Instructional Video6:44
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Industrial Control System (ICS)

Higher Ed
ICSs use computing devices to automate tasks in a fast dependable way using Programmable Logic Controllers (PLCs). This episode also covers Supervisory Control and Data Acquisition (SCADA). This clip is from the chapter "Securing...
Instructional Video9:19
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Business Impact Analysis

Higher Ed
In addition to deploying effective security controls to protect assets, what can be done to ensure business continuity in the event of a security incident. A business impact analysis involves proactive planning to help reduce downtime...
Instructional Video9:23
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Security Controls

Higher Ed
Various security standards such as PCI DSS and the Cloud Controls Matrix (CCM) define what types of security controls to put in place to mitigate risk both on-premises and in the cloud. The specific type of attack vector determines...
Instructional Video6:50
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Access Control Schemes

Higher Ed
Controlling access to resources begins with policies governing how credentials are managed. Permissions to use resources can be configured through Attribute-Based Access Control (ABAC), Role-Based Access Control (RBAC), Discretionary...
Instructional Video5:45
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Risk Assessments and Treatments

Higher Ed
How can you determine whether assets are adequately protected from threats? One way is running periodic risk assessments to address the ever-changing threat landscape to define the likelihood and impact of security incidents. This clip...
Instructional Video7:05
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Threats and Vulnerabilities

Higher Ed
The CIA security triad (confidentiality, integrity and availability) describes how solutions such as encryption, hashing, and data backups can address potential attack vectors that might be exploited by threat actors. This clip is from...
Instructional Video14:07
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Authentication Methods

Higher Ed
Have you ever had trouble remembering usernames and passwords for multiple web apps? Password vaults serve as a protected credential repository in addition to common authentication methods such as one-time password codes,...
Instructional Video4:51
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Authorization

Higher Ed
What role does authorization play in Identity and Access Management (IAM)? Authorization relates to resource permissions granted to a security principal such as a user or device. This clip is from the chapter "Identity and Account...
Instructional Video6:38
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Quantitative Risk Assessments

Higher Ed
Is the cost of a security control justified? A quantitative risk assessment uses various calculations against an asset to determine the maximum yearly spend for protecting that asset. This clip is from the chapter "Risk Management" of...
Instructional Video8:24
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Defining Risk

Higher Ed
Managing risk involves identifying threat actors from script kiddies to state-sponsored attackers. Mitigating threats is achieved by identifying assets and putting security controls in place to mitigate risks. This clip is from the...
Instructional Video2:16
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 1 Ask Me Anything (AMA)

Higher Ed
The use of social media platforms has skyrocketed in recent years. Organizations must take the appropriate steps to ensure that sensitive data is not leaked through this mechanism. This clip is from the chapter "Risk Management" of the...
Instructional Video3:55
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Qualitative Risk Assessments

Higher Ed
The same risk can have a different impact to various organizations. Qualitative risk assessment use subjective priority ratings for risks rather than dollar values. This clip is from the chapter "Risk Management" of the series "CompTIA...
Instructional Video7:39
Physics Girl

Quantum Cryptography Explained

9th - 12th
With recent high-profile security decryption cases, encryption is more important than ever. Much of your browser usage and your smartphone data is encrypted. But what does that process actually entail? And when computers get smarter and...
Instructional Video5:53
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Identity Management Systems

Higher Ed
How can authentication be removed from individual apps? The answer is identity federation, which uses a centralized identity provider that is trusted by resources, such as Web apps, and can also support single sign-on (SSO). This clip is...
Instructional Video13:03
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Intrusion Detection and Prevention Systems (IDS/IPS)

Higher Ed
Intrusion detection can detect, log, report, and send alerts when suspicious activity is detected on a host or on the network, whereas intrusion prevention can be configured to stop the suspicious activity. Anomaly detection can be...
Instructional Video9:48
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Penetration Testing

Higher Ed
This episode focuses on how penetration testing discovers and exploits security vulnerabilities. Concepts covered include known, partially known, and unknown testing types as well as the role that red, white, blue, and purple teams play....
Instructional Video6:31
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Agreement Types

Higher Ed
When organizations enter into business partnerships with third-party service providers, the agreements and contracts they both sign protect both organizations legally, as well as establish the terms of service. This episode covers the...
Instructional Video11:04
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Mobile Device Deployment and Hardening

Higher Ed
Organizations normally allow the use of personal or work-issued mobile devices for work purposes through provisioning schemes such as Bring Your Own Device (BYOD) and Choose Your Own Device (CYOD). This episode also discusses Subscriber...
Instructional Video10:53
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Connecting to Dedicated and Mobile Systems

Higher Ed
There are many modern wireless communication standards. This episode discussed the Global Positioning System (GPS), 4G and 5G cellular, Wi-Fi Direct, and mobile device tethering. This clip is from the chapter "Securing Dedicated Systems"...
Instructional Video10:21
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Securing the Cloud

Higher Ed
Cloud security is generally split between the Cloud Service Provider (CSP) and the cloud tenant, depending on which type of cloud service is being used. Security solutions include firewalls, data loss prevention tools as well as a Cloud...
Instructional Video13:43
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Malware

Higher Ed
Malicious software is referred to as malware and includes various types including ransomware, fileless viruses, worms, keyloggers, and trojan horses. Infected computers that periodically contact command and control servers are called...
Instructional Video12:14
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Digital Forensics

Higher Ed
The application of computer science to legal situations include evidence gathering is referred to as digital forensics. This episode covers e-discovery and steganography. This clip is from the chapter "Dealing with Incidents" of the...
Instructional Video8:21
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Wi-Fi Coverage and Performance

Higher Ed
Optimizing Wi-Fi communication means ensuring there is proper coverage over a given area and that there are no wireless interference issues from other transmitting devices. A wireless site survey with a heat map can identify overlapping...
Instructional Video13:20
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Embedded Systems

Higher Ed
Embedded systems use an operating system burned into one or more chips and have a defined function, such as running an elevator or proving Wi-Fi services. In this episode, Industrial Control Systems, Internet of Things (IoT), Raspberry...