|
|
|
|
LEADER |
00000ngm a22000007i 4500 |
001 |
OR_on1392081350 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
vz czazuu |
007 |
cr cnannnuuuuu |
008 |
230803s2023 xx 315 o vleng d |
040 |
|
|
|a ORMDA
|b eng
|e rda
|e pn
|c ORMDA
|d OCLCO
|
020 |
|
|
|a 9780996619189
|q (electronic video)
|
020 |
|
|
|a 0996619186
|q (electronic video)
|
029 |
1 |
|
|a AU@
|b 000075033659
|
035 |
|
|
|a (OCoLC)1392081350
|
037 |
|
|
|a 9780996619189
|b O'Reilly Media
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8076
|2 23/eng/20230803
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a CASP+ :
|b preparing for security architecture domain.
|
246 |
3 |
|
|a CompTIA Advanced Security Practitioner plus :
|b preparing for security architecture domain
|
246 |
3 |
0 |
|a Preparing for security architecture domain
|
250 |
|
|
|a [First edition].
|
264 |
|
1 |
|a [Place of publication not identified] :
|b Expanding Security,
|c [2023]
|
300 |
|
|
|a 1 online resource (1 video file (5 hr., 15 min.)) :
|b sound, color.
|
306 |
|
|
|a 051500
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
344 |
|
|
|a digital
|2 rdatr
|
347 |
|
|
|a video file
|2 rdaft
|
380 |
|
|
|a Instructional films
|2 lcgft
|
511 |
0 |
|
|a Dean Bushmiller, presenter.
|
520 |
|
|
|a Dean Bushmiller will give you the easiest, best path to learning the CompTIA CASP+ This certification qualifies you to assess cyber readiness within an enterprise. You will be able to design and implement the proper solutions to ensure the organization is ready for the next attack. You will have the knowledge and skills required to do the following: Architect, engineer, integrate, and implement secure solutions across complex environments to support a resilient enterprise This course in the CASP series covers the following topics: Architecture Analyze security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network Services Deperimeterization/zero trust Merging of networks from various organizations Software-defined networking Analyze organizational requirements to determine proper infrastructure security design Scalability Resiliency Automation Performance Containerization Virtualization Content delivery network Caching Integrate software applications securely into an enterprise architecture Baseline and templates Software assurance Considerations of integrating enterprise applications Integrating security into development life cycle Implement data security techniques for securing enterprise architecture Data loss prevention Data loss detection Data classification, labeling, and tagging Obfuscation Anonymization Encrypted versus unencrypted Data life cycle Data inventory and mapping Data integrity management Data storage, backup, and recovery Analyze security requirements and objectives to provide appropriate authentication and authorization controls Credential management Password policies Federation Access control Protocols Multifactor authentication One-time password Hardware root of trust Single sign-on JavaScript Object Notation web token Attestation and identity proofing Implement secure cloud and virtualization solutions Virtualization strategies Provisioning and deprovisioning Middleware Metadata and tags Deployment models and considerations Hosting models Service models Cloud provider limitations Extending appropriate on-premises controls Storage models Explain how cryptography and public key infrastructure support security objectives and requirements Privacy and confidentiality requirements Integrity requirements Non-repudiation Compliance and policy requirements Common cryptography use cases Common Public key infrastructure use cases Explain impact of emerging technologies on enterprise security and privacy Artificial intelligence Machine learning Quantum computing Blockchain Homomorphic encryption Secure multiparty computation Distributed consensus Big Data Virtual reality Three Dimetional printing Passwordless authentication Nano technology Deep learning Biometric impersonation.
|
588 |
|
|
|a Online resource; title from title details screen (O'Reilly, viewed August 3, 2023).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
610 |
2 |
0 |
|a Computing Technology Industry Association
|x Examinations
|v Study guides.
|
650 |
|
0 |
|a Computer security
|x Examinations
|v Study guides.
|
650 |
|
0 |
|a Computer networks
|x Security measures
|x Examinations
|v Study guides.
|
650 |
|
6 |
|a Sécurité informatique
|x Examens
|v Guides de l'étudiant.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures
|x Examens
|v Guides de l'étudiant.
|
655 |
|
7 |
|a Instructional films.
|2 lcgft
|
655 |
|
7 |
|a Nonfiction films.
|2 lcgft
|
655 |
|
7 |
|a Internet videos.
|2 lcgft
|
655 |
|
7 |
|a Films de formation.
|2 rvmgf
|
655 |
|
7 |
|a Films autres que de fiction.
|2 rvmgf
|
655 |
|
7 |
|a Vidéos sur Internet.
|2 rvmgf
|
700 |
1 |
|
|a Bushmiller, Dean,
|e presenter.
|
710 |
2 |
|
|a Expanding Security (Firm),
|e publisher.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9780996619189/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|