Free CompTIA Security+ Training

Secure Deployments – SY0-601 CompTIA Security+ : 2.3

The application development process can be a challenge to implement. In this video, you’ll learn how to securely create and deploy applications from the development process through production. << Previous Video: Virtualization Security Next: Provisioning and Deprovisoning >> If you’re an organization that does your own development work, there’s always a challenge in getting the […]

Secure Deployments – SY0-601 CompTIA Security+ : 2.3 Read More »

Virtualization Security – SY0-601 CompTIA Security+ : 2.2

The security of our cloud-based systems is paramount. In this video, you’ll learn about the importance of VM sprawl avoidance and VM escape protection. << Previous Video: Infrastructure as Code Next: Secure Deployments >> One of the huge advantages that cloud computing brings is the ability to deploy a new set of application instances with

Virtualization Security – SY0-601 CompTIA Security+ : 2.2 Read More »

Infrastructure as Code – SY0-601 CompTIA Security+ : 2.2

An important characteristic of cloud computing is the ability to easily deploy perfectly configured application instances at any time. In this video, you’ll learn how infrastructure as code can be used to simplify and streamline the deployment of cloud-based application instances. << Previous Video: Designing the Cloud Next: Virtualization Security >>     In previous

Infrastructure as Code – SY0-601 CompTIA Security+ : 2.2 Read More »

Designing the Cloud – SY0-601 CompTIA Security+ : 2.2

Cloud technologies have added new capabilities to application deployments and modularized applications. In this video, you’ll learn about virtual machines, application containerization, microservices, serverless architectures, and more. << Previous Video: Edge and Fog Computing Next: Infrastructure as Code >>     The cloud has forever