Professor Messer

Public Key Infrastructure video title page

Public Key Infrastructure – CompTIA Security+ SY0-701 – 1.4

Public key infrastructure technologies are the foundation of our modern encryption. In this video, you’ll learn about symmetric encryption, asymmetric encryption, key pair generation, and more. << Previous Video: Technical Change Management Next Video: Encrypting Data >> The term public key infrastructure is a very broad term in cryptography, but it commonly refers to policies

Public Key Infrastructure – CompTIA Security+ SY0-701 – 1.4 Read More »

Technical Change Management video title page

Technical Change Management – CompTIA Security+ SY0-701 – 1.3

A technician is ultimately responsible for putting the change management process into action. In this video, you’ll learn about the technical change management process. << Previous Video: Change Management Next Video: Public Key Infrastructure >> In our previous video, we talked about the change management process. But of course, eventually, the actual change will need

Technical Change Management – CompTIA Security+ SY0-701 – 1.3 Read More »

Change Management video title page

Change Management – CompTIA Security+ SY0-701 – 1.3

As IT professionals, we are constantly updating, modifying, and changing the devices we manage. In this video, you’ll learn how we manage this process with change management. << Previous Video: Deception and Disruption Next Video: Technical Change Management >> When you’re making a change to an application or an operating system that you use at

Change Management – CompTIA Security+ SY0-701 – 1.3 Read More »

Deception and Disruption video title page

Deception and Disruption – CompTIA Security+ SY0-701 – 1.2

There are many ways to fool an attacker into disclosing important information about their methods and techniques. In this video, you’ll learn how to use deception and disruption to protect your network. << Previous Video: Physical Security Next Video: Change Management >> As an IT security professional, you’ll spend a lot of time trying to

Deception and Disruption – CompTIA Security+ SY0-701 – 1.2 Read More »

Physical Security video title page

Physical Security – CompTIA Security+ SY0-701 – 1.2

Security tools in the physical world can be effectively used to protect our computing systems. In this video, you’ll learn about physical security devices and techniques. << Previous Video: Zero Trust Next Video: Deception and Disruption >> IT security professionals not only need to be proficient in digital security. They also need to have a

Physical Security – CompTIA Security+ SY0-701 – 1.2 Read More »

Authentication, Authorization, and Accounting video title page

Authentication, Authorization, and Accounting – CompTIA Security+ SY0-701 – 1.2

The AAA process is an important part of network security. In this video, you’ll learn more about authentication, authorization, and accounting. << Previous Video: Non-repudiation Next Video: Gap Analysis >> We’re all very familiar with the login process. You put in your username, your password. There might be some additional authentication factors. And if all

Authentication, Authorization, and Accounting – CompTIA Security+ SY0-701 – 1.2 Read More »