Free CompTIA Security+ Training

Hardening Techniques video title page

Hardening Techniques – CompTIA Security+ SY0-701 – 2.5

There are many different techniques for making a system more difficult to exploit. In this video, you’ll learn about encryption, open ports, default passwords, and more. << Previous Video: Mitigation Techniques Next Video: Cloud Infrastructures >> If you take a look around your network, your servers, and other devices, you may find opportunities to make […]

Hardening Techniques – CompTIA Security+ SY0-701 – 2.5 Read More »

Mitigation Techniques video title page

Mitigation Techniques – CompTIA Security+ SY0-701 – 2.5

There are many ways to prevent or reduce the impact of a cybersecurity attack. In this video, you’ll learn about patching, encryption, monitoring, least privilege, and more. << Previous Video: Segmentation and Access Control Next Video: Hardening Techniques >> Mitigation is the process of reducing the impact of a security event or a potential security

Mitigation Techniques – CompTIA Security+ SY0-701 – 2.5 Read More »

Segmentation and Access Control video title page

Segmentation and Access Control – CompTIA Security+ SY0-701 – 2.5

Segmenting the network can provide significant security advantages. In this video, you’ll learn about access control lists, application allow lists, and more. << Previous Video: Indicators of Compromise Next Video: Mitigation Techniques >> In order to limit the scope of any type of security event, it may be useful to segment your network into smaller

Segmentation and Access Control – CompTIA Security+ SY0-701 – 2.5 Read More »

Indicators of Compromise video title page

Indicators of Compromise – CompTIA Security+ SY0-701 – 2.4

It’s important to identify an intrusion as soon as possible. In this video, you’ll learn about indicators such as account lockouts, impossible travel, resource consumption, and more. << Previous Video: Password Attacks Next Video: Segmentation and Access Control >> As an IT security professional, you’ll often be looking for any evidence that someone may have

Indicators of Compromise – CompTIA Security+ SY0-701 – 2.4 Read More »

Password Attacks video title page

Password Attacks – CompTIA Security+ SY0-701 – 2.4

Our passwords are often the first and last security measure we use. In this video, you’ll learn how attackers obtain our credentials using password spraying and brute force. << Previous Video: Cryptographic Attacks Next Video: Indicators of Compromise >> In your IT career, there is a possibility that you could run across an application that

Password Attacks – CompTIA Security+ SY0-701 – 2.4 Read More »

Cryptographic Attacks video title page

Cryptographic Attacks – CompTIA Security+ SY0-701 – 2.4

Poorly implemented cryptography can often be the source of an attack. In this video, you’ll learn about downgrade attacks, SSL stripping, and hash collisions. << Previous Video: Application Attacks Next Video: Password Attacks >> Cryptography is a technology we use many times a day. But we often don’t even think about what’s happening behind the

Cryptographic Attacks – CompTIA Security+ SY0-701 – 2.4 Read More »

Application Attacks video title page

Application Attacks – CompTIA Security+ SY0-701 – 2.4

Our applications can be the weakest links in our security armor. In this video, you’ll learn about privilege escalation, directory traversal, and more. << Previous Video: Malicious Code Next Video: Cryptographic Attacks >> An injection attack is a very common way to attack an application because an attacker can easily add additional malicious code to

Application Attacks – CompTIA Security+ SY0-701 – 2.4 Read More »