Instructional Video7:34
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Mobile Device Security

Higher Ed
Mobile device security starts with a lock screen but goes beyond multifactor authentication (MFA) and remote find, lock, and wipe. Corporate environments use mobile device management (MDM) services for even more control over mobile...
Instructional Video10:56
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Basic WAP Setup

Higher Ed
The standard wireless access point (WAP) doesn't just work out of the box. It's important to understand how to perform a basic setup for a WAP to make sure it operates properly in your network. This clip is from the chapter "Wireless...
Instructional Video1:41
Curated Video

CompTIA A+ Certification Core 1 (220-1101) - What Is the CompTIA A+?

Higher Ed
CompTIA creates IT certifications that cover topics such as how to build and fix computers or how to secure businesses from internal and external threats. Every major IT manufacturer is part of CompTIA. The CompTIA A+ certification is a...
Instructional Video5:36
Curated Video

CompTIA A+ Certification Core 1 (220-1101) - Mobile Security Troubleshooting

Higher Ed
A lot of symptoms point to potential attacks on a mobile device, such as connection loss, power drain, slow data speeds, high resource utilization, and unintended connections. Others point at attacks that have already happened, such as...
Instructional Video7:34
Curated Video

CompTIA A+ Certification Core 1 (220-1101) - Mobile Device Security

Higher Ed
Mobile device security starts with a lock screen but goes beyond multifactor authentication (MFA) and remote find, lock, and wipe. Corporate environments use mobile device management (MDM) services for even more control over mobile...
Instructional Video9:58
Curated Video

CompTIA A+ Certification Core 1 (220-1101) - Understanding Virtualization

Higher Ed
In the first virtualization episode, Mike explores the concepts behind virtual machines. He discusses virtualization vs. emulation, how modern VMs work, and the differences between Type 1 and Type 2 hypervisors (the different hosts for...
Instructional Video4:47
Curated Video

Social Media Automation using Python - Linking Gmail with SMTP

Higher Ed
This video demonstrates how to link a Gmail account with the SMTP client or server to send automated emails. This clip is from the chapter "Email Automation" of the series "Social Media Automation Using Python".This section focuses on...
Instructional Video9:26
Curated Video

CISSP Crash Course - Secure Coding Guidelines

Higher Ed
This video explains the weaknesses in software and API security. This clip is from the chapter "Software Development Security" of the series "CISSP Crash Course".null
Instructional Video3:25
Curated Video

CISSP Crash Course - Assess Software Security

Higher Ed
This video explains assessing software security and how to audit and log the changes. This clip is from the chapter "Software Development Security" of the series "CISSP Crash Course".null
Instructional Video12:24
Curated Video

CISSP Crash Course - Security Controls in the SDLC

Higher Ed
This video explains SDLC practices and security controls in the SDLC. This clip is from the chapter "Software Development Security" of the series "CISSP Crash Course".null
Instructional Video7:06
Curated Video

CISSP Crash Course - Security in the SDLC

Higher Ed
This video explains security in the SDLC, methodologies, and maturity models. This clip is from the chapter "Software Development Security" of the series "CISSP Crash Course".null
Instructional Video6:13
Curated Video

CISSP Crash Course - Physical Security and Safety

Higher Ed
This video explains KPIS of physical security and safety. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Instructional Video9:42
Curated Video

CISSP Crash Course - Recovery and Response Strategies

Higher Ed
This video explains recovery and response strategies with respect to disasters. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Instructional Video3:03
Curated Video

CISSP Crash Course - Patch and Vulnerability Management

Higher Ed
This video explains the patch and vulnerability management process. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Instructional Video10:49
Curated Video

CISSP Crash Course - Operate Detective and Preventative Controls

Higher Ed
This video explains firewalls and how to operate detective and preventative controls. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Instructional Video3:06
Curated Video

CISSP Crash Course - Resource Protection

Higher Ed
This video explains media management and protection. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Instructional Video5:03
Curated Video

CISSP Crash Course - Security Operations Concepts

Higher Ed
This video explains security operations concepts and separation of duties. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Instructional Video1:41
Curated Video

CISSP Crash Course - Configuration Management

Higher Ed
This video explains configuration management. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Instructional Video12:49
Curated Video

CISSP Crash Course - Conducting Logging and Monitoring Activities

Higher Ed
This video explains logging and monitoring activities as well as incident management steps. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security...
Instructional Video11:17
Curated Video

CISSP Crash Course - Security Controls Testing

Higher Ed
This video explains security controls testing and network discovery. This clip is from the chapter "Security Assessment and Testing" of the series "CISSP Crash Course".This section covers domain 6, which focuses on security assessment...
Instructional Video9:07
Curated Video

CISSP Crash Course - Authentication System

Higher Ed
This video explains the SSO on the Internet and networks, as well as OPENID and OAUTH. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on...
Instructional Video6:54
Curated Video

CISSP Crash Course - Federated Identities

Higher Ed
This video explains centralized versus decentralized identities. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on identity and access...
Instructional Video9:41
Curated Video

CISSP Crash Course - Managed Identification

Higher Ed
This video explains managed identification and authentication. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on identity and access management.
Instructional Video13:06
Curated Video

CISSP Crash Course - Secure Communication

Higher Ed
This video explains how to implement secure communication. This clip is from the chapter "Communication and Network Security" of the series "CISSP Crash Course".This section covers domain 4, which focuses on communication and network...