Introduction
Welcome
()
About the exam
()
1. Threat and Vulnerability Management
Threat and vulnerability management
()
Threat intelligence
()
Threat hunting
()
Intelligence collection
()
Threat actors
()
Threat management frameworks
()
Vulnerability management activities
()
Security Content Automation Protocol
()
2. Vulnerability Assessments
Vulnerability assessments
()
Penetration test
()
Pen test steps
()
Pen test requirements
()
Code analysis
()
Protocol analysis
()
Analysis utilities
()
3. Risk Reduction
Risk reduction
()
Deceptive technologies
()
Security data analytics
()
Preventative controls
()
Application controls
()
Security automation
()
Physical security
()
4. Analyzing Vulnerabilities
Analyzing vulnerabilities
()
Race conditions
()
Buffer overflows
()
Authentication and references
()
Ciphers and certificates
()
Improper headers
()
Software composition
()
Vulnerable web applications
()
5. Attacking Vulnerabilities
Attacking vulnerabilities
()
Directory traversals
()
Cross-Site Scripting (XSS)
()
Cross-site request forgery (CSRF)
()
SQL injections
()
XML injections
()
Other injection attacks
()
Authentication bypass
()
VM attacks
()
Network attacks
()
Social engineering
()
6. Indicators of Compromise
Indicators of compromise
()
Types of IoCs
()
PCAP files
()
NetFlow
()
Logs
()
IoC notifications
()
Response to IoCs
()
7. Incident Response
Incident response
()
Triage
()
Communication plan
()
Stakeholder management
()
Incident response process
()
Playbooks
()
8. Digital Forensics
Digital forensics
()
Forensic process
()
Chain of custody
()
Order of volatility
()
Forensic analysis
()
9. Digital Forensic Tools
Digital forensic tools
()
Forensic workstations
()
File carving tools
()
Binary analysis tools
()
Forensic analysis tools
()
Imaging tools
()
Collection tools
()
Ex_Files_CASP_plus_CAS_004_Cert_Prep_2.zip
(1.2 MB)