Tags
Language
Tags
July 2025
Su Mo Tu We Th Fr Sa
29 30 1 2 3 4 5
6 7 8 9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30 31 1 2
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    KoalaNames.com
    What’s in a name? More than you think.

    Your name isn’t just a label – it’s a vibe, a map, a story written in stars and numbers.
    At KoalaNames.com, we’ve cracked the code behind 17,000+ names to uncover the magic hiding in yours.

    ✨ Want to know what your name really says about you? You’ll get:

    🔮 Deep meaning and cultural roots
    ♈️ Zodiac-powered personality insights
    🔢 Your life path number (and what it means for your future)
    🌈 Daily affirmations based on your name’s unique energy

    Or flip the script – create a name from scratch using our wild Name Generator.
    Filter by star sign, numerology, origin, elements, and more. Go as woo-woo or chill as you like.

    💥 Ready to unlock your name’s power?

    👉 Tap in now at KoalaNames.com

    ITU Online - CompTIA CAS-001: Advanced Security Practitioner (CASP)

    Posted By: serpmolot
    ITU Online - CompTIA CAS-001: Advanced Security Practitioner (CASP)

    ITU Online - CompTIA CAS-001: Advanced Security Practitioner (CASP)
    English | mp4 | H264 640x360 | AAC 2 ch | 6.98 GB
    eLearning

    The CASP exam covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers, while managing risk.



    Module 1: Underlying Security Models

    1.0 Course Guide
    1.1 Underlying Security Models Part 1
    1.2 Underlying Security Models Part 2
    1.3 Underlying Security Models Part 3
    1.4 Underlying Security Models Part 4
    1.5 Underlying Security Models Part 5
    1.6 Underlying Security Models Part 6
    1.7 Underlying Security Models Part 7
    1.8 General Security Part 1
    1.9 General Security Part 2

    Module 2: Selecting Security

    2.0 Selecting Security Products Part 1
    2.1 Selecting Security Products Part 2
    2.2 Selecting Security Products Part 3
    2.3 Control Selection Process Part 1
    2.4 Control Selection Process Part 2

    Module 3: Cryptography

    3.0 Cryptography Symmetric and Asymmetric Part 1
    3.1 Cryptography Symmetric and Asymmetric Part 2
    3.2 Cryptography Symmetric and Asymmetric Part 3
    3.3 Cryptography Symmetric and Asymmetric Part 4
    3.4 Cryptography Message Integrity Controls Part 1
    3.5 Cryptography Message Integrity Controls Part 2
    3.6 Cryptography Message Integrity Controls Part 3
    3.7 Cryptography Digital Signatures Part 1
    3.8 Cryptography Digital Signatures Part 2
    3.9 Cryptography PKI and PGP Part 1
    3.10 Cryptography PKI and PGP Part 2
    3.11 Cryptography PKI and PGP Part 3
    3.12 Cryptography PKI and PGP Part 4

    Module 4: Storage

    4.0 Storage Part 1
    4.1 Storage Part 2
    4.2 Storage Part 3
    4.3 Storage Part 4

    Module 5: Virtual Computing

    5.0 Virtual Computing
    5.1 Cloud Computing Part 1
    5.2 Cloud Computing Part 2
    5.3 Cloud Computing Part 3
    5.4 Cloud Computing Part 4
    5.5 Cloud Computing Part 5

    Module 6: IPv6

    6.0 IPV6 Part 1
    6.1 IPV6 Part 2

    Module 7: Remote Access Security

    7.0 Remote Access Security Part 1
    7.1 Remote Access Security Part 2

    Module 8: Domain Name System

    8.0 Domain Name System Part 1
    8.1 Domain Name System Part 2
    8.2 Domain Name System Part 3
    8.3 Domain Name System Part 4
    8.4 Domain Name System Part 5
    8.5 Domain Name System Part 6
    8.6 Domain Name System Part 7
    8.7 Domain Name System Part 8

    Module 9: Directory Services

    9.0 Directory Services

    Module 10: Firewall and VPN

    10.0 Firewall and VPN Part 1
    10.1 Firewall and VPN Part 2
    10.2 Firewall and VPN Part 3
    10.3 Firewall and VPN Part 4
    10.4 Firewall Policy Part 1
    10.5 Firewall Policy Part 2
    10.6 Firewall Policy Part 3
    10.7 Firewall Policy Part 4

    Module 11: Security Configuration Management

    11.0 Security Configuration Management Part 1
    11.1 Security Configuration Management Part 2
    11.2 Security Configuration Management Part 3

