CompTIA Security+ SY0-301: 2.3 – Hashing
Taking hashes during the forensics process can provide valuable verification later. In this video, you’ll learn about digest ciphers and other methods for verifying data.
Taking hashes during the forensics process can provide valuable verification later. In this video, you’ll learn about digest ciphers and other methods for verifying data.
The time on a computer is relative to a single time stamp, and the time differs depending on the operating system and file system. In this video, you’ll learn some important points to consider when collecting time information from a computer.
When gathering forensics data, don’t forget to grab the video. In this module, you’ll learn some of the most important video sources to gather during the forensics process.
The information traversing the network can be a valuable source of forensic data. In this video, you’ll learn about some common data gathering techniques for network traffic data.
CompTIA Security+ SY0-301: 2.3 – Network Traffic Read More »
A common forensics method is to gather an image of an entire system. In this video, you’ll learn about system images, and some of the hardware and software tools available to make an image.
When you start gathering forensics data, where should you start? In this video, you’ll learn about the order of volatility and which data sticks around the longest.
CompTIA Security+ SY0-301: 2.3 – Order of Volatility Read More »
Data loss can be devastating without the proper policies in place. In this video, you’ll learn how to mitigate the issues related to data loss and theft of your computers and data.
CompTIA Security+ SY0-301: 2.2 – Data Loss and Theft Policies Read More »
Without proper auditing, we’d have no way to know how secure our environment might be. In this video, you’ll learn about security auditing and what kinds of audits are the most effective.
CompTIA Security+ SY0-301: 2.2 – Security Audits Read More »
Setting the correct rights and permissions can be an important part of mitigating risk. In this video, you’ll learn the importance of properly setting user rights and properly auditing those permissions.
CompTIA Security+ SY0-301: 2.2 – User Rights and Permissions Read More »
The question isn’t if an incident is going to occur; it’s when. In this video, you’ll learn about the incident management process and some techniques for minimizing the risk should an incident occur.
CompTIA Security+ SY0-301: 2.2 – Incident Management Read More »