Skip to main content

ISBN10: 1260441342 | ISBN13: 9781260441345

ISBN10: 1260441342
ISBN13: 9781260441345
By Nicholas Lane, Wm. Arthur Conklin, Gregory B. White and Dwayne Williams

Step 1. Download Adobe Digital Editions to your PC or Mac desktop/laptop.

Step 2. Register and authorize your Adobe ID (optional). To access your eBook on multiple devices, first create an Adobe ID. Then, open Adobe Digital Editions, go to the Help menu, and select "Authorize Computer" to link your Adobe ID.

Step 3. Open Your eBook. Use Adobe Digital Editions to open the file. If the eBook doesn’t open, contact customer service for assistance.

Complete coverage of every topic on the CompTIA Advanced Security Practitioner certification exam

Get complete coverage of all objectives included on the CompTIA CASP+ exam CAS-003 from this comprehensive resource. Written by a team of leading information security experts, this authoritative guide fully addresses the skills required for securing a network and managing risk. You’ll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this definitive volume also serves as an essential on-the-job reference.

Covers all exam domains, including:

  • Threats, attacks, and vulnerabilities
  • Technologies and tools
  • Architecture and design
  • Identity and access management
  • Risk management
  • Cryptography and PKI
Electronic content includes:

  • 200 practice exam questions


PART I: Enterprise Security
Chapter 1: Cryptographic Tools
Chapter 2: Security Policies and Procedures
Chapter 3: Enterprise Storage
Chapter 4: Infrastructure
Chapter 5: Host Security Controls
Chapter 6: Application Security
Chapter 7: Security Assessments

PART II: Risk Management, Policy/Procedure, and Legal
Chapter 8: Risk Implications
Chapter 9: Risk Management Strategy and Controls
Chapter 10: E-discovery, Data Breaches, and Incident Response
Chapter 11: Security and Privacy Policies

PART III: Research and Analysis
Chapter 12: Industry Trends
Chapter 13: Enterprise Security

PART IV: Integration of Computing, Communications and Business Disciplines
Chapter 14: People and Security
Chapter 15: Change Control
Chapter 16: Security Controls for Communication and Collaboration
Chapter 17: Advanced Authentication Tools, Techniques, and Concepts
Chapter 18: Security Activities Across the Technology Life Cycle
Glossary

Need support?   We're here to help - Get real-world support and resources every step of the way.

Top