Instructional Video10:20
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Disk RAID Levels

Higher Ed
Data availability, including through disk redundancy, is an aspect of IT security. There are various RAID levels that organize physical disks together to provide performance and/or fault tolerant benefits. This clip is from the chapter...
Instructional Video8:43
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Hashing

Higher Ed
Hashes provide assurance of data integrity using fascinating mathematical calculations. Passwords are a very common use for hashing. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The...
Instructional Video5:24
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Environmental Controls

Higher Ed
Computing equipment must be kept at the correct temperature and humidity levels to function efficiently. This episode covers air flow management using hot and cold aisles as well as environmental monitoring. This clip is from the chapter...
Instructional Video3:07
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - About the Security+ (SY0-601) Exam

Higher Ed
This episode goes over the domains of the CompTIA Security+ (SY0-601) exam objectives and the various topics that are covered. This clip is from the chapter "Risk Management" of the series "CompTIA Security+ Certification SY0-601: The...
Instructional Video0:59
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Physical Security Overview

Higher Ed
Physical security matters because all digital IT systems and data rely upon physical equipment somewhere. This clip is from the chapter "Physical Security" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This...
Instructional Video7:05
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Network Planning

Higher Ed
Which security considerations are important when planning your network design? IP addressing and network segmentation using screened subnets can be used for hosting public servers. VLANs can improve network performance and provide...
Instructional Video12:33
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Microsoft PowerShell

Higher Ed
Is there a better way to automate operating system commands than through scripts and text manipulation? Yes! Microsoft PowerShell is an object-oriented cross-platform command environment that uses a verb-noun type of syntax, such as with...
Instructional Video2:59
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Incident Response Overview

Higher Ed
Responding to incidents in a timely and effective manner is the result of proactive planning with defined roles and responsibilities. This clip is from the chapter "Dealing with Incidents" of the series "CompTIA Security+ Certification...
Instructional Video1:42
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 1 Exam Question Review

Higher Ed
Threats are executed by a variety of different threat actors, each type having a different motivation for executing attacks. This episode presents a scenario where the correct type of threat actor must be selected. This clip is from the...
Instructional Video8:28
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Cloud Service Models

Higher Ed
Cloud computing services are categorized using the term "as a service" (aaS). This episode discusses IaaS, Paas, SaaS, and where responsibility lies for each type of service. This clip is from the chapter "Securing Public Servers" of the...
Instructional Video10:05
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Internet of Things (IoT) Devices

Higher Ed
IoT devices are function-specific and can communicate over the Internet. Examples include environmental control devices, medical devices, and video surveillance systems. This episode also covers the Zigbee smart home automation protocol....
Instructional Video11:28
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Containers and Software-Defined Networking

Higher Ed
Modern software development often uses application containers which serve as a logical boundary for app files and settings outside of the operating system. This episode also covers Software-Defined Networking (SDN). This clip is from the...
Instructional Video7:55
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Driver and Overflow Attacks

Higher Ed
Malicious actors can trick victims into installing malicious code such as driver shims. Software programming flaws related to memory allocation can result in security threats. Secure coding, patching, and user awareness go a long way in...
Instructional Video10:48
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Social Engineering Attacks

Higher Ed
Social engineering attacks can take place over the phone, in person, or through technology. This episode discusses concepts such as spam, phishing and DNS URL redirection. This clip is from the chapter "Testing Infrastructure" of the...
Instructional Video9:04
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Centralized Logging

Higher Ed
Network infrastructure and host and application logs can be stored centrally such as with Linux or Windows log forwarding. This can then be fed into a centralized log ingestion and analysis system, otherwise called SIEM. This clip is...
Instructional Video11:04
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Securing Hardware

Higher Ed
All IT solutions, in the end, run on hardware somewhere. Restricting physical access to IT hardware such as through locked server rooms and encryption of data at rest provide a layer of security. This clip is from the chapter "Securing...
Instructional Video8:05
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Password Attacks

Higher Ed
Username and password authentication remains common, as do related dictionary and brute-force attacks. Account lockout threshold can mitigate password attacks other than password spraying attacks. This clip is from the chapter "Securing...
Instructional Video11:17
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Firewalls

Higher Ed
Packet filtering firewalls apply to layer 4 (Transport layer) of the OSI model and examine only packet headers to allow or deny network traffic. Content filtering firewalls apply to OSI layer 7 (Application layer) and can examine packet...
Instructional Video6:05
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Data Destruction

Higher Ed
Digital data resides on physical storage devices. Secure storage media disposal mechanisms, such as shredding, cryptographic erasure, degaussing, and disk wiping, must be put in place to ensure sensitive data cannot be retrieved by...
Instructional Video4:31
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Testing Infrastructure Overview

Higher Ed
With so many security vulnerabilities out there, a good IT security tech must know how to robustly test their network and physical security measures. This clip is from the chapter "Testing Infrastructure" of the series "CompTIA Security+...
Instructional Video8:37
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Data Protection

Higher Ed
Data is not all the same. Whether data is at rest, in use, or in transit will affect how you can best secure it. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This...
Instructional Video11:37
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Weak Configurations

Higher Ed
A lack of secure configurations for networks, devices, and hosts results in an increased attack surface. Default settings, especially credentials, should not be used. Deprecated security protocols such as WEP and SSL should also be...
Instructional Video9:04
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Network Authentication

Higher Ed
Older network authentication protocols such as Password Authentication Protocol (PAP) and Challenge Handshake Authentication Protocol (CHAP) have been deprecated in favor of protocols such as Kerberos and Extensible Authentication...
Instructional Video4:47
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Enabling Multifactor Authentication

Higher Ed
Multifactor authentication (MFA) hardens user sign-in by requiring more than one factor, or category of authentication, such as something you know combined with something you have. This clip is from the chapter "Identity and Account...