Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Physical Security Lab
A full IT security audit always includes physical security. In this episode, physical security considerations are presented. This clip is from the chapter "Physical Security" of the series "CompTIA Security+ Certification SY0-601: The...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Load Balancing
Active/active and active/passive load balancing can efficiently route client application requests to backend servers. Load balancing improves application performance and resiliency to a single application server failure. This clip is...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Security Assessment Tools
Open-source and proprietary (paid) security assessment tools are used by security analysts and malicious actors; what differs is the reason they are being used. The scanless tool uses web sites to perform port scans while the hping3 tool...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Asymmetric Cryptosystems
In this episode, Mike describes encrypting and decrypting data with different keys and the magic that happens when key pairs are generated. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Cryptographic Methods
This episode introduces various methods used to protect the critical keys in cryptography that keep communication secure. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Touring Certificates
Mike tours various certificates in this episode. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This section introduces you to cryptography.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 12 Ask Me Anything (AMA)
One aspect of security testing is determining if internal employees have an awareness of common security problems. In this episode, Mike discusses phishing and whaling. This clip is from the chapter "Testing Infrastructure" of the series...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Securing Network Access
Securing networks restricts access to the network while securing services on the network. 802.1x network edge devices can limit network access. Rogue DHCP servers can be mitigated with DHCP snooping configurations. Secure remote server...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Network Protocol Analyzers
Network traffic can be captured, saved, and analyzed using a properly placed hardware or software network protocol analyzer such as the free Wireshark tool. Capture analysis can result in identifying indicators of compromise or the use...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Wiping Disks with the dd Command Lab
When storage media has reached the end of its useful life, data must be wiped from it in a secure manner which can include using some built-in operating system tools. Linux administrators can use the dd command to wipe disk partitions by...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 4 Ask Me Anything (AMA)
Malware is malicious software that comes in many different shapes and sizes. This episode tackles examples of malicious code and how it related to Visual Basic for Applications (VBA). This clip is from the chapter "Tools of the Trade" of...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - ARP Cache Poisoning
ARP is used to resolve an IP address to a 48-bit hexadecimal hardware MAC address. Attackers with network access can fraudulently send ARP updates to hosts in order to force network traffic through the attacker station. This clip is from...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Diffie-Hellman
Learn the Diffie-Hellman key exchange agreement and methods in this very complex algorithm. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This section introduces...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 12 Exam Question Review
Penetration testing provides insight as to how secure an organization's physical and IT infrastructure really is. In this episode, a pen testing scenario is provided. This clip is from the chapter "Testing Infrastructure" of the series...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Promo
This video introduces you to the course and what it covers. This clip is from the chapter "Risk Management" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This section introduces you to the course and its...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Smartphone Hardening Lab
Smartphones are small computers that almost everybody carries around with them. Many standard desktop computers hardening techniques can be applied to smartphones. This clip is from the chapter "Securing Dedicated Systems" of the series...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Honeypots
How can malicious attacker and malware activity be monitored without allowing the compromise of production systems? Honeypots are fake decoy systems designed to attract malicious activity for the purpose of logging and tracing activity....
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Vulnerability Assessments
This episode discusses how to use tools to identify security flaws on hosts or for a specific application. Topics include credential vs non-credential scans and keeping the vulnerability database up to date. This clip is from the chapter...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 10 Exam Question Review
IT systems are greatly affected by physical security. This episode presents a scenario in which only some security controls effectively mitigate a security problem. This clip is from the chapter "Physical Security" of the series "CompTIA...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Linux Software RAID Lab
RAID configurations can enhance the performance and availability of stored data, depending on the level of RAID used. In this demo, software RAID level 1 (disk mirroring) is configured in Linux. This clip is from the chapter "Securing...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - The Metasploit Framework
Penetration testers can use the cross-platform Metasploit framework command-line tool for discovering and exploiting security flaws on hosts. This clip is from the chapter "Testing Infrastructure" of the series "CompTIA Security+...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Understanding Digital Certificates
Digital certificates are used in many different places to verify the identity of a public key owner. They can also include verification from third parties for an added layer of security. This clip is from the chapter "Cryptography" of...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 13 Ask Me Anything (AMA)
There is much to be learned by analyzing past security incidents. In this episode, Dan discussed the Cyber Kill Chain. This clip is from the chapter "Dealing with Incidents" of the series "CompTIA Security+ Certification SY0-601: The...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Cross-Site Scripting Attacks
Web apps that do not properly validate or sanitize user-supplied input could be susceptible to Cross-Site Scripting (XSS) attacks. This clip is from the chapter "Securing Dedicated Systems" of the series "CompTIA Security+ Certification...