Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

CASP+ Cert Prep: 5 Research, Development and Collaboration

Description

In this installment of the CASP+ Cert Prep series, prepare for domain 5 of the CompTIA Advanced Security Practitioner (CASP+) exam: Research, Development, and Collaboration.

Tags

Syllabus

Syllabus IntroductionResearch, development, and enterprise cybersecurityWhat you should knowAbout the exam1. Research MethodsConducting researchThreat intelligence on latest attacksCurrent threats and threat modelsZero-day mitigation controlsEmerging social media platformsBig data and artificial intelligenceIntegration research within the businessComputer emergency response team (CERT)Conferences, conventions, consultants, and vendorsThreat actor activitiesEmerging threat sources2 Security Activities across the Life CycleSystems development life cycleOperational activitiesAsset disposal and asset reuseSoftware development life cycleApplication security frameworksSoftware assuranceApproaches to developmentSecure coding standardsDocumentationValidation and acceptance testingAdapting solutions to meet a needAsset management and inventory control3. Collaboration with Other Business UnitsCollaboration across business unitsSales staffProgrammerDatabase administratorNetwork administratorManagement and executive managementFinancialHuman resourcesEmergency response teamFacilities managerPhysical security managerLegal counselGovernance, risk, and compliance committeeProviding guidance to senior managementEffective collaboration to implement security solutionsConclusionWhat to do next Read more


CASP+ Cert Prep: 5 Research, Development and Collaboration

Affiliate notice

In this installment of the CASP+ Cert Prep series, prepare for domain 5 of the CompTIA Advanced Security Practitioner (CASP+) exam: Research, Development, and Collaboration.

Syllabus IntroductionResearch, development, and enterprise cybersecurityWhat you should knowAbout the exam1. Research MethodsConducting researchThreat intelligence on latest attacksCurrent threats and threat modelsZero-day mitigation controlsEmerging social media platformsBig data and artificial intelligenceIntegration research within the businessComputer emergency response team (CERT)Conferences, conventions, consultants, and vendorsThreat actor activitiesEmerging threat sources2 Security Activities across the Life CycleSystems development life cycleOperational activitiesAsset disposal and asset reuseSoftware development life cycleApplication security frameworksSoftware assuranceApproaches to developmentSecure coding standardsDocumentationValidation and acceptance testingAdapting solutions to meet a needAsset management and inventory control3. Collaboration with Other Business UnitsCollaboration across business unitsSales staffProgrammerDatabase administratorNetwork administratorManagement and executive managementFinancialHuman resourcesEmergency response teamFacilities managerPhysical security managerLegal counselGovernance, risk, and compliance committeeProviding guidance to senior managementEffective collaboration to implement security solutionsConclusionWhat to do next Read more