You are previewing CASP: CompTIA® Advanced Security Practitioner, Study Guide.
O'Reilly logo
CASP: CompTIA® Advanced Security Practitioner, Study Guide

Book Description

Get Prepared for CompTIA Advanced Security Practitioner (CASP) Exam

Targeting security professionals who either have their CompTIA Security+ certification or are looking to achieve a more advanced security certification, this CompTIA Authorized study guide is focused on the new CompTIA Advanced Security Practitioner (CASP) Exam CAS-001. Veteran IT security expert and author Michael Gregg details the technical knowledge and skills you need to conceptualize, design, and engineer secure solutions across complex enterprise environments. He prepares you for aspects of the certification test that assess how well you apply critical thinking and judgment across a broad spectrum of security disciplines.

Featuring clear and concise information on crucial security topics, this study guide includes examples and insights drawn from real-world experience to help you not only prepare for the exam, but also your career. You will get complete coverage of exam objectives for all topic areas including:

  • Securing Enterprise-level Infrastructures

  • Conducting Risk Management Assessment

  • Implementing Security Policies and Procedures

  • Researching and Analyzing Industry Trends

  • Integrating Computing, Communications and Business Disciplines

Additionally, you can download a suite of study tools to help you prepare including an assessment test, two practice exams, electronic flashcards, and a glossary of key terms. Go to www.sybex.com/go/casp and download the full set of electronic test prep tools.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright
  4. Dear Reader,
  5. Dedication
  6. Acknowledgments
  7. About the Authors
  8. Table of Exercises
  9. Foreword
  10. Introduction
    1. Before You Begin the CompTIA CASP Certification Exam
    2. How to Become a CASP Certified Professional
    3. Who Should Read This Book?
    4. How This Book Is Organized
    5. Exam Strategy
    6. How to Use This Book and Companion Website
    7. The CASP (2011 Edition) Exam Objectives
  11. Chapter 1: Cryptographic Tools and Techniques
    1. The History of Cryptography
    2. Cryptographic Services
    3. Symmetric Encryption
    4. Asymmetric Encryption
    5. Hybrid Encryption
    6. Hashing
    7. Digital Signatures
    8. Public Key Infrastructure
    9. Cryptographic Solutions
    10. Cryptographic Attacks
    11. Summary
    12. Exam Essentials
    13. Review Questions
  12. Chapter 2: Comprehensive Security Solutions
    1. Advanced Network Design
    2. TCP/IP
    3. Secure Communication Solutions
    4. Secure Facility Solutions
    5. Secure Network Infrastructure Design
    6. Summary
    7. Exam Essentials
    8. Review Questions
  13. Chapter 3: Securing Virtualized, Distributed, and Shared Computing
    1. Enterprise Security
    2. Cloud Computing
    3. Virtualization
    4. Virtual LANs
    5. Enterprise Storage
    6. Summary
    7. Exam Essentials
    8. Review Questions
  14. Chapter 4: Host Security
    1. Firewalls and Access Control Lists
    2. Host-Based Firewalls
    3. Trusted Operating System
    4. Endpoint Security Software
    5. Anti-malware
    6. Host Hardening
    7. Asset Management
    8. Data Exfiltration
    9. Intrusion Detection and Prevention
    10. Summary
    11. Exam Essentials
    12. Review Questions
  15. Chapter 5: Application Security and Penetration Testing
    1. Application Security
    2. Specific Application Issues
    3. Application Sandboxing
    4. Application Security Framework
    5. Standard Libraries
    6. Secure Coding Standards
    7. Application Exploits
    8. Escalation of Privilege
    9. Improper Storage of Sensitive Data
    10. Cookie Storage and Transmission
    11. Process Handling at the Client and Server
    12. Security Assessments and Penetration Testing
    13. Summary
    14. Exam Essentials
    15. Review Questions
  16. Chapter 6: Risk Management
    1. Risk Terminology
    2. Identifying Vulnerabilities
    3. Operational Risks
    4. The Risk Assessment Process
    5. Best Practices for Risk Assessments
    6. Summary
    7. Exam Essentials
    8. Review Questions
  17. Chapter 7: Policies, Procedures, and Incident Response
    1. A High-Level View of Documentation
    2. Business Documents Used to Support Security
    3. Documents and Controls Used for Sensitive Information
    4. Auditing Requirements and Frequency
    5. The Incident Response Framework
    6. Digital Forensics
    7. The Role of Training and Employee Awareness
    8. Summary
    9. Exam Essentials
    10. Review Questions
  18. Chapter 8: Security Research and Analysis
    1. Analyzing Industry Trends and Outlining Potential Impact
    2. Carrying Out Relevant Analysis to Secure the Enterprise
    3. Summary
    4. Exam Essentials
    5. Review Questions
  19. Chapter 9: Enterprise Security Integration
    1. Integrate Enterprise Disciplines to Achieve Secure Solutions
    2. Explain the Security Impact of Interorganizational Change
    3. Summary
    4. Exam Essentials
    5. Review Questions
  20. Chapter 10: Security Controls for Communication and Collaboration
    1. Selecting and Distinguishing the Appropriate Security Controls
    2. Advanced Authentication Tools, Techniques, and Concepts
    3. Carrying Out Security Activities across the Technology Life Cycle
    4. Summary
    5. Exam Essentials
    6. Review Questions
  21. Appendix A: CASP Lab Manual
    1. What You’ll Need
    2. Lab A1: Download, Verify, and Install a Virtual Environment
    3. Lab A2: Explore Your Virtual Network
    4. Lab A3: Port Scanning
    5. Lab A4: Introduction to a Protocol Analyzer
    6. Lab A5: Web Vulnerabilities
    7. Lab A6: Introduction to the Nessus Vulnerability Scanner
    8. Lab A7: Verify a Baseline Security Configuration
    9. Lab A8: Basic Introduction to Windows Forensic Tools
    10. Lab A9: Introduction to Helix
    11. Lab A10: Introduction to Hashing
    12. Lab A11: File Encryption
    13. Lab A12: Cracking Encrypted Files
    14. Lab A13: Intrusion Detection
    15. Lab A14: An Introduction to Signature-Based Scanning
    16. Lab A15: Rootkit Detection
    17. Lab A16: Threat Modeling
    18. Lab A17: Introduction to the Metasploit Framework
    19. Lab A18: Social Engineering
    20. Lab A19: Routing, Switching, and Security
    21. Lab A20: Further Exploration
  22. Appendix B: Answers to Review Questions
    1. Chapter 1: Cryptographic Tools and Techniques
    2. Chapter 2: Comprehensive Security Solutions
    3. Chapter 3: Securing Virtualized, Distributed, and Shared Computing
    4. Chapter 4: Host Security
    5. Chapter 5: Application Security and Penetration Testing
    6. Chapter 6: Risk Management
    7. Chapter 7: Policies, Procedures, and Incident Response
    8. Chapter 8: Security Research and Analysis
    9. Chapter 9: Enterprise Security Integration
    10. Chapter 10: Security Controls for Communication and Collaboration
  23. Appendix C: About the Additional Study Tools
    1. Additional Study Tools
    2. System Requirements
    3. Using the Study Tools
    4. Troubleshooting
  24. Index