CASP+ preparing for security engineering and cryptography domain

You will have the knowledge and skills required to do the following: The Security Engineering and Cryptography Domain is about applying security practices to cloud, on-premises, endpoint, and mobile infrastructure,

Bibliographic Details
Format: eBook
Language:English
Published: [Place of publication not identified] Expanding Security 2023
Edition:[First edition]
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 03786nmm a2200373 u 4500
001 EB002174854
003 EBX01000000000000001312631
005 00000000000000.0
007 cr|||||||||||||||||||||
008 230908 ||| eng
020 |a 9781961356009 
050 4 |a QA76.9.A25 
100 1 |a Bushmiller, Dean  |e presenter 
245 0 0 |a CASP+  |b preparing for security engineering and cryptography domain 
250 |a [First edition] 
260 |a [Place of publication not identified]  |b Expanding Security  |c 2023 
300 |a 1 video file (2 hr., 10 min.)  |b sound, color 
653 |a Computer security / Examinations / Study guides 
653 |a Computing Technology Industry Association / Examinations / Study guides 
653 |a Computer security / Examinations / fast / (OCoLC)fst00872489 
653 |a Computer networks / Security measures / Examinations / Study guides 
653 |a Computing Technology Industry Association / fast / (OCoLC)fst00707499 
653 |a Computer networks / Security measures / Examinations / fast / (OCoLC)fst00872343 
653 |a Examinations / fast / (OCoLC)fst00917492 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
856 4 0 |u https://learning.oreilly.com/videos/~/9781961356009/?ar  |x Verlag  |3 Volltext 
082 0 |a 331 
082 0 |a 374 
082 0 |a 005.8076 
520 |a You will have the knowledge and skills required to do the following: The Security Engineering and Cryptography Domain is about applying security practices to cloud, on-premises, endpoint, and mobile infrastructure,  
520 |a broker Given a business requirement, implement appropriate Public key infrastructure solution Public key infrastructure hierarchy Certificate types Certificate usages/profiles/templates Extensions Trusted providers Trust model Cross-certification Configure profiles Life-cycle management Public and private keys Digital signature Certificate pinning Certificate stapling Certificate signing requests Online Certificate Status Protocol versus certificate revocation list HTTP Strict Transport Security Given a business requirement, implement appropriate cryptographic protocols and algorithms Hashing Symmetric algorithms Symetric Complexity Contruction Asymmetric algorithms Protocols Elliptic curve cryptography Forward secrecy Authenticated encryption with associated data Key stretching Troubleshoot issues with cryptographic implementations Implementation and configuration issues Keys 
520 |a while considering cryptographic technologies and techniques This course in the CASP series covers the following topics: Engineering and Cryptography Apply secure configurations to enterprise mobility Managed configurations Deployment scenarios Security considerations Configure and implement endpoint security controls Hardening techniques Processes Mandatory access control Trustworthy computing Compensating controls Explain security considerations impacting specific sectors and operational technologies Embedded ICS/supervisory control and data acquisition Protocols Sectors Explain how cloud technology adoption impacts organizational security Automation and orchestration Encryption configuration Logs Monitoring configurations Key ownership and location Key life-cycle management Backup and recovery methods Infrastructure versus serverless computing Application virtualization Software-defined networking Misconfigurations Collaboration tools Storage configurations Cloud access security  
520 |a Dean Bushmiller will give you the easiest, best path to learning the CompTIA CASP+ This certification qualifies you to assess cyber readiness within an enterprise. You will be able to design and implement the proper solutions to ensure the organization is ready for the next attack.