CompTIA Advanced Security Practitioner (CASP) CAS-003 Cert Guide

by ;
  • ISBN13:


  • ISBN10:


  • Edition: 2nd
  • Format: Hardcover
  • Copyright: 2018-05-09
  • Publisher: Pearson IT Certification
  • Purchase Benefits
  • Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $59.99 Save up to $9.00
  • Buy New
    Add to Cart Free Shipping


Supplemental Materials

What is included with this book?

  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.


CompTIA® Advanced Security Practitioner (CASP) CAS-003 Cert Guide focuses specifically on the objectives for CompTIA’s CASP CAS-003 exam. Expert security certification training experts Robin Abernathy and Troy McMillan share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.


The book presents you with an organized test preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly.

Table of Contents

Part 1: Risk Management

Chapter 1: Business and Industry Influences and Associated Security Risks
Chapter 2: Security, Privacy Policies, and Procedures
Chapter 3: Risk Mitigation Strategies and Controls
Chapter 4: Risk Metric Scenarios to Secure the Enterprise

Part 2: Enterprise Security Architecture

Chapter 5: Network and Security Components, Concepts, and Architectures
Chapter 6: Security Controls for Host Devices
Chapter 7: Security Controls for Mobile and Small Form Factor Devices
Chapter 8: Software Vulnerability Security Controls

Part 3: Enterprise Security Operations

Chapter 9: Security Assessments
Chapter 10: Select the Appropriate Security Assessment Tool
Chapter 11: Incident Response and Recovery

Part 4: Technical Integration of Enterprise Security

Chapter 12: Host, Storage, Network, and Application Integration
Chapter 13: Cloud and Virtualization Technology Integration
Chapter 14: Authentication and Authorization Technology Integration
Chapter 15: Cryptographic Technologies

Chapter 16: Communications and Collaboration Solutions

Part 5: Research, Development, and Collaboration
Chapter 17: Researching Industry Trends and Their Impact
Chapter 18: Security Activities Across the Technology Life Cycle
Chapter 19: Interaction Across Diverse Business Units

Rewards Program

Write a Review