Wired Security
-
6:34
13. Converged Networks - VOIP & QOS & POE
-
9:55
14. ICS & OT
-
7:50
15. ICS & OT Security
-
12:35
16. DNS
-
3:48
17. Sandbox
-
5:16
18. WAF - Web Application Firewall
-
5:19
19. Load Balancer
-
8:02
20. API & API Security
-
18:24
21. API OWASP 10 Security
-
7:07
22. FIM
-
9:51
23. SPAN & RSPAN & Network TAPs
Identity Access Management
-
8:40
1. Understand the Role of IAM
-
13:42
2. AAA
-
8:51
3. Biometric Authentication
-
7:36
4. SSO & RSO
-
5:12
5. Key Access Control Concepts
-
7:40
6. Authorization
-
8:20
7. Accounting
-
9:40
8. Log Management
-
6:59
9. Log Management Best Practices
-
11:05
10. Password & Authentication Attacks
-
13:38
11. LDAP
Cloud Security and Securing Shared Computing Infrastructure
-
8:24
1. Cloud Overview
-
5:41
2. Cloud deployment Models
-
6:50
3. Cloud Shared Responsibility Matrix
-
8:20
4. Cloud Contracts and SLA
-
6:39
5. Cloud Availability
-
8:15
6. Cloud Related Threats
-
4:49
7. Virtualization
-
7:31
8. Containers
-
7:53
9. SDN
-
8:52
10. Storage Solutions
-
8:57
11. Storage Redundancy Solutions
-
10:40
12. Backup and Restore
-
6:47
13. Server, Application Security Policies
-
7:27
14. Cloud Related Policies
-
9:14
15. CSA STAR
-
6:15
16. Secrets Management
Endpoint-Host Security
-
12:21
1. Endpoint Security Software
-
6:24
2. Endpoint Security Best Practices
-
4:32
3. Antimalware Measures
-
7:31
4. DLP Overview
-
8:07
5. IRM - Information Right Management
-
8:03
6. Using IRM Effectively
-
6:45
7. Asset Management
-
4:48
8. Patch Management Program
-
7:10
9. Configuration Management and Baselines
Application Security and Security Testing
-
12:02
1. What is the Software?
-
7:29
2. Software Development Lifecycle
-
9:25
3. OWASP Top 10 for Web Application
-
3:32
4. CWE - Common Weakness Enumeration
-
13:45
5. Application Threats in Memory Concurrency and_Resource Management [NEW]
-
6:31
6. DevOPS
-
7:05
7. DevSECOPS
-
8:39
8. Secure Coding Practices
-
8:39
9. Protecting the Source Code
-
12:04
10. Application Sandboxing and Runtime Defense Mechanisms [NEW]
-
8:38
11. Security Requirements Traceability Matrix (SRTM)
-
10:33
12. Software Release Management
-
6:08
13. Software Maintenance
-
9:12
14. Software Testing
-
8:39
15. Writing Secure Code
-
12:26
16. Application Security Frameworks Software Assurance and Library Hygiene [NEW]
-
18:12
17. Data Handling and Context Aware Application Security Controls [NEW]
-
9:59
18. Penetration Testing Overview
-
13:54
19. Penetration Testing in Action - Tools and Techniques for Recon/Scanning [NEW]
-
15:44
20. Penetration Testing In Action - Tools and Techniques for HOST/APP Testing [NEW]
-
5:17
21. Bug Bounty Programs & Bug Hunting
Policies, Standards and Procedures
-
04:40
1. Understand the Policy Document
-
6:41
2. Policy Document Attributes and Review of Policy Document
-
4:13
3. Standards and Baseline
-
4:18
4. Procedures and Guidelines
-
11:05
5. HR Security
-
5:23
6. HR Policy
-
24:47
7. Understand Social Engineering Attacks
-
7:31
8. Security Awareness Training
-
9:23
9. Auditing and Reviewing Systems
-
13:58
10. Outsourcing Security Requirements
-
9:42
11. Supply Chain Risk management
Cryptography
-
8:26
1. Introduction to Cryptography
-
7:39
2. Symmetric Encryption
-
7:29
3. ASymmetric Encryption
-
6:41
4. Cryptography Key Concepts
-
8:03
5. PKI
-
5:54
6. Certificates
-
5:24
7. Certificate Pinning
-
4:59
8. SSL & MTLS
-
3:50
9. Digital Signature
-
9:42
10. Hashing and Integrity
-
5:31
11. Cryptographic Applications
Data Security
-
3:39
1. Data Lifecycle
-
4:32
2. Data Disposal
-
12:06
3. Data Classification
-
6:34
4. Data Governance
-
10:55
5. Privacy and Data Protection
-
10:52
6. Privacy Controls and Documentation
-
5:05
7. Cloud Computing and Data Dispersion
-
6:41
8. Measures for Data Protection
-
8:14
9. Data Classification and Protection Policies
Business Continuity & Managing Incidents
-
9:09
1. Incident Management
-
13:52
2. Building Incident Response Plan
-
7:44
3. Digital Forsensics
-
11:15
4. Business Continuity Planning
-
10:46
5. RTO & RPO and Recovery Metrics
-
10:54
6. Recovery Sites
-
8:51
7. BCP Policy
About CAS-005: CompTIA SecurityX Certification Video Training Course
CAS-005: CompTIA SecurityX certification video training course by prepaway along with practice test questions and answers, study guide and exam dumps provides the ultimate training package to help you pass.
Prepaway's CAS-005: CompTIA SecurityX video training course for passing certification exams is the only solution which you need.
Pass CompTIA CAS-005 Exam in First Attempt Guaranteed!
Get 100% Latest Exam Questions, Accurate & Verified Answers As Seen in the Actual Exam!
30 Days Free Updates, Instant Download!
CAS-005 Premium Bundle
- Premium File 475 Questions & Answers. Last update: May 03, 2026
- Training Course 180 Video Lectures
- Study Guide 903 Pages
| Free CAS-005 Exam Questions & CompTIA CAS-005 Dumps | ||
|---|---|---|
| Comptia.testking.cas-005.v2026-02-26.by.henry.7q.ete |
Views: 0
Downloads: 345
|
Size: 106.28 KB
|
Student Feedback
Can View Online Video Courses
Please fill out your email address below in order to view Online Courses.
Registration is Free and Easy, You Simply need to provide an email address.
- Trusted By 1.2M IT Certification Candidates Every Month
- Hundreds Hours of Videos
- Instant download After Registration
A confirmation link will be sent to this email address to verify your login.
Please Log In to view Online Course
Registration is free and easy - just provide your E-mail address.
Click Here to Register