17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
CASP - Preparing For Security Engineering And Cryptography Domain
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
Dean Bushmiller will give you the easiest, best path to learning the CompTIA CASP+
This certification qualifies you to assess cyber readiness within an enterprise. You will be able to design and implement the proper solutions to ensure the organization is ready for the next attack. You will have the knowledge and skills required to do the following
The Security Engineering and Cryptography Domain is about applying security practices to cloud, on-premises, endpoint, and mobile infrastructure, while considering cryptographic technologies and techniques
This course in the CASP series covers the following topics
Engineering and Cryptography
Apply secure configurations to enterprise mobility
Managed configurations
Deployment scenarios
Security considerations
Configure and implement endpoint security controls
Hardening techniques
Processes
Mandatory access control
Trustworthy computing
Compensating controls
Explain security considerations impacting specific sectors and operational technologies
Embedded
ICS/supervisory control and data acquisition
Protocols
Sectors
Explain how cloud technology adoption impacts organizational security
Automation and orchestration
Encryption configuration
Logs
Monitoring configurations
Key ownership and location
Key life-cycle management
Backup and recovery methods
Infrastructure versus serverless computing
Application virtualization
Software-defined networking
Misconfigurations
Collaboration tools
Storage configurations
Cloud access security broker
Given a business requirement, implement appropriate Public key infrastructure solution
Public key infrastructure hierarchy
Certificate types
Certificate usages/profiles/templates
Extensions
Trusted providers
Trust model
Cross-certification
Configure profiles
Life-cycle management
Public and private keys
Digital signature
Certificate pinning
Certificate stapling
Certificate signing requests
Online Certificate Status Protocol versus certificate revocation list
HTTP Strict Transport Security
Given a business requirement, implement appropriate cryptographic protocols and algorithms
Hashing
Symmetric algorithms
Symetric Complexity Contruction
Asymmetric algorithms
Protocols
Elliptic curve cryptography
Forward secrecy
Authenticated encryption with associated data
Key stretching
Troubleshoot issues with cryptographic implementations
Implementation and configuration issues
Keys
Screenshots
If You Need More Stuff, kindly Visit and Support Us -->> https://CourseWikia.com
Get More Tutorials and Support Us -->> https://FreeCourseWeb.com
We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/001. Introduction to Security Engineering and Cryptography.mp4
54.4 MB
~Get Your Files Here !/Baseline Configuration/001. Baseline Configuration Control-Concept.mp4
30.8 MB
~Get Your Files Here !/Baseline Configuration/002. Baseline Configuration Control-Controls.mp4
85.2 MB
~Get Your Files Here !/Bonus Resources.txt
386 B
~Get Your Files Here !/Cloud Provider Controls/001. Cloud Provider Controls-Concept.mp4
50.6 MB
~Get Your Files Here !/Cloud Provider Controls/002. Cloud Provider Controls-Core-Definitions.mp4
131.4 MB
~Get Your Files Here !/Cloud Provider Controls/003. Cloud Provider Controls-Analysis.mp4
52.1 MB
~Get Your Files Here !/Cloud Provider Controls/004. Cloud Provider Controls-Impact of cloud.mp4
97.1 MB
~Get Your Files Here !/Cloud Provider Controls/005. Cloud Provider Controls-Assets.mp4
106.6 MB
~Get Your Files Here !/Cryptography Solutions-/001. Cryptography Solutions-Concept.mp4
55.9 MB
~Get Your Files Here !/Cryptography Solutions-/002. Cryptography Solutions-Analysis.mp4
42.4 MB
~Get Your Files Here !/Cryptography Solutions-/003. Cryptography Solutions-Protocol.mp4
38.6 MB
~Get Your Files Here !/Cryptography Solutions-/004. Cryptography Solutions-Technique.mp4
22.1 MB
~Get Your Files Here !/Cryptography Solutions-/005. Cryptography Solutions-Tools.mp4
74.1 MB
~Get Your Files Here !/Enterprise Mobility Management/001. Enterprise Mobility Management-Concept.mp4
76.3 MB
~Get Your Files Here !/Enterprise Mobility Management/002. Enterprise Mobility Management-Controls.mp4
34.3 MB
~Get Your Files Here !/Enterprise Mobility Management/003. Enterprise Mobility Management-Process.mp4
117.1 MB
~Get Your Files Here !/Internet of Things/001. Internet of Things-Concept.mp4
120.1 MB
~Get Your Files Here !/Internet of Things/002. Internet of Things-Protocols.mp4
113.5 MB
~Get Your Files Here !/Internet of Things/003. Internet of Things-Threats.mp4