Risk Avoidance – CompTIA Security+ SY0-401: 2.1
There are many ways to widen the gap between yourself and risk. In this video, you’ll learn some different strategies for avoiding risk in your organization.
There are many ways to widen the gap between yourself and risk. In this video, you’ll learn some different strategies for avoiding risk in your organization.
The bad guys are very good at infiltrating our computer systems. In this video, you’ll learn about system vulnerabilities, examples of threat vectors, and how to calculate the probability of a security risk.
Vulnerabilities, Threat Vectors, and Probability – CompTIA Security+ SY0-401: 2.1 Read More »
Risk factors can take many forms. In this video, you’ll learn how to asses both quantitative and qualitative risk factors in your environment.
Quantitative and Qualitative Risk Assessment – CompTIA Security+ SY0-401: 2.1 Read More »
The calculation of risk can help you make educated business decisions related to your security infrastructure. In this video, you’ll learn how to associate a dollar value to the risks in your organization.
Calculating Risk – CompTIA Security+ SY0-401: 2.1 Read More »
The backbone of any security strategy is the creation and management of security policies. In this video, you’ll learn why policies are important and which parts of the organization will be involved in the creation of security policies.
Reducing Risk with Security Policies – CompTIA Security+ SY0-401: 2.1 Read More »
As you build your security strategy, you’ll need to manage the inevitable false positives and false negatives. In this video, you’ll learn about false positives and false negatives and how to handle them in your environment.
False Positives and False Negatives – CompTIA Security+ SY0-401: 2.1 Read More »
If you’re planning to build a structured security policy, you’ll find the organization of security controls to be a valuable starting point. In this video, you’ll learn about the NIST standards for the organization of security control types.
The NetBIOS family of protocols has been used for years for many different purposes. In this video, you’ll learn about various forms of NetBIOS and how they are used in today’s technologies.
There’s more than one way to send a file across the network. In this video, you’ll learn which file transfer technologies can be used to send in-the-clear and encrypted information.
Transferring Files – CompTIA Security+ SY0-401: 1.4 Read More »
Terminal access to remote devices is an important part of network and security management. In this video, you’ll learn how to use Telnet and SSH to manage your network infrastructure.