Instructional Video6:11
Curated Video

Disaster Recovery Planning: Ensuring Business Continuity

Higher Ed
Business continuity ensures that business processes can continue despite interruptions. Continuity of Operations (COOP), Disaster Recovery Plans (DRPs), as well as hot, warm, and cold alternate sites are discussed. This clip is from...
Instructional Video8:57
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Log Files

Higher Ed
Log files can provide valuable insights related to suspicious network, host or application activity, but only if log file integrity can be ensured. Centralized logging in the enterprise on a secured logging host ensures an accurate copy...
Instructional Video5:11
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - DNS Security

Higher Ed
DNS is a crucial network service used by everybody to resolve names to IP addresses and as a result, it is a target for attackers. This episode also discusses other protocols such has Simple Network Management Protocol (SNMP) and Secure...
Instructional Video2:36
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Introduction

Higher Ed
Mike and Dan introduce the CompTIA Security+ (SY0-601) video course from Total Seminars. This clip is from the chapter "Risk Management" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This section introduces...
Instructional Video5:59
Curated Video

Bug Bounty Program Certification 3.1: Overview of Preparation Steps

Higher Ed
In this video, we will have a look at the preparation steps. • Explore various technologies • Learn about ports and services information • Explore vulnerability scanning and tools
Instructional Video2:38
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 9 Exam Question Review

Higher Ed
Critical infrastructure IT systems can sometimes be vulnerable to attacks. In this episode, a scenario is presented in which the best solution must be implemented to protect Programmable Logic Controllers (PLCs). This clip is from the...
Instructional Video3:24
Curated Video

Describe cyber attacks that could affect a computer system or network : Overview of Network Security

Higher Ed
From the section: Introducing Network Security. This section provides Information about Overview of Network security, Test scope of Networks. It also includes Installation Procedure of Virtual Machines. For example: Kali Linux...
Instructional Video6:51
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - RFID, NFC, and Bluetooth

Higher Ed
While there are many wireless network standards, which ones are designed for close proximity? This video covers RFID, NFC and Bluetooth wireless network communications. This clip is from the chapter "Securing Wireless LANs" of the series...
Instructional Video1:15
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 6 Ask Me Anything (AMA)

Higher Ed
Secure Sockets Layer (SSL) has long been used to secure network communication on LANs and WANs. This episode discusses how Transport Layer Security (TLS) supersedes SSL in addition to continued backwards-compatibility support that...
Instructional Video9:36
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Linux Command-Line Tools

Higher Ed
Security technicians must be comfortable with Linux commands for standard maintenance and security tasks using commands such as head, tail, grep, dig, and setting filesystem permissions with chmod. This clip is from the chapter "Tools of...
Instructional Video5:01
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Autopsy Forensic Browser Lab

Higher Ed
Digital forensics is the cross-pollination of computer science and law. In this demonstration, Dan shows how to use the Autopsy forensic tool to work with a disk image to retrieve a deleted file. This clip is from the chapter "Dealing...
Instructional Video16:29
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Touring the CLI

Higher Ed
The Command-Line Interface (CLI) allows technicians to interact with Windows, Linux, and MacOS systems by typing in commands such as ping and ipconfig. Windows uses a command prompt, MacOS uses a terminal shell, and Linux can use a...
Instructional Video8:46
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Cloud Deployment Models

Higher Ed
Virtualization alone does not constitute cloud computing; a number of characteristics such as resource pooling and metered usage must also be involved. This episode discusses public, private, hybrid, and community clouds. This clip is...
Instructional Video5:09
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Security Constraints for Dedicated Systems

Higher Ed
Some dedicated device security settings are limited, or patches are not available, and should be placed on isolated networks that do not contain sensitive systems or data. Mobile devices have limited CPU and battery power which limits...
Instructional Video6:50
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Network and Port Address Translation

Higher Ed
Network Address Translation (NAT) maps external public IPs to internal private IPs to protect the true identity of servers. Port Address Translation (PAT) allows multiple internal network clients with private IPs to access the Internet...
Instructional Video6:18
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Shells

Higher Ed
Shells allow technicians to enter commands, such as a Linux bash shell or a Windows command prompt. Reverse shells are the result of infected victim machines that reach out to an attacker station. This clip is from the chapter "Tools of...
Instructional Video12:42
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Symmetric Cryptosystems

Higher Ed
In this episode, Mike describes encrypting and decrypting data with the same key. He also covers how symmetric algorithms can either be block or streaming and use various types of ciphers depending on which one is used. This clip is from...
Instructional Video8:16
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Symmetric Block Modes

Higher Ed
Symmetric block algorithms have limitations depending on which kind of cipher is used. This episode explores the different block modes. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601:...
Instructional Video9:45
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Gathering Digital Evidence

Higher Ed
This episode covers chain of custody, evidence order of volatility, and digital forensics tools used to acquire evidence. This clip is from the chapter "Dealing with Incidents" of the series "CompTIA Security+ Certification SY0-601: The...
Instructional Video6:01
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Incident Response Plans (IRPs)

Higher Ed
An IRP provides guidance on how security incidents are dealt with effectively while they are occurring. The IRP includes roles, responsibilities, a contact list and escalation procedures. IRPs should be updated periodically through...
Instructional Video9:48
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Common Attacks and Mitigations

Higher Ed
Public servers are subjected to many types of attacks that can be mitigated by hardening the network and host using a wide variety of methods. This episode covers common attacks include DDoS, URL hijacking/redirection, session replay,...
Instructional Video10:13
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Password Cracking

Higher Ed
Passwords are often stored in hash format but can still be susceptible to attacks. The various password attacks include brute force, dictionary, and rainbow table. Salting and key stretching add another layer of security to hashed...
Instructional Video4:37
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - The Windows Command Line

Higher Ed
The Windows command line is spawned by cmd.exe. Security technicians can automate tasks using batch file scripts containing commands such as whoami and ipconfig. Powershell.exe can be spawned from a Windows command prompt in order to use...
Instructional Video15:57
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Cryptography Basics

Higher Ed
Cryptography is the practice of disguising information in a way that looks random. This episode explores the history of cryptography and how it has evolved into the complex systems today. This clip is from the chapter "Cryptography" of...