Instructional Video6:38
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Quantitative Risk Assessments

Higher Ed
Is the cost of a security control justified? A quantitative risk assessment uses various calculations against an asset to determine the maximum yearly spend for protecting that asset. This clip is from the chapter "Risk Management" of...
Instructional Video8:24
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Defining Risk

Higher Ed
Managing risk involves identifying threat actors from script kiddies to state-sponsored attackers. Mitigating threats is achieved by identifying assets and putting security controls in place to mitigate risks. This clip is from the...
Instructional Video2:16
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 1 Ask Me Anything (AMA)

Higher Ed
The use of social media platforms has skyrocketed in recent years. Organizations must take the appropriate steps to ensure that sensitive data is not leaked through this mechanism. This clip is from the chapter "Risk Management" of the...
Instructional Video3:55
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Qualitative Risk Assessments

Higher Ed
The same risk can have a different impact to various organizations. Qualitative risk assessment use subjective priority ratings for risks rather than dollar values. This clip is from the chapter "Risk Management" of the series "CompTIA...
Instructional Video5:53
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Identity Management Systems

Higher Ed
How can authentication be removed from individual apps? The answer is identity federation, which uses a centralized identity provider that is trusted by resources, such as Web apps, and can also support single sign-on (SSO). This clip is...
Instructional Video13:03
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Intrusion Detection and Prevention Systems (IDS/IPS)

Higher Ed
Intrusion detection can detect, log, report, and send alerts when suspicious activity is detected on a host or on the network, whereas intrusion prevention can be configured to stop the suspicious activity. Anomaly detection can be...
Instructional Video9:48
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Penetration Testing

Higher Ed
This episode focuses on how penetration testing discovers and exploits security vulnerabilities. Concepts covered include known, partially known, and unknown testing types as well as the role that red, white, blue, and purple teams play....
Instructional Video6:31
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Agreement Types

Higher Ed
When organizations enter into business partnerships with third-party service providers, the agreements and contracts they both sign protect both organizations legally, as well as establish the terms of service. This episode covers the...
Instructional Video11:04
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Mobile Device Deployment and Hardening

Higher Ed
Organizations normally allow the use of personal or work-issued mobile devices for work purposes through provisioning schemes such as Bring Your Own Device (BYOD) and Choose Your Own Device (CYOD). This episode also discusses Subscriber...
Instructional Video10:53
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Connecting to Dedicated and Mobile Systems

Higher Ed
There are many modern wireless communication standards. This episode discussed the Global Positioning System (GPS), 4G and 5G cellular, Wi-Fi Direct, and mobile device tethering. This clip is from the chapter "Securing Dedicated Systems"...
Instructional Video10:21
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Securing the Cloud

Higher Ed
Cloud security is generally split between the Cloud Service Provider (CSP) and the cloud tenant, depending on which type of cloud service is being used. Security solutions include firewalls, data loss prevention tools as well as a Cloud...
Instructional Video13:43
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Malware

Higher Ed
Malicious software is referred to as malware and includes various types including ransomware, fileless viruses, worms, keyloggers, and trojan horses. Infected computers that periodically contact command and control servers are called...
Instructional Video12:14
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Digital Forensics

Higher Ed
The application of computer science to legal situations include evidence gathering is referred to as digital forensics. This episode covers e-discovery and steganography. This clip is from the chapter "Dealing with Incidents" of the...
Instructional Video8:21
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Wi-Fi Coverage and Performance

Higher Ed
Optimizing Wi-Fi communication means ensuring there is proper coverage over a given area and that there are no wireless interference issues from other transmitting devices. A wireless site survey with a heat map can identify overlapping...
Instructional Video13:20
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Embedded Systems

Higher Ed
Embedded systems use an operating system burned into one or more chips and have a defined function, such as running an elevator or proving Wi-Fi services. In this episode, Industrial Control Systems, Internet of Things (IoT), Raspberry...
Instructional Video8:02
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Web Application Security

Higher Ed
The OWASP Top 10 identifies common web application attacks. This episode also discusses secure coding practices that should be applied to each System (Or Software) Development Life Cycle (SDLC) phase. This clip is from the chapter...
Instructional Video9:04
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Security and the Information Life Cycle

Higher Ed
Security must be applied to all phases of the information life cycle, from collection to its eventual archiving and deletion. This includes data security techniques such as tokenization and masking while considering how laws apply to...
Instructional Video12:31
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - The OSI Model

Higher Ed
Is there a standard model for describing and mapping network hardware and software? Yes, the 7-layer conceptual OSI model! Understanding network security and selecting the appropriate security solutions requires a solid understanding of...
Instructional Video1:18
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 3 Ask Me Anything (AMA) "Identity and Account Management"

Higher Ed
Authentication can be configured and managed within a single organization to control access to IT resources. This episode covers identity federation and its relationship to identity and resource providers. This clip is from the chapter...
Instructional Video2:18
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 3 Exam Question Review "Identity and Account Management"

Higher Ed
There are a variety of ways in which user authentication can be implemented prior to allowing user access to the Internet. This question presents a scenario require user sign-off to a term of agreement before gaining Internet access....
Instructional Video5:48
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Creating Linux Users and Groups Lab

Higher Ed
User and group management in Linux can be performed at the command line. This demo makes use of the user add and group add commands to create authentication identities. This clip is from the chapter "Identity and Account Management" of...
Instructional Video8:01
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Identification, Authentication, and Authorization

Higher Ed
Authorization to access resources occurs after the successful proving of one's identity through authentication. This clip is from the chapter "Identity and Account Management" of the series "CompTIA Security+ Certification SY0-601: The...
Instructional Video11:00
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Threat Intelligence

Higher Ed
With the ever-changing IT threat landscape, how can you keep up with the latest security issues? Threat intelligence refers to the wide variety of open-source intelligence (OSINT) and proprietary IT security sources that use standards...
Instructional Video14:11
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Certificate Types

Higher Ed
Mike reviews different types of certificates including web, email, code-signing, machine/computer, and user. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This...