Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Web Application Security
The OWASP Top 10 identifies common web application attacks. This episode also discusses secure coding practices that should be applied to each System (Or Software) Development Life Cycle (SDLC) phase. This clip is from the chapter...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Security and the Information Life Cycle
Security must be applied to all phases of the information life cycle, from collection to its eventual archiving and deletion. This includes data security techniques such as tokenization and masking while considering how laws apply to...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - The OSI Model
Is there a standard model for describing and mapping network hardware and software? Yes, the 7-layer conceptual OSI model! Understanding network security and selecting the appropriate security solutions requires a solid understanding of...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 3 Ask Me Anything (AMA) "Identity and Account Management"
Authentication can be configured and managed within a single organization to control access to IT resources. This episode covers identity federation and its relationship to identity and resource providers. This clip is from the chapter...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 3 Exam Question Review "Identity and Account Management"
There are a variety of ways in which user authentication can be implemented prior to allowing user access to the Internet. This question presents a scenario require user sign-off to a term of agreement before gaining Internet access....
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Creating Linux Users and Groups Lab
User and group management in Linux can be performed at the command line. This demo makes use of the user add and group add commands to create authentication identities. This clip is from the chapter "Identity and Account Management" of...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Identification, Authentication, and Authorization
Authorization to access resources occurs after the successful proving of one's identity through authentication. This clip is from the chapter "Identity and Account Management" of the series "CompTIA Security+ Certification SY0-601: The...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Threat Intelligence
With the ever-changing IT threat landscape, how can you keep up with the latest security issues? Threat intelligence refers to the wide variety of open-source intelligence (OSINT) and proprietary IT security sources that use standards...
Two Minute Music Theory
Sonification: The Music of Data
Data can sometimes be dense and difficult to look at. Today we look at a technique known as sonification that scientists and musicians collaborate to create, a technique that can give researchers a different perspective on the dataset.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Certificate Types
Mike reviews different types of certificates including web, email, code-signing, machine/computer, and user. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Disk RAID Levels
Data availability, including through disk redundancy, is an aspect of IT security. There are various RAID levels that organize physical disks together to provide performance and/or fault tolerant benefits. This clip is from the chapter...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Hashing
Hashes provide assurance of data integrity using fascinating mathematical calculations. Passwords are a very common use for hashing. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Environmental Controls
Computing equipment must be kept at the correct temperature and humidity levels to function efficiently. This episode covers air flow management using hot and cold aisles as well as environmental monitoring. This clip is from the chapter...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - About the Security+ (SY0-601) Exam
This episode goes over the domains of the CompTIA Security+ (SY0-601) exam objectives and the various topics that are covered. This clip is from the chapter "Risk Management" of the series "CompTIA Security+ Certification SY0-601: The...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Physical Security Overview
Physical security matters because all digital IT systems and data rely upon physical equipment somewhere. This clip is from the chapter "Physical Security" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Network Planning
Which security considerations are important when planning your network design? IP addressing and network segmentation using screened subnets can be used for hosting public servers. VLANs can improve network performance and provide...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Microsoft PowerShell
Is there a better way to automate operating system commands than through scripts and text manipulation? Yes! Microsoft PowerShell is an object-oriented cross-platform command environment that uses a verb-noun type of syntax, such as with...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Incident Response Overview
Responding to incidents in a timely and effective manner is the result of proactive planning with defined roles and responsibilities. This clip is from the chapter "Dealing with Incidents" of the series "CompTIA Security+ Certification...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 1 Exam Question Review
Threats are executed by a variety of different threat actors, each type having a different motivation for executing attacks. This episode presents a scenario where the correct type of threat actor must be selected. This clip is from the...
The Wall Street Journal
Don't Be the Weak Link in the Supply Chain
You're a supplier to a multinational with stringent requirements for the cybersecurity of its supply chain partners. How can you keep them happy and how can you avoid collateral damage from your partners.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Cloud Service Models
Cloud computing services are categorized using the term "as a service" (aaS). This episode discusses IaaS, Paas, SaaS, and where responsibility lies for each type of service. This clip is from the chapter "Securing Public Servers" of the...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Internet of Things (IoT) Devices
IoT devices are function-specific and can communicate over the Internet. Examples include environmental control devices, medical devices, and video surveillance systems. This episode also covers the Zigbee smart home automation protocol....
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Containers and Software-Defined Networking
Modern software development often uses application containers which serve as a logical boundary for app files and settings outside of the operating system. This episode also covers Software-Defined Networking (SDN). This clip is from the...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Driver and Overflow Attacks
Malicious actors can trick victims into installing malicious code such as driver shims. Software programming flaws related to memory allocation can result in security threats. Secure coding, patching, and user awareness go a long way in...