Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Securing Endpoints
In the enterprise, endpoint detection and response solutions report to a centralized SIEM solution when abnormal activity, including malware, is detected on hosts and devices. Intrusion detection and prevention systems (IDS/IPS) are the...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Common Attacks
Staying up-to-date with the latest types of security attacks is form of attack mitigation. Keeping systems hardened helps protect against zero-day attacks. Software developers must adhere to secure coding practices to ensure deployed...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Linux Shell Script Lab
Shell scripts contain Linux command that can be invoked simply by calling upon the script name. In this demo, a simple utility menu loop is created in a bash shell script. This clip is from the chapter "Tools of the Trade" of the series...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Password Cracking Demo
Dan demonstrates how to use a password cracking tool to turn hashed passwords into cleartext. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This section introduces...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 10 Ask Me Anything (AMA)
Some physical security controls protect physical property which includes hardware IT devices. In this episode, IP cameras and CCTV are discussed. This clip is from the chapter "Physical Security" of the series "CompTIA Security+...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Virtual Private Networks (VPNs)
VPNs provide an encrypted network tunnel over the Internet to provide secure access to a remote network. Client-to-site VPNs allow individual device access where site-to-site VPNs can securely link branch offices over the Internet or...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Proxy Servers
Forward proxies sit between internal user devices and the Internet and fetch Internet content on behalf of internal users. Reverse proxies map public network service IPs to private IPs; they route client requests for a network service to...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - SSH Public Key Authentication Lab
Multifactor authentication should always be used for administrative accounts. In this demo, SSH public key authentication is configured for a Linux host. This clip is from the chapter "Cryptography" of the series "CompTIA Security+...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Trust Models
Web of trust is a mostly outdated method of proving identities, however it is helpful to understand as the predecessor of Public Key Infrastructure (PKI) which is widely used today. This clip is from the chapter "Cryptography" of the...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 11 Exam Question Review
Connecting to any Internet resource commonly uses DNS to resolve host names to IP addresses. In this episode, the viewer is presented with a DNS scenario and must determine which type of attack has occurred. This clip is from the chapter...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Request Forgery Attacks
Hijacked authenticated user sessions can result in Cross-Site Request Forgery (CSRF) attacks. This episode explains how these attacks occur and how they can be mitigated. This clip is from the chapter "Securing Dedicated Systems" of the...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Other Layer 2 Attacks
Layer 2 of the OSI model (Data Link layer) accessing network media and addressing using MAC addresses. MAC address flooding attacks and broadcast storms can be mitigated with network switches configuring with BPDU and STP. This clip is...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Windows Command-Line Tools
Security technicians must be comfortable with Windows commands for standard maintenance and security tasks using commands such as ping, netstat, and icalcs. This clip is from the chapter "Tools of the Trade" of the series "CompTIA...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Linux Shells
A Linux shell is a case-sensitive command line environment that supports scripting and comes in various flavors including Bash, Korn, and C shells. This clip is from the chapter "Tools of the Trade" of the series "CompTIA Security+...
Curated Video
AWS Certified Cloud Practitioner (CLF-C01)- IP Addresses and Port Numbers – Part 2
In this video, we'll learn about IP Addresses and Port Numbers – Part 2. This clip is from the chapter "AWS Networking and Content Delivery" of the series "AWS Certified Cloud Practitioner (CLF-C01) [Updated for 2021]".This section is...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 9 Ask Me Anything (AMA)
Some IT solutions are dedicated to serving specific functions. In this episode, Mike discusses the security aspect of using Zigbee devices. This clip is from the chapter "Securing Dedicated Systems" of the series "CompTIA Security+...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Wi-Fi Hardening
There are many options for securing Wi-Fi networks. Disabling items such as WLAN name broadcast, DHCP, and public network management are the first consideration. Using WPA3 enterprise mode and changing default settings also help harden...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Public Key Infrastructure
In this episode, Mike discusses Public Key Infrastructure (PKI), used to enable commerce and other secure activities over the Internet. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601:...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 11 Ask Me Anything (AMA)
Securing web applications involves not only IT administrators but also software developers. In this episode, Mike provides a distinction between input validation and input sanitization. This clip is from the chapter "Securing Dedicated...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 8 Ask Me Anything (AMA)
Virtual machines, often referred to as instances, are widely used both on-premises and in the cloud. This episode tackles issues related to being aware of deployed instances in the interest of reducing the attack surface. This clip is...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Python Scripts
Python is a multi-platform case-sensitive scripting language that requires a Python interpreter to be installed. This clip is from the chapter "Tools of the Trade" of the series "CompTIA Security+ Certification SY0-601: The Total...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Network Scanning with Nmap
Nmap is the most commonly used network scanning tool. Scans can be saved as XML files. Nmap can be used at the command line, but it also has a frontend GUI named Zenmap. This clip is from the chapter "Tools of the Trade" of the series...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 2 Exam Question Review
Protecting sensitive data can be done using many techniques. In this episode, the viewer is tested on the best security control for a given scenario. This clip is from the chapter "Cryptography" of the series "CompTIA Security+...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Cryptographic Attacks
In this episode, Mike explains how encrypted information is at risk and explores ways to protect it. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This section...