    Module 12: Network Infrastructure Security

    12.0 Network Infrastructure Security Part 1
    12.1 Network Infrastructure Security Part 2
    12.2 Network Infrastructure Security Part 3
    12.3 Network Infrastructure Security Part 4

    Module 13: Secure Web Services

    13.0 Secure Web Services Part 1
    13.1 Secure Web Services Part 2
    13.2 OWASP top Ten Part 1
    13.3 OWASP top Ten Part 2
    13.4 OWASP top Ten Part 3
    13.5 OWASP top Ten Part 4
    13.6 OWASP top Ten Part 5

    Module 14: Buffer Overflows

    14.0 Buffer Overflows Part 1
    14.1 Buffer Overflows Part 2

    Module 15: SQL Injection

    15.0 SQL Injection Part 1
    15.1 SQL Injection Part 2

    Module 16: Access Control

    16.0 Access Control Part 1
    16.1 Access Control Part 2

    Module 17: Single Sign-On

    17.0 Single Sign-On Part 1
    17.1 Single Sign-On Part 2
    17.2 Single Sign-On Part 3

    Module 18: Risk Assessment

    18.0 Risk Assessment Part 1
    18.1 Risk Assessment Part 2

    Module 19: Testing and Assessment

    19.0 Testing and Assessment Part 1
    19.1 Testing and Assessment Part 2
    19.2 Testing and Assessment Part 3

    Module 20: Common Vulnerability

    20.0 Common Vulnerability Scoring System Part 1
    20.1 Common Vulnerability Scoring System Part 2
    20.2 Common Vulnerability Scoring System Part 3
    20.3 Common Vulnerability Scoring System Part 4

    Module 21: Common Criteria

    21.0 Common Criteria Part 1
    21.1 Common Criteria Part 2
    21.2 Common Criteria Part 3
    21.3 Common Criteria Part 4
    21.4 Common Criteria Part 5

    Module 22: Personally Identifiable Information

    22.0 Personally Identifiable Information Part 1
    22.1 Personally Identifiable Information Part 2

    Module 23: Risk Management

    23.0 Risk Management Part 1
    23.1 Risk Management Part 2
    23.2 Risk Management Part 3

    Module 24: Frameworks

    24.0 Frameworks Part 1
    24.1 Frameworks Part 2
    24.2 Frameworks Part 3
    24.3 Frameworks Part 4

    Module 25: Interconnecting Systems

    25.0 Interconnecting Systems Part 1
    25.1 Interconnecting Systems Part 2

    Module 26: Security Services

    26.0 Security Services Part 1
    26.1 Security Services Part 2
    26.2 Security Services Part 3
    26.3 Security Services Part 4

    Module 27: Continuous Monitoring

    27.0 Continuous Monitoring Part 1
    27.1 Continuous Monitoring Part 2
    27.2 Continuous Monitoring Part 3
    27.3 Continuous Monitoring Part 4

    Module 28: Incident Handling

    28.0 Incident Handling Part 1
    28.1 Incident Handling Part 2
    28.2 Incident Handling Part 3
    28.3 Incident Handling Part 4

    Module 29: Forensic & Incident Response

    29.0 Forensic and Incident Response Part 1
    29.1 Forensic and Incident Response Part 2
    29.2 Forensic and Incident Response Part 3

    Module 30: Requirements Processing

    30.0 Requirements Processing Part 1
    30.1 Requirements Processing Part 2
    30.2 Requirements Processing Part 3

    Module 31: Standards Bodies

    31.0 Standards Bodies

    Module 32: Secure System Life Cycle

    32.0 Secure System Life Cycle Part 1
    32.1 Secure System Life Cycle Part 2
    32.2 Secure System Life Cycle Part 3

    Module 33: Email

    33.0 Email

    Module 34: Mobile and BYOD

    34.0 Mobile and BYOD Part 1
    34.1 Mobile and BYOD Part 2

    Module 35: Voiceover IP

    35.0 Voice over IP

    Module 36: Physical Facilities Assessment Process

    36.0 Physical Facilities Assessment Process Part 1
    36.1 Physical Facilities Assessment Process Part 2

    Module 37: Security Requirements Traceability Matrix

    37.0 Security Requirements Traceability Matrix

    Screenshots:

    ITU Online - CompTIA CAS-001: Advanced Security Practitioner (CASP)

    ITU Online - CompTIA CAS-001: Advanced Security Practitioner (CASP)

    ITU Online - CompTIA CAS-001: Advanced Security Practitioner (CASP)

    NO MIRRORS PLEASE

    WANT MORE? VISIT MY BLOG!


    ITU Online - CompTIA CAS-001: Advanced Security Practitioner (CASP)