Instructional Video10:48
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Social Engineering Attacks

Higher Ed
Social engineering attacks can take place over the phone, in person, or through technology. This episode discusses concepts such as spam, phishing and DNS URL redirection. This clip is from the chapter "Testing Infrastructure" of the...
Instructional Video9:04
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Centralized Logging

Higher Ed
Network infrastructure and host and application logs can be stored centrally such as with Linux or Windows log forwarding. This can then be fed into a centralized log ingestion and analysis system, otherwise called SIEM. This clip is...
Instructional Video4:25
Curated Video

CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - The (ISC)2 Code of Ethics

Higher Ed
This video explains the various ethics. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain 1: Security and Risk...
Instructional Video11:04
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Securing Hardware

Higher Ed
All IT solutions, in the end, run on hardware somewhere. Restricting physical access to IT hardware such as through locked server rooms and encryption of data at rest provide a layer of security. This clip is from the chapter "Securing...
Instructional Video8:05
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Password Attacks

Higher Ed
Username and password authentication remains common, as do related dictionary and brute-force attacks. Account lockout threshold can mitigate password attacks other than password spraying attacks. This clip is from the chapter "Securing...
Instructional Video11:17
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Firewalls

Higher Ed
Packet filtering firewalls apply to layer 4 (Transport layer) of the OSI model and examine only packet headers to allow or deny network traffic. Content filtering firewalls apply to OSI layer 7 (Application layer) and can examine packet...
Instructional Video6:05
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Data Destruction

Higher Ed
Digital data resides on physical storage devices. Secure storage media disposal mechanisms, such as shredding, cryptographic erasure, degaussing, and disk wiping, must be put in place to ensure sensitive data cannot be retrieved by...
Instructional Video4:31
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Testing Infrastructure Overview

Higher Ed
With so many security vulnerabilities out there, a good IT security tech must know how to robustly test their network and physical security measures. This clip is from the chapter "Testing Infrastructure" of the series "CompTIA Security+...
Instructional Video2:03
Curated Video

Bug Bounty Program Certification 13.1: About the Bug Bounty Exam and Certification

Higher Ed
In this video, you will get information about bug bounty exams and preparation. • Look at the listing of bug bounty exams • Get the information about certifications • Preparation steps for exam
Instructional Video8:37
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Data Protection

Higher Ed
Data is not all the same. Whether data is at rest, in use, or in transit will affect how you can best secure it. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This...
Instructional Video6:51
Curated Video

CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - Governance, Management, standards, and frameworks

Higher Ed
CISM Domain 1: Information Security Governance: Governance, Management, standards, and frameworks This clip is from the chapter "CISM Domain 1: Information Security Governance" of the series "CISM Certification Domain 1: Information...
Instructional Video11:37
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Weak Configurations

Higher Ed
A lack of secure configurations for networks, devices, and hosts results in an increased attack surface. Default settings, especially credentials, should not be used. Deprecated security protocols such as WEP and SSL should also be...
Instructional Video9:04
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Network Authentication

Higher Ed
Older network authentication protocols such as Password Authentication Protocol (PAP) and Challenge Handshake Authentication Protocol (CHAP) have been deprecated in favor of protocols such as Kerberos and Extensible Authentication...
Instructional Video4:47
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Enabling Multifactor Authentication

Higher Ed
Multifactor authentication (MFA) hardens user sign-in by requiring more than one factor, or category of authentication, such as something you know combined with something you have. This clip is from the chapter "Identity and Account...
Instructional Video6:11
Curated Video

Disaster Recovery Planning: Ensuring Business Continuity

Higher Ed
Business continuity ensures that business processes can continue despite interruptions. Continuity of Operations (COOP), Disaster Recovery Plans (DRPs), as well as hot, warm, and cold alternate sites are discussed. This clip is from...
Instructional Video8:57
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Log Files

Higher Ed
Log files can provide valuable insights related to suspicious network, host or application activity, but only if log file integrity can be ensured. Centralized logging in the enterprise on a secured logging host ensures an accurate copy...
Instructional Video5:11
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - DNS Security

Higher Ed
DNS is a crucial network service used by everybody to resolve names to IP addresses and as a result, it is a target for attackers. This episode also discusses other protocols such has Simple Network Management Protocol (SNMP) and Secure...
Instructional Video2:36
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Introduction

Higher Ed
Mike and Dan introduce the CompTIA Security+ (SY0-601) video course from Total Seminars. This clip is from the chapter "Risk Management" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This section introduces...
Instructional Video2:38
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 9 Exam Question Review

Higher Ed
Critical infrastructure IT systems can sometimes be vulnerable to attacks. In this episode, a scenario is presented in which the best solution must be implemented to protect Programmable Logic Controllers (PLCs). This clip is from the...
Instructional Video6:51
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - RFID, NFC, and Bluetooth

Higher Ed
While there are many wireless network standards, which ones are designed for close proximity? This video covers RFID, NFC and Bluetooth wireless network communications. This clip is from the chapter "Securing Wireless LANs" of the series...
Instructional Video1:15
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 6 Ask Me Anything (AMA)

Higher Ed
Secure Sockets Layer (SSL) has long been used to secure network communication on LANs and WANs. This episode discusses how Transport Layer Security (TLS) supersedes SSL in addition to continued backwards-compatibility support that...
Instructional Video9:36
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Linux Command-Line Tools

Higher Ed
Security technicians must be comfortable with Linux commands for standard maintenance and security tasks using commands such as head, tail, grep, dig, and setting filesystem permissions with chmod. This clip is from the chapter "Tools of...
Instructional Video5:01
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Autopsy Forensic Browser Lab

Higher Ed
Digital forensics is the cross-pollination of computer science and law. In this demonstration, Dan shows how to use the Autopsy forensic tool to work with a disk image to retrieve a deleted file. This clip is from the chapter "Dealing...
Instructional Video6:22
Curated Video

Machine Learning Algorithms

Higher Ed
In this video, we will cover machine learning algorithms. This clip is from the chapter "Fundamental Principles of Machine Learning on Azure (30- 35%)" of the series "AI-900: Microsoft Azure AI Fundamentals Video Course + Ques".In this...