Instructional Video8:02
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Web Application Security

Higher Ed
The OWASP Top 10 identifies common web application attacks. This episode also discusses secure coding practices that should be applied to each System (Or Software) Development Life Cycle (SDLC) phase. This clip is from the chapter...
Instructional Video9:04
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Security and the Information Life Cycle

Higher Ed
Security must be applied to all phases of the information life cycle, from collection to its eventual archiving and deletion. This includes data security techniques such as tokenization and masking while considering how laws apply to...
Instructional Video12:31
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - The OSI Model

Higher Ed
Is there a standard model for describing and mapping network hardware and software? Yes, the 7-layer conceptual OSI model! Understanding network security and selecting the appropriate security solutions requires a solid understanding of...
Instructional Video1:18
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 3 Ask Me Anything (AMA) "Identity and Account Management"

Higher Ed
Authentication can be configured and managed within a single organization to control access to IT resources. This episode covers identity federation and its relationship to identity and resource providers. This clip is from the chapter...
Instructional Video2:18
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 3 Exam Question Review "Identity and Account Management"

Higher Ed
There are a variety of ways in which user authentication can be implemented prior to allowing user access to the Internet. This question presents a scenario require user sign-off to a term of agreement before gaining Internet access....
Instructional Video5:48
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Creating Linux Users and Groups Lab

Higher Ed
User and group management in Linux can be performed at the command line. This demo makes use of the user add and group add commands to create authentication identities. This clip is from the chapter "Identity and Account Management" of...
Instructional Video8:01
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Identification, Authentication, and Authorization

Higher Ed
Authorization to access resources occurs after the successful proving of one's identity through authentication. This clip is from the chapter "Identity and Account Management" of the series "CompTIA Security+ Certification SY0-601: The...
Instructional Video11:00
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Threat Intelligence

Higher Ed
With the ever-changing IT threat landscape, how can you keep up with the latest security issues? Threat intelligence refers to the wide variety of open-source intelligence (OSINT) and proprietary IT security sources that use standards...
Instructional Video4:50
Two Minute Music Theory

Sonification: The Music of Data

12th - Higher Ed
Data can sometimes be dense and difficult to look at. Today we look at a technique known as sonification that scientists and musicians collaborate to create, a technique that can give researchers a different perspective on the dataset.
Instructional Video14:11
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Certificate Types

Higher Ed
Mike reviews different types of certificates including web, email, code-signing, machine/computer, and user. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This...
Instructional Video10:20
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Disk RAID Levels

Higher Ed
Data availability, including through disk redundancy, is an aspect of IT security. There are various RAID levels that organize physical disks together to provide performance and/or fault tolerant benefits. This clip is from the chapter...
Instructional Video8:43
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Hashing

Higher Ed
Hashes provide assurance of data integrity using fascinating mathematical calculations. Passwords are a very common use for hashing. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The...
Instructional Video5:24
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Environmental Controls

Higher Ed
Computing equipment must be kept at the correct temperature and humidity levels to function efficiently. This episode covers air flow management using hot and cold aisles as well as environmental monitoring. This clip is from the chapter...
Instructional Video3:07
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - About the Security+ (SY0-601) Exam

Higher Ed
This episode goes over the domains of the CompTIA Security+ (SY0-601) exam objectives and the various topics that are covered. This clip is from the chapter "Risk Management" of the series "CompTIA Security+ Certification SY0-601: The...
Instructional Video0:59
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Physical Security Overview

Higher Ed
Physical security matters because all digital IT systems and data rely upon physical equipment somewhere. This clip is from the chapter "Physical Security" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This...
Instructional Video7:05
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Network Planning

Higher Ed
Which security considerations are important when planning your network design? IP addressing and network segmentation using screened subnets can be used for hosting public servers. VLANs can improve network performance and provide...
Instructional Video12:33
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Microsoft PowerShell

Higher Ed
Is there a better way to automate operating system commands than through scripts and text manipulation? Yes! Microsoft PowerShell is an object-oriented cross-platform command environment that uses a verb-noun type of syntax, such as with...
Instructional Video2:59
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Incident Response Overview

Higher Ed
Responding to incidents in a timely and effective manner is the result of proactive planning with defined roles and responsibilities. This clip is from the chapter "Dealing with Incidents" of the series "CompTIA Security+ Certification...
Instructional Video1:42
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 1 Exam Question Review

Higher Ed
Threats are executed by a variety of different threat actors, each type having a different motivation for executing attacks. This episode presents a scenario where the correct type of threat actor must be selected. This clip is from the...
Instructional Video18:41
The Wall Street Journal

Don't Be the Weak Link in the Supply Chain

Higher Ed
You're a supplier to a multinational with stringent requirements for the cybersecurity of its supply chain partners. How can you keep them happy and how can you avoid collateral damage from your partners.
Instructional Video8:28
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Cloud Service Models

Higher Ed
Cloud computing services are categorized using the term "as a service" (aaS). This episode discusses IaaS, Paas, SaaS, and where responsibility lies for each type of service. This clip is from the chapter "Securing Public Servers" of the...
Instructional Video10:05
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Internet of Things (IoT) Devices

Higher Ed
IoT devices are function-specific and can communicate over the Internet. Examples include environmental control devices, medical devices, and video surveillance systems. This episode also covers the Zigbee smart home automation protocol....
Instructional Video11:28
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Containers and Software-Defined Networking

Higher Ed
Modern software development often uses application containers which serve as a logical boundary for app files and settings outside of the operating system. This episode also covers Software-Defined Networking (SDN). This clip is from the...
Instructional Video7:55
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Driver and Overflow Attacks

Higher Ed
Malicious actors can trick victims into installing malicious code such as driver shims. Software programming flaws related to memory allocation can result in security threats. Secure coding, patching, and user awareness go a long way in...