• To ensure you get the most out of your CIN membership and stay connected with the latest updates, we are asking all members to update their community profiles. Please take a few moments to log in and: • Complete all sections of your profile • Review your current information for accuracy • Enter an alternative email address if desired (CIN requires your valid business email address for your training organization). Keeping your profile up to date helps us better serve you, ensures your account is correctly linked with CompTIA’s CRM, streamlines processes, enhances communication, and guarantees you never miss out on valuable CIN opportunities. Thank you for taking this important step! step!

Corrections for CAS-004 content before using the content in CAS-005 / SecurityX

Hank Cox

Active member
Sep 12, 2023
39
53
3,371
Atlanta, Georgia, US
hsec.tech
My compliments to the CAS-004 developers! I have taught CAS-004 several times, and found almost no errors in the student manuals.

Is anyone here working on developing the new CAS-005 / SecurityX materials?

@Stephen Schneiter does the development team want instructors to report inaccurate content? Does the team have a list of known errors so we can see what has already been reported?

Suggested CAS-004 content corrections before reusing the content in CAS-005 / SecurityX:

Page 117 “DSTS”

Suggested correction:
change to “HSTS”
Explanation:
HSTS is an initialism for “HTTP Strict Transport Security.”

Page 121 “Jack the Ripper”
Suggested correction:
change to “John the Ripper”
Explanation:
John the Ripper is a password cracking tool. Jack the Ripper was a serial killer.

Page 297 “director traversal”
Suggested correction:
change to “directory traversal”
Explanation:
In directory traversal, an attacker manipulates file paths.

Module 9, PowerPoint slide 16: “Block Ciphers”
Suggested correction: change to “Modes of Operation”
Explanation: A block cipher is a type of encryption algorithm. Block ciphers can have different modes of
operation. This slide covers modes of operation. As the slide notes point out, modes of operation are
techniques paired with symmetric encryption, they are not encryption algorithms.
 

Attachments

  • CertMaster Learn CAS-004 Instructor Manual Errata.pdf
    100.4 KB · Views: 22
Last edited: