Instructional Video11:48
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Linux Shells

Higher Ed
A Linux shell is a case-sensitive command line environment that supports scripting and comes in various flavors including Bash, Korn, and C shells. This clip is from the chapter "Tools of the Trade" of the series "CompTIA Security+...
Instructional Video13:09
Curated Video

AWS Certified Cloud Practitioner (CLF-C01)- IP Addresses and Port Numbers – Part 2

Higher Ed
In this video, we'll learn about IP Addresses and Port Numbers – Part 2. This clip is from the chapter "AWS Networking and Content Delivery" of the series "AWS Certified Cloud Practitioner (CLF-C01) [Updated for 2021]".This section is...
Instructional Video2:17
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 9 Ask Me Anything (AMA)

Higher Ed
Some IT solutions are dedicated to serving specific functions. In this episode, Mike discusses the security aspect of using Zigbee devices. This clip is from the chapter "Securing Dedicated Systems" of the series "CompTIA Security+...
Instructional Video10:31
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Wi-Fi Hardening

Higher Ed
There are many options for securing Wi-Fi networks. Disabling items such as WLAN name broadcast, DHCP, and public network management are the first consideration. Using WPA3 enterprise mode and changing default settings also help harden...
Instructional Video3:39
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Public Key Infrastructure

Higher Ed
In this episode, Mike discusses Public Key Infrastructure (PKI), used to enable commerce and other secure activities over the Internet. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601:...
Instructional Video2:03
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 11 Ask Me Anything (AMA)

Higher Ed
Securing web applications involves not only IT administrators but also software developers. In this episode, Mike provides a distinction between input validation and input sanitization. This clip is from the chapter "Securing Dedicated...
Instructional Video2:02
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 8 Ask Me Anything (AMA)

Higher Ed
Virtual machines, often referred to as instances, are widely used both on-premises and in the cloud. This episode tackles issues related to being aware of deployed instances in the interest of reducing the attack surface. This clip is...
Instructional Video7:25
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Python Scripts

Higher Ed
Python is a multi-platform case-sensitive scripting language that requires a Python interpreter to be installed. This clip is from the chapter "Tools of the Trade" of the series "CompTIA Security+ Certification SY0-601: The Total...
Instructional Video8:59
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Network Scanning with Nmap

Higher Ed
Nmap is the most commonly used network scanning tool. Scans can be saved as XML files. Nmap can be used at the command line, but it also has a frontend GUI named Zenmap. This clip is from the chapter "Tools of the Trade" of the series...
Instructional Video2:31
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 2 Exam Question Review

Higher Ed
Protecting sensitive data can be done using many techniques. In this episode, the viewer is tested on the best security control for a given scenario. This clip is from the chapter "Cryptography" of the series "CompTIA Security+...
Instructional Video5:24
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Cryptographic Attacks

Higher Ed
In this episode, Mike explains how encrypted information is at risk and explores ways to protect it. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This section...
Instructional Video6:16
Packt

List computer networking media : Firewalls and Servers

Higher Ed
From the section: The Internet. Here, we explore our internet options. In this episode, Mike begins the discussion of Application-layer protocols. Starting with a review of the interaction between IP packets and servers, the episode...
Instructional Video7:24
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Linux Snort IDS Lab

Higher Ed
An Intrusion Detection System (IDS) is designed to detect suspicious network or host activity and then log or notify the incident. In this episode, the Snort IDS is configured and tested in Linux. This clip is from the chapter "The Basic...
Instructional Video9:00
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - IP Security (IPsec)

Higher Ed
The IPsec network security protocol suite can be used to secure any type of network traffic through integrity, authentication and encryption. Many VPNs use IPsec to establish an encrypted network tunnel. This clip is from the chapter...
Instructional Video6:14
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Bots and Botnets

Higher Ed
Distributed Denial of Service (DDoS) attacks use collections of infected bots, or zombies in a botnet, to flood victims hosts or networks. Bots periodically contact a malicious user-controlled command and control server. This clip is...
Instructional Video5:15
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Network Scanners

Higher Ed
How do attackers discover networks and hosts? Network scanners such as Nmap are used by attackers as well as legitimate security technicians to perform network reconnaissance. This clip is from the chapter "Tools of the Trade" of the...
Instructional Video11:58
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Secure Web and E-mail

Higher Ed
This episode covers how to harden web and e-mail servers using load balancers, proxy servers and NAT. POP, IMAP, SMTP, and S/MIME are also covered. This clip is from the chapter "Securing Dedicated Systems" of the series "CompTIA...
Instructional Video1:45
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 7 Exam Question Review

Higher Ed
Malicious users will often mimic legitimate services in an attempt to trick unsuspecting victims into connecting to the service. This episode presents a scenario where the viewer must determine what type of attack has taken place. This...
Instructional Video9:43
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Wi-Fi Encryption Standards

Higher Ed
Securing Wi-Fi networks is crucial since physical access is not required to gain network access. In this video Wi-Fi security standards such as WEP, WPA, and WPS are discussed. This clip is from the chapter "Securing Wireless LANs" of...
Instructional Video3:28
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 6 Exam Question Review

Higher Ed
Address Resolution Protocol (ARP) is used by the TCP/IP protocol suite. This episode discussed ARP poisoning attacks and potential mitigations. This clip is from the chapter "The Basic LAN" of the series "CompTIA Security+ Certification...
Instructional Video8:28
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Configuring Linux Log Forwarding

Higher Ed
Centralized Linux log hosts can be configured using the rsyslog daemon on Linux hosts. This clip is from the chapter "Tools of the Trade" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This section explains the...
Instructional Video4:45
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Keylogger Demo

Higher Ed
Limited access to network computers can prevent malicious actors from installing components such as hardware key loggers, which can capture all user keystrokes and make them available to an attacker over a Wi-Fi network. This clip is...
Instructional Video4:19
Curated Video

Import external packages or libraries : Installing 3rd Party Packages

Higher Ed
From the section: Advanced Python. This section helps to understand about OOP, classes, class interface etc. We will dive into learning Advance Python Python has one of the largest 3rd party ecosystems in the world. If you need something...
Instructional Video12:11
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Wi-Fi Discovery and Attacks

Higher Ed
Is your Wi-Fi network completely invisible if you disable SSID broadcasting? No! Periodic beacon frames are still sent wirelessly with the WLAN name field excluded. Freely available tools can be used to discover and crack WEP and WPA...