Free CompTIA Security+ Training

Mobile Device Management – SY0-601 CompTIA Security+ : 3.5

Protecting an organization’s data on a mobile device is an ongoing challenge. In this video, you’ll learn about mobile device management, content management, geofencing, and more. << Previous Video: Mobile Networks Next: Mobile Device Security >> In many organizations, employees have mobile devices that they use to do their jobs. Those mobile devices can be […]

Mobile Device Management – SY0-601 CompTIA Security+ : 3.5 Read More »

Mobile Networks – SY0-601 CompTIA Security+ : 3.5

A single smartphone can contain many different mobile network technologies. In this video, you’ll learn about Wi-Fi, Bluetooth, RFID, NFC, and much more. << Previous Video: Installing Wireless Networks Next: Mobile Device Management >> Some wireless networks provide a one-to-one connection between the two devices communicating on that network. You might use a point-to-point connection

Mobile Networks – SY0-601 CompTIA Security+ : 3.5 Read More »

Installing Wireless Networks – SY0-601 CompTIA Security+ : 3.4

Installing a wireless network can be an involved process. In this video, you’ll learn about site surveys, channel selection, access point placement, and more. << Previous Video: Wireless Authentication Protocols Next: Mobile Networks >> Before installing a wireless network, it’s useful to know the environment that you’re installing this equipment in. So it’s common to

Installing Wireless Networks – SY0-601 CompTIA Security+ : 3.4 Read More »

Wireless Authentication Protocols – SY0-601 CompTIA Security+ : 3.4

There are many options available when configuring wireless authentication. In this video, you’ll learn about EAP, EAP-FAST, PEAP, EAP-TLS, and more. << Previous Video: Wireless Authentication Methods Next: Installing Wireless Networks >> In a previous video, we talked about the need for authenticating to a wireless network. And of course, there are many different ways

Wireless Authentication Protocols – SY0-601 CompTIA Security+ : 3.4 Read More »

Wireless Authentication Methods – SY0-601 CompTIA Security+ : 3.4

There are a number of different methods to authenticate users with a wireless network. In this video, you’ll learn about PSK, 802.1X, captive portal, and WPS. << Previous Video: Wireless Cryptography Next: Wireless Authentication Protocols >> When you’re connecting to a wireless network. One of the first thing that happens is authentication. We need some

Wireless Authentication Methods – SY0-601 CompTIA Security+ : 3.4 Read More »

Wireless Cryptography – SY0-601 CompTIA Security+ : 3.4

Wireless networks wouldn’t be a very useful networking medium without cryptography. In this video, you’ll learn about wireless encryption, WPA2, WPA3, SAE, and more. << Previous Video: Other Network Appliances Next: Wireless Authentication Methods >> When we’re using our wired networks, we don’t have to worry so much about other people listening in to what

Wireless Cryptography – SY0-601 CompTIA Security+ : 3.4 Read More »

Other Network Appliances – SY0-601 CompTIA Security+ : 3.3

A layered approach to network security is always the best. In this video, you’ll learn about jump servers, hardware security modules (HSM), and sensors and collectors. << Previous Video: Intrusion Prevention Next: Wireless Cryptography >> One of the challenges we have when we’re administering our network and our servers is to be able to provide

Other Network Appliances – SY0-601 CompTIA Security+ : 3.3 Read More »

Intrusion Prevention – SY0-601 CompTIA Security+ : 3.3

Intrusion prevention is a useful way to block known vulnerabilities. In this video, you’ll learn about passive monitoring, out-of-band responses, inline monitoring, and in-line responses. << Previous Video: Proxy Servers Next: Other Network Appliances >> A network based intrusion detection system or more commonly a network based intrusion prevention system. It’s designed to look at

Intrusion Prevention – SY0-601 CompTIA Security+ : 3.3 Read More »