Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Disk RAID Levels
Data availability, including through disk redundancy, is an aspect of IT security. There are various RAID levels that organize physical disks together to provide performance and/or fault tolerant benefits. This clip is from the chapter...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Hashing
Hashes provide assurance of data integrity using fascinating mathematical calculations. Passwords are a very common use for hashing. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Environmental Controls
Computing equipment must be kept at the correct temperature and humidity levels to function efficiently. This episode covers air flow management using hot and cold aisles as well as environmental monitoring. This clip is from the chapter...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - About the Security+ (SY0-601) Exam
This episode goes over the domains of the CompTIA Security+ (SY0-601) exam objectives and the various topics that are covered. This clip is from the chapter "Risk Management" of the series "CompTIA Security+ Certification SY0-601: The...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Physical Security Overview
Physical security matters because all digital IT systems and data rely upon physical equipment somewhere. This clip is from the chapter "Physical Security" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Network Planning
Which security considerations are important when planning your network design? IP addressing and network segmentation using screened subnets can be used for hosting public servers. VLANs can improve network performance and provide...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Microsoft PowerShell
Is there a better way to automate operating system commands than through scripts and text manipulation? Yes! Microsoft PowerShell is an object-oriented cross-platform command environment that uses a verb-noun type of syntax, such as with...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Incident Response Overview
Responding to incidents in a timely and effective manner is the result of proactive planning with defined roles and responsibilities. This clip is from the chapter "Dealing with Incidents" of the series "CompTIA Security+ Certification...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 1 Exam Question Review
Threats are executed by a variety of different threat actors, each type having a different motivation for executing attacks. This episode presents a scenario where the correct type of threat actor must be selected. This clip is from the...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Cloud Service Models
Cloud computing services are categorized using the term "as a service" (aaS). This episode discusses IaaS, Paas, SaaS, and where responsibility lies for each type of service. This clip is from the chapter "Securing Public Servers" of the...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Internet of Things (IoT) Devices
IoT devices are function-specific and can communicate over the Internet. Examples include environmental control devices, medical devices, and video surveillance systems. This episode also covers the Zigbee smart home automation protocol....
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Containers and Software-Defined Networking
Modern software development often uses application containers which serve as a logical boundary for app files and settings outside of the operating system. This episode also covers Software-Defined Networking (SDN). This clip is from the...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Driver and Overflow Attacks
Malicious actors can trick victims into installing malicious code such as driver shims. Software programming flaws related to memory allocation can result in security threats. Secure coding, patching, and user awareness go a long way in...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Social Engineering Attacks
Social engineering attacks can take place over the phone, in person, or through technology. This episode discusses concepts such as spam, phishing and DNS URL redirection. This clip is from the chapter "Testing Infrastructure" of the...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Centralized Logging
Network infrastructure and host and application logs can be stored centrally such as with Linux or Windows log forwarding. This can then be fed into a centralized log ingestion and analysis system, otherwise called SIEM. This clip is...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Securing Hardware
All IT solutions, in the end, run on hardware somewhere. Restricting physical access to IT hardware such as through locked server rooms and encryption of data at rest provide a layer of security. This clip is from the chapter "Securing...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Password Attacks
Username and password authentication remains common, as do related dictionary and brute-force attacks. Account lockout threshold can mitigate password attacks other than password spraying attacks. This clip is from the chapter "Securing...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Firewalls
Packet filtering firewalls apply to layer 4 (Transport layer) of the OSI model and examine only packet headers to allow or deny network traffic. Content filtering firewalls apply to OSI layer 7 (Application layer) and can examine packet...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Data Destruction
Digital data resides on physical storage devices. Secure storage media disposal mechanisms, such as shredding, cryptographic erasure, degaussing, and disk wiping, must be put in place to ensure sensitive data cannot be retrieved by...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Testing Infrastructure Overview
With so many security vulnerabilities out there, a good IT security tech must know how to robustly test their network and physical security measures. This clip is from the chapter "Testing Infrastructure" of the series "CompTIA Security+...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Data Protection
Data is not all the same. Whether data is at rest, in use, or in transit will affect how you can best secure it. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Weak Configurations
A lack of secure configurations for networks, devices, and hosts results in an increased attack surface. Default settings, especially credentials, should not be used. Deprecated security protocols such as WEP and SSL should also be...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Network Authentication
Older network authentication protocols such as Password Authentication Protocol (PAP) and Challenge Handshake Authentication Protocol (CHAP) have been deprecated in favor of protocols such as Kerberos and Extensible Authentication...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Enabling Multifactor Authentication
Multifactor authentication (MFA) hardens user sign-in by requiring more than one factor, or category of authentication, such as something you know combined with something you have. This clip is from the chapter "Identity and Account...