Free CompTIA Security+ Training

Penetration Testing video title page

Penetration Testing – CompTIA Security+ SY0-701 – 4.3

Penetration tests can simulate an attack to exploit vulnerabilities. In this video, you’ll learn about rules of engagement, the exploitation process, responsible disclosure programs, and more. << Previous Video: Threat Intelligence Next Video: Analyzing Vulnerabilities >> Penetration testing or pen testing is a process where we simulate an attack on our own systems. This is […]

Penetration Testing – CompTIA Security+ SY0-701 – 4.3 Read More »

Threat Intelligence video title page

Threat Intelligence – CompTIA Security+ SY0-701 – 4.3

To identify threats, we first must know the threats exist. In this video, you’ll learn about threat intelligence gathering techniques such as OSINT, third-parties, information sharing, the dark web, and more. << Previous Video: Vulnerability Scanning Next Video: Penetration Testing >> As an IT security professional, you’ll be expected to always keep up to date

Threat Intelligence – CompTIA Security+ SY0-701 – 4.3 Read More »

Vulnerability Scanning video title page

Vulnerability Scanning – CompTIA Security+ SY0-701 – 4.3

Security researchers may use many techniques to identify vulnerabilities on a system or in software. In this video, you’ll learn about vulnerability scans, static code analyzers, and fuzzing. << Previous Video: Asset Management Next Video: Threat Intelligence >> Vulnerability scans are used to determine if a system may be susceptible to a type of attack.

Vulnerability Scanning – CompTIA Security+ SY0-701 – 4.3 Read More »

Asset Management video title page

Asset Management – CompTIA Security+ SY0-701 – 4.2

An important part of IT security is the management of hardware and software. In this video, you’ll learn best practices for the procurement process, asset tracking, media sanitization, physical destruction, and more. << Previous Video: Application Security Next Video: Vulnerability Scanning >> Every organization has a formal process for acquiring goods and services from third

Asset Management – CompTIA Security+ SY0-701 – 4.2 Read More »

Application Security video title page

Application Security – CompTIA Security+ SY0-701 – 4.1

Application developers will follow best practices for security in their code. In this video, you’ll learn about input validation, secure cookies, code signing, sandboxing, and more. << Previous Video: Wireless Security Settings Next Video: Asset Management >> As IT professionals, we’re often tasked with installing security patches for applications which have been found to have

Application Security – CompTIA Security+ SY0-701 – 4.1 Read More »

Wireless Security Settings video title page

Wireless Security Settings – CompTIA Security+ SY0-701 – 4.1

Wireless network security requires the configuration of many different options. In this video, you’ll learn about wireless encryption protocols, the AAA framework, and authentication options such as RADIUS, 802.1X, and EAP. << Previous Video: Securing Wireless and Mobile Next Video: Application Security >> An obvious security concern regarding wireless networks is that everything is being

Wireless Security Settings – CompTIA Security+ SY0-701 – 4.1 Read More »

Securing Wireless and Mobile video title page

Securing Wireless and Mobile – CompTIA Security+ SY0-701 – 4.1

Many different strategies work together to provide security for wireless and mobile systems. In this video, you’ll learn about site surveys, mobile device management, BYOD, COPE, and more. << Previous Video: Hardening Targets Next Video: Wireless Security Settings >> If you’re installing a new wireless network or you’re troubleshooting an existing wireless network, you may

Securing Wireless and Mobile – CompTIA Security+ SY0-701 – 4.1 Read More »

Hardening Targets video title page

Hardening Targets – CompTIA Security+ SY0-701 – 4.1

No system is secure with the default configurations. In this video, you’ll learn about hardening mobile devices, servers, embedded systems, IoT devices, and more. << Previous Video: Secure Baselines Next Video: Securing Wireless and Mobile >> When you first install an operating system, the default configuration is rarely secure. You may need to provide additional

Hardening Targets – CompTIA Security+ SY0-701 – 4.1 Read More »

Secure Baselines video title page

Secure Baselines – CompTIA Security+ SY0-701 – 4.1

The security of an application environment should be well defined. In this video, you’ll learn about establishing, deploying, and maintaining security baselines. << Previous Video: Power Resiliency Next Video: Hardening Targets >> When an application is deployed, we have to think about all of the security that is associated with using that app. That means

Secure Baselines – CompTIA Security+ SY0-701 – 4.1 Read More »