Free CompTIA Security+ Training

Risk Management Types – SY0-601 CompTIA Security+ : 5.4

Every organization participates in some type of risk management. In this video, you’ll learn about risk assessment, multi-party risk, and risk management strategies. << Previous Video: Organizational Policies Next: Risk Analysis >> If you’re assessing risk in your organization, then you need to identify all of the assets that could be affected by some type

Risk Management Types – SY0-601 CompTIA Security+ : 5.4 Read More »

Organizational Policies – SY0-601 CompTIA Security+ : 5.3

Change is a challenging by-product of information technology. In this video, you’ll learn about the change control process and how asset management can assist with the security of user data and devices. << Previous Video: Credential Policies Next: Risk Management Types >> [MUSIC PLAYING] The one constant in it is that there’s always change. There

Organizational Policies – SY0-601 CompTIA Security+ : 5.3 Read More »

Credential Policies – SY0-601 CompTIA Security+ : 5.3

It’s important to match credentials to the task at hand. In this video, you’ll learn about differences between accounts used by personnel, third-parties, devices, services, and administrators. << Previous Video: Managing Data Next: Organizational Policies >> The credential management process we use with our usernames, passwords, and other credentials is a critical part of our

Credential Policies – SY0-601 CompTIA Security+ : 5.3 Read More »

Managing Data – SY0-601 CompTIA Security+ : 5.3

Managing an organization’s data is often one of the most challenging aspects of IT security. In this video, you’ll learn about data governance, data classifications, and data retention policies. << Previous Video: Third-party Risk Management Next: Credential Policies >> If your organization is collecting data, then there needs to be a set of processes and

Managing Data – SY0-601 CompTIA Security+ : 5.3 Read More »

Third-party Risk Management – SY0-601 CompTIA Security+ : 5.3

Security risks are everywhere, including with third-parties. In this video, you’ll learn about risks associated with vendors, the supply chain, business partners, and more. << Previous Video: Personnel Security Next: Managing Data >> If you are part of a company, then you’re certainly going to be working with some third party vendors. These could be

Third-party Risk Management – SY0-601 CompTIA Security+ : 5.3 Read More »

Personnel Security – SY0-601 CompTIA Security+ : 5.3

There are many security policies required to protect employee data. In this video, you’ll learn about acceptable use policies, least privilege, background checks, user training, and more. << Previous Video: Secure Configurations Next: Third-party Risk Management >> Most organizations will have a documented set of rules called an Acceptable Use Policy, or an AUP. This

Personnel Security – SY0-601 CompTIA Security+ : 5.3 Read More »

Security Configurations – SY0-601 CompTIA Security+ : 5.2

The default configuration of a system is rarely the most secure. In this video, you’ll learn about secure configurations for web servers, operating systems, application servers, and network infrastructure devices. << Previous Video: Security Frameworks Next: Personnel Security >> If you’ve installed a server, an operating system, or some other device, the default configuration is

Security Configurations – SY0-601 CompTIA Security+ : 5.2 Read More »

Security Regulations and Standards – SY0-601 CompTIA Security+ : 5.2

It’s important for security professionals to be aware of any compliance regulations. In this video, you’ll learn about GDPR and PCI DSS. << Previous Video: Security Controls Next: Security Frameworks >> Along with all the other tasks associated with an IT security professional, you will also be asked to follow certain compliance guidelines. These are

Security Regulations and Standards – SY0-601 CompTIA Security+ : 5.2 Read More »