Skip to content
Phone: (856)270-1028
info@davidtechtrain.com
Enroll
Home
Training
Sign up for free training!
Areas of Study
Cybersecurity Courses
Networking
Microsoft Courses
3 ways we deliver training
Self-Pace
Instructor Led
Boot Camps
IT Certification Test Preparation Tutoring
FAQ
Course Catalog
David Tech Bundle Courses
CompTIA Stackable Certification Blended Learning Bundles
Online Self-Paced Study
CompTIA Courses
EC Council Courses
ISACA Courses
(ISC)2 Courses
Cybersecurity Courses
CISCO Courses
Microsoft Courses
Networking
Enrollment Agreement
Enrollment Form
Tuition info and Student Agreements
What are my options?
Payment and Financial Loan Options
Refer a Friend
David Tech
About Us
Contact
Membership
Benefits
CEO’s Greeting
CEO Bio
Get Started
Free Career Evaluation
General Information
Enroll
Phone: (401) 441-9174
info@davidtechtrain.com
Home
Training
Sign up for free training!
Areas of Study
Cybersecurity Courses
Networking
Microsoft Courses
3 ways we deliver training
Self-Pace
Instructor Led
Boot Camps
IT Certification Test Preparation Tutoring
FAQ
Course Catalog
David Tech Bundle Courses
CompTIA Stackable Certification Blended Learning Bundles
Online Self-Paced Study
CompTIA Courses
EC Council Courses
ISACA Courses
(ISC)2 Courses
Cybersecurity Courses
CISCO Courses
Microsoft Courses
Networking
Enrollment Agreement
Enrollment Form
Tuition info and Student Agreements
What are my options?
Payment and Financial Loan Options
Refer a Friend
David Tech
About Us
Contact
Membership
Benefits
CEO’s Greeting
CEO Bio
Get Started
Free Career Evaluation
General Information
×
Home
LP Courses
CompTIA Advanced Security Practitioner (CASP+)
CompTIA Advanced Security Practitioner (CASP+)
Curriculum
1 Section
12 Lessons
10 Weeks
Expand all sections
Collapse all sections
Risk Management and Incident Response
13
2.1
Interpreting business and industry influences and risks
2.2
Analyzing risk scenarios
2.3
Identifying the impact of de-perimeterization
2.4
Executing risk mitigation planning, strategies and control
2.5
Assessing the CIA aggregate scores
2.6
Making risk determination
2.7
Privacy policies and procedures
2.8
Developing policies to support business objectives
2.9
Safeguarding Personally Identifiable Information (PII)
2.10
Conduct incident response and recovery procedures
2.11
Constructing a data inventory with e-discovery
2.12
Minimizing the severity of data breaches
2.13
Quiz
1 Minute
2 Questions
This content is protected, please
login
and
enroll
in the course to view this content!
Modal title
Main Content