Curated Video
Disaster Recovery Planning: Ensuring Business Continuity
Business continuity ensures that business processes can continue despite interruptions. Continuity of Operations (COOP), Disaster Recovery Plans (DRPs), as well as hot, warm, and cold alternate sites are discussed.
This clip is from...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Log Files
Log files can provide valuable insights related to suspicious network, host or application activity, but only if log file integrity can be ensured. Centralized logging in the enterprise on a secured logging host ensures an accurate copy...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - DNS Security
DNS is a crucial network service used by everybody to resolve names to IP addresses and as a result, it is a target for attackers. This episode also discusses other protocols such has Simple Network Management Protocol (SNMP) and Secure...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Introduction
Mike and Dan introduce the CompTIA Security+ (SY0-601) video course from Total Seminars. This clip is from the chapter "Risk Management" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This section introduces...
Curated Video
Bug Bounty Program Certification 3.1: Overview of Preparation Steps
In this video, we will have a look at the preparation steps. • Explore various technologies • Learn about ports and services information • Explore vulnerability scanning and tools
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 9 Exam Question Review
Critical infrastructure IT systems can sometimes be vulnerable to attacks. In this episode, a scenario is presented in which the best solution must be implemented to protect Programmable Logic Controllers (PLCs). This clip is from the...
Curated Video
Describe cyber attacks that could affect a computer system or network : Overview of Network Security
From the section: Introducing Network Security. This section provides Information about Overview of Network security, Test scope of Networks. It also includes Installation Procedure of Virtual Machines. For example: Kali Linux...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - RFID, NFC, and Bluetooth
While there are many wireless network standards, which ones are designed for close proximity? This video covers RFID, NFC and Bluetooth wireless network communications. This clip is from the chapter "Securing Wireless LANs" of the series...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 6 Ask Me Anything (AMA)
Secure Sockets Layer (SSL) has long been used to secure network communication on LANs and WANs. This episode discusses how Transport Layer Security (TLS) supersedes SSL in addition to continued backwards-compatibility support that...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Linux Command-Line Tools
Security technicians must be comfortable with Linux commands for standard maintenance and security tasks using commands such as head, tail, grep, dig, and setting filesystem permissions with chmod. This clip is from the chapter "Tools of...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Autopsy Forensic Browser Lab
Digital forensics is the cross-pollination of computer science and law. In this demonstration, Dan shows how to use the Autopsy forensic tool to work with a disk image to retrieve a deleted file. This clip is from the chapter "Dealing...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Touring the CLI
The Command-Line Interface (CLI) allows technicians to interact with Windows, Linux, and MacOS systems by typing in commands such as ping and ipconfig. Windows uses a command prompt, MacOS uses a terminal shell, and Linux can use a...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Cloud Deployment Models
Virtualization alone does not constitute cloud computing; a number of characteristics such as resource pooling and metered usage must also be involved. This episode discusses public, private, hybrid, and community clouds. This clip is...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Security Constraints for Dedicated Systems
Some dedicated device security settings are limited, or patches are not available, and should be placed on isolated networks that do not contain sensitive systems or data. Mobile devices have limited CPU and battery power which limits...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Network and Port Address Translation
Network Address Translation (NAT) maps external public IPs to internal private IPs to protect the true identity of servers. Port Address Translation (PAT) allows multiple internal network clients with private IPs to access the Internet...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Shells
Shells allow technicians to enter commands, such as a Linux bash shell or a Windows command prompt. Reverse shells are the result of infected victim machines that reach out to an attacker station. This clip is from the chapter "Tools of...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Symmetric Cryptosystems
In this episode, Mike describes encrypting and decrypting data with the same key. He also covers how symmetric algorithms can either be block or streaming and use various types of ciphers depending on which one is used. This clip is from...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Symmetric Block Modes
Symmetric block algorithms have limitations depending on which kind of cipher is used. This episode explores the different block modes. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601:...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Gathering Digital Evidence
This episode covers chain of custody, evidence order of volatility, and digital forensics tools used to acquire evidence. This clip is from the chapter "Dealing with Incidents" of the series "CompTIA Security+ Certification SY0-601: The...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Incident Response Plans (IRPs)
An IRP provides guidance on how security incidents are dealt with effectively while they are occurring. The IRP includes roles, responsibilities, a contact list and escalation procedures. IRPs should be updated periodically through...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Common Attacks and Mitigations
Public servers are subjected to many types of attacks that can be mitigated by hardening the network and host using a wide variety of methods. This episode covers common attacks include DDoS, URL hijacking/redirection, session replay,...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Password Cracking
Passwords are often stored in hash format but can still be susceptible to attacks. The various password attacks include brute force, dictionary, and rainbow table. Salting and key stretching add another layer of security to hashed...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - The Windows Command Line
The Windows command line is spawned by cmd.exe. Security technicians can automate tasks using batch file scripts containing commands such as whoami and ipconfig. Powershell.exe can be spawned from a Windows command prompt in order to use...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Cryptography Basics
Cryptography is the practice of disguising information in a way that looks random. This episode explores the history of cryptography and how it has evolved into the complex systems today. This clip is from the chapter "Cryptography" of...