Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Linux Shells
A Linux shell is a case-sensitive command line environment that supports scripting and comes in various flavors including Bash, Korn, and C shells. This clip is from the chapter "Tools of the Trade" of the series "CompTIA Security+...
Curated Video
AWS Certified Cloud Practitioner (CLF-C01)- IP Addresses and Port Numbers – Part 2
In this video, we'll learn about IP Addresses and Port Numbers – Part 2. This clip is from the chapter "AWS Networking and Content Delivery" of the series "AWS Certified Cloud Practitioner (CLF-C01) [Updated for 2021]".This section is...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 9 Ask Me Anything (AMA)
Some IT solutions are dedicated to serving specific functions. In this episode, Mike discusses the security aspect of using Zigbee devices. This clip is from the chapter "Securing Dedicated Systems" of the series "CompTIA Security+...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Wi-Fi Hardening
There are many options for securing Wi-Fi networks. Disabling items such as WLAN name broadcast, DHCP, and public network management are the first consideration. Using WPA3 enterprise mode and changing default settings also help harden...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Public Key Infrastructure
In this episode, Mike discusses Public Key Infrastructure (PKI), used to enable commerce and other secure activities over the Internet. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601:...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 11 Ask Me Anything (AMA)
Securing web applications involves not only IT administrators but also software developers. In this episode, Mike provides a distinction between input validation and input sanitization. This clip is from the chapter "Securing Dedicated...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 8 Ask Me Anything (AMA)
Virtual machines, often referred to as instances, are widely used both on-premises and in the cloud. This episode tackles issues related to being aware of deployed instances in the interest of reducing the attack surface. This clip is...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Python Scripts
Python is a multi-platform case-sensitive scripting language that requires a Python interpreter to be installed. This clip is from the chapter "Tools of the Trade" of the series "CompTIA Security+ Certification SY0-601: The Total...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Network Scanning with Nmap
Nmap is the most commonly used network scanning tool. Scans can be saved as XML files. Nmap can be used at the command line, but it also has a frontend GUI named Zenmap. This clip is from the chapter "Tools of the Trade" of the series...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 2 Exam Question Review
Protecting sensitive data can be done using many techniques. In this episode, the viewer is tested on the best security control for a given scenario. This clip is from the chapter "Cryptography" of the series "CompTIA Security+...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Cryptographic Attacks
In this episode, Mike explains how encrypted information is at risk and explores ways to protect it. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This section...
Packt
List computer networking media : Firewalls and Servers
From the section: The Internet. Here, we explore our internet options. In this episode, Mike begins the discussion of Application-layer protocols. Starting with a review of the interaction between IP packets and servers, the episode...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Linux Snort IDS Lab
An Intrusion Detection System (IDS) is designed to detect suspicious network or host activity and then log or notify the incident. In this episode, the Snort IDS is configured and tested in Linux. This clip is from the chapter "The Basic...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - IP Security (IPsec)
The IPsec network security protocol suite can be used to secure any type of network traffic through integrity, authentication and encryption. Many VPNs use IPsec to establish an encrypted network tunnel. This clip is from the chapter...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Bots and Botnets
Distributed Denial of Service (DDoS) attacks use collections of infected bots, or zombies in a botnet, to flood victims hosts or networks. Bots periodically contact a malicious user-controlled command and control server. This clip is...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Network Scanners
How do attackers discover networks and hosts? Network scanners such as Nmap are used by attackers as well as legitimate security technicians to perform network reconnaissance. This clip is from the chapter "Tools of the Trade" of the...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Secure Web and E-mail
This episode covers how to harden web and e-mail servers using load balancers, proxy servers and NAT. POP, IMAP, SMTP, and S/MIME are also covered. This clip is from the chapter "Securing Dedicated Systems" of the series "CompTIA...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 7 Exam Question Review
Malicious users will often mimic legitimate services in an attempt to trick unsuspecting victims into connecting to the service. This episode presents a scenario where the viewer must determine what type of attack has taken place. This...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Wi-Fi Encryption Standards
Securing Wi-Fi networks is crucial since physical access is not required to gain network access. In this video Wi-Fi security standards such as WEP, WPA, and WPS are discussed. This clip is from the chapter "Securing Wireless LANs" of...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 6 Exam Question Review
Address Resolution Protocol (ARP) is used by the TCP/IP protocol suite. This episode discussed ARP poisoning attacks and potential mitigations. This clip is from the chapter "The Basic LAN" of the series "CompTIA Security+ Certification...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Configuring Linux Log Forwarding
Centralized Linux log hosts can be configured using the rsyslog daemon on Linux hosts. This clip is from the chapter "Tools of the Trade" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This section explains the...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Keylogger Demo
Limited access to network computers can prevent malicious actors from installing components such as hardware key loggers, which can capture all user keystrokes and make them available to an attacker over a Wi-Fi network. This clip is...
Curated Video
Import external packages or libraries : Installing 3rd Party Packages
From the section: Advanced Python. This section helps to understand about OOP, classes, class interface etc. We will dive into learning Advance Python Python has one of the largest 3rd party ecosystems in the world. If you need something...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Wi-Fi Discovery and Attacks
Is your Wi-Fi network completely invisible if you disable SSID broadcasting? No! Periodic beacon frames are still sent wirelessly with the WLAN name field excluded. Freely available tools can be used to discover and crack WEP and WPA...