Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Mobile Device Security
Mobile device security starts with a lock screen but goes beyond multifactor authentication (MFA) and remote find, lock, and wipe. Corporate environments use mobile device management (MDM) services for even more control over mobile...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Basic WAP Setup
The standard wireless access point (WAP) doesn't just work out of the box. It's important to understand how to perform a basic setup for a WAP to make sure it operates properly in your network. This clip is from the chapter "Wireless...
Curated Video
CompTIA A+ Certification Core 1 (220-1101) - What Is the CompTIA A+?
CompTIA creates IT certifications that cover topics such as how to build and fix computers or how to secure businesses from internal and external threats. Every major IT manufacturer is part of CompTIA. The CompTIA A+ certification is a...
Curated Video
CompTIA A+ Certification Core 1 (220-1101) - Mobile Security Troubleshooting
A lot of symptoms point to potential attacks on a mobile device, such as connection loss, power drain, slow data speeds, high resource utilization, and unintended connections. Others point at attacks that have already happened, such as...
Curated Video
CompTIA A+ Certification Core 1 (220-1101) - Mobile Device Security
Mobile device security starts with a lock screen but goes beyond multifactor authentication (MFA) and remote find, lock, and wipe. Corporate environments use mobile device management (MDM) services for even more control over mobile...
Curated Video
CompTIA A+ Certification Core 1 (220-1101) - Understanding Virtualization
In the first virtualization episode, Mike explores the concepts behind virtual machines. He discusses virtualization vs. emulation, how modern VMs work, and the differences between Type 1 and Type 2 hypervisors (the different hosts for...
Curated Video
Social Media Automation using Python - Linking Gmail with SMTP
This video demonstrates how to link a Gmail account with the SMTP client or server to send automated emails. This clip is from the chapter "Email Automation" of the series "Social Media Automation Using Python".This section focuses on...
Curated Video
CISSP Crash Course - Secure Coding Guidelines
This video explains the weaknesses in software and API security. This clip is from the chapter "Software Development Security" of the series "CISSP Crash Course".null
Curated Video
CISSP Crash Course - Assess Software Security
This video explains assessing software security and how to audit and log the changes. This clip is from the chapter "Software Development Security" of the series "CISSP Crash Course".null
Curated Video
CISSP Crash Course - Security Controls in the SDLC
This video explains SDLC practices and security controls in the SDLC. This clip is from the chapter "Software Development Security" of the series "CISSP Crash Course".null
Curated Video
CISSP Crash Course - Security in the SDLC
This video explains security in the SDLC, methodologies, and maturity models. This clip is from the chapter "Software Development Security" of the series "CISSP Crash Course".null
Curated Video
CISSP Crash Course - Physical Security and Safety
This video explains KPIS of physical security and safety. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Curated Video
CISSP Crash Course - Recovery and Response Strategies
This video explains recovery and response strategies with respect to disasters. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Curated Video
CISSP Crash Course - Patch and Vulnerability Management
This video explains the patch and vulnerability management process. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Curated Video
CISSP Crash Course - Operate Detective and Preventative Controls
This video explains firewalls and how to operate detective and preventative controls. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Curated Video
CISSP Crash Course - Resource Protection
This video explains media management and protection. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Curated Video
CISSP Crash Course - Security Operations Concepts
This video explains security operations concepts and separation of duties. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Curated Video
CISSP Crash Course - Configuration Management
This video explains configuration management. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Curated Video
CISSP Crash Course - Conducting Logging and Monitoring Activities
This video explains logging and monitoring activities as well as incident management steps. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security...
Curated Video
CISSP Crash Course - Security Controls Testing
This video explains security controls testing and network discovery. This clip is from the chapter "Security Assessment and Testing" of the series "CISSP Crash Course".This section covers domain 6, which focuses on security assessment...
Curated Video
CISSP Crash Course - Authentication System
This video explains the SSO on the Internet and networks, as well as OPENID and OAUTH. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on...
Curated Video
CISSP Crash Course - Federated Identities
This video explains centralized versus decentralized identities. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on identity and access...
Curated Video
CISSP Crash Course - Managed Identification
This video explains managed identification and authentication. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on identity and access management.
Curated Video
CISSP Crash Course - Secure Communication
This video explains how to implement secure communication. This clip is from the chapter "Communication and Network Security" of the series "CISSP Crash Course".This section covers domain 4, which focuses on communication and network...