Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Industrial Control System (ICS)
ICSs use computing devices to automate tasks in a fast dependable way using Programmable Logic Controllers (PLCs). This episode also covers Supervisory Control and Data Acquisition (SCADA). This clip is from the chapter "Securing...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Business Impact Analysis
In addition to deploying effective security controls to protect assets, what can be done to ensure business continuity in the event of a security incident. A business impact analysis involves proactive planning to help reduce downtime...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Security Controls
Various security standards such as PCI DSS and the Cloud Controls Matrix (CCM) define what types of security controls to put in place to mitigate risk both on-premises and in the cloud. The specific type of attack vector determines...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Access Control Schemes
Controlling access to resources begins with policies governing how credentials are managed. Permissions to use resources can be configured through Attribute-Based Access Control (ABAC), Role-Based Access Control (RBAC), Discretionary...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Risk Assessments and Treatments
How can you determine whether assets are adequately protected from threats? One way is running periodic risk assessments to address the ever-changing threat landscape to define the likelihood and impact of security incidents. This clip...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Threats and Vulnerabilities
The CIA security triad (confidentiality, integrity and availability) describes how solutions such as encryption, hashing, and data backups can address potential attack vectors that might be exploited by threat actors. This clip is from...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Authentication Methods
Have you ever had trouble remembering usernames and passwords for multiple web apps? Password vaults serve as a protected credential repository in addition to common authentication methods such as one-time password codes,...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Authorization
What role does authorization play in Identity and Access Management (IAM)? Authorization relates to resource permissions granted to a security principal such as a user or device. This clip is from the chapter "Identity and Account...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Quantitative Risk Assessments
Is the cost of a security control justified? A quantitative risk assessment uses various calculations against an asset to determine the maximum yearly spend for protecting that asset. This clip is from the chapter "Risk Management" of...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Defining Risk
Managing risk involves identifying threat actors from script kiddies to state-sponsored attackers. Mitigating threats is achieved by identifying assets and putting security controls in place to mitigate risks. This clip is from the...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 1 Ask Me Anything (AMA)
The use of social media platforms has skyrocketed in recent years. Organizations must take the appropriate steps to ensure that sensitive data is not leaked through this mechanism. This clip is from the chapter "Risk Management" of the...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Qualitative Risk Assessments
The same risk can have a different impact to various organizations. Qualitative risk assessment use subjective priority ratings for risks rather than dollar values. This clip is from the chapter "Risk Management" of the series "CompTIA...
Physics Girl
Quantum Cryptography Explained
With recent high-profile security decryption cases, encryption is more important than ever. Much of your browser usage and your smartphone data is encrypted. But what does that process actually entail? And when computers get smarter and...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Identity Management Systems
How can authentication be removed from individual apps? The answer is identity federation, which uses a centralized identity provider that is trusted by resources, such as Web apps, and can also support single sign-on (SSO). This clip is...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Intrusion Detection and Prevention Systems (IDS/IPS)
Intrusion detection can detect, log, report, and send alerts when suspicious activity is detected on a host or on the network, whereas intrusion prevention can be configured to stop the suspicious activity. Anomaly detection can be...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Penetration Testing
This episode focuses on how penetration testing discovers and exploits security vulnerabilities. Concepts covered include known, partially known, and unknown testing types as well as the role that red, white, blue, and purple teams play....
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Agreement Types
When organizations enter into business partnerships with third-party service providers, the agreements and contracts they both sign protect both organizations legally, as well as establish the terms of service. This episode covers the...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Mobile Device Deployment and Hardening
Organizations normally allow the use of personal or work-issued mobile devices for work purposes through provisioning schemes such as Bring Your Own Device (BYOD) and Choose Your Own Device (CYOD). This episode also discusses Subscriber...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Connecting to Dedicated and Mobile Systems
There are many modern wireless communication standards. This episode discussed the Global Positioning System (GPS), 4G and 5G cellular, Wi-Fi Direct, and mobile device tethering. This clip is from the chapter "Securing Dedicated Systems"...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Securing the Cloud
Cloud security is generally split between the Cloud Service Provider (CSP) and the cloud tenant, depending on which type of cloud service is being used. Security solutions include firewalls, data loss prevention tools as well as a Cloud...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Malware
Malicious software is referred to as malware and includes various types including ransomware, fileless viruses, worms, keyloggers, and trojan horses. Infected computers that periodically contact command and control servers are called...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Digital Forensics
The application of computer science to legal situations include evidence gathering is referred to as digital forensics. This episode covers e-discovery and steganography. This clip is from the chapter "Dealing with Incidents" of the...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Wi-Fi Coverage and Performance
Optimizing Wi-Fi communication means ensuring there is proper coverage over a given area and that there are no wireless interference issues from other transmitting devices. A wireless site survey with a heat map can identify overlapping...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Embedded Systems
Embedded systems use an operating system burned into one or more chips and have a defined function, such as running an elevator or proving Wi-Fi services. In this episode, Industrial Control Systems, Internet of Things (IoT), Raspberry...