Free CompTIA Security+ Training

On-Premises vs. Cloud Forensics – SY0-601 CompTIA Security+ : 4.5

Performing forensics in the cloud provides additional challenges to the security professional. In this video, you’ll learn about right-to-audit clauses, regulatory issues, and data breach notification laws. << Previous Video: Forensics Data Acquisition Next: Managing Evidence >> Up to this point, we have been describing our digital forensics process with devices that would be in […]

On-Premises vs. Cloud Forensics – SY0-601 CompTIA Security+ : 4.5 Read More »

Forensics Data Acquisition – SY0-601 CompTIA Security+ : 4.5

Capturing digital data is a series of technical challenges. In this video, you’ll learn about capturing data from disk, RAM, swap files, operating systems, firmware, and other sources. << Previous Video: Digital Forensics Next: On-Premises vs. Cloud Forensics >> One challenge you have when collecting data from a system is that some of the data

Forensics Data Acquisition – SY0-601 CompTIA Security+ : 4.5 Read More »

Digital Forensics – SY0-601 CompTIA Security+ : 4.5

The gathering digital forensics is often a critically important process. In this video, you’ll learn about legal holds, video capture, admissibility, chain of custody, time offsets, and more. << Previous Video: Security Configurations Next: Forensics Data Acquisition >> Digital forensics describes the process of collecting and protecting information that is usually related to some type

Digital Forensics – SY0-601 CompTIA Security+ : 4.5 Read More »

Security Configurations – SY0-601 CompTIA Security+ : 4.4

A secure configuration can be designed to include many different features. In this video, you’ll learn about isolation, containment, segmentation, and SOAR. << Previous Video: Endpoint Security Configuration Next: Digital Forensics >> Our latest generation of firewalls allows us to allow or deny certain applications from traversing the network. This means the firewall might allow

Security Configurations – SY0-601 CompTIA Security+ : 4.4 Read More »

Endpoint Security Configuration – SY0-601 CompTIA Security+ : 4.4

Security administrators use a few different philosophies when configuring security policies on endpoints. In this video, you’ll learn about approval lists, block lists, quarantine areas, and the criteria used for application approval lists. << Previous Video: Log Management Next: Security Configurations >> When we refer to the endpoint, we’re talking about the devices that we

Endpoint Security Configuration – SY0-601 CompTIA Security+ : 4.4 Read More »

Log Management – SY0-601 CompTIA Security+ : 4.3

Security monitoring processes create extensive logs and data. In this video, you’ll learn about transferring, storing, and reporting on logs created from journalctl, metadata, NetFlow, IPFIX, sFlow, protocol analyzers, and more. << Previous Video: Log Files Next: Endpoint Security Configuration >> One of the standard methods for transferring log files from one device to a

Log Management – SY0-601 CompTIA Security+ : 4.3 Read More »

SIEM Dashboards – SY0-601 CompTIA Security+ : 4.3

A SIEM can provide extensive visibility and reporting options. In this video, you’ll learn about using a SIEM (Security Information and Event Management) console and searching for important security details. << Previous Video: Vulnerability Scan Output Next: Log Files >> S-I-E-M, or SIEM, stands for Security Information and Event Management. This is usually a device

SIEM Dashboards – SY0-601 CompTIA Security+ : 4.3 Read More »

Vulnerability Scan Output – SY0-601 CompTIA Security+ : 4.3

The output of a vulnerability scan can identify significant security vulnerabilities. In this video, you’ll learn about vulnerability scans, reading through the results, and managing false positives and false negatives. << Previous Video: Attack Frameworks Next: SIEM Dashboards >> Vulnerability scanners are an important part of maintaining the safety and security of the devices on

Vulnerability Scan Output – SY0-601 CompTIA Security+ : 4.3 Read More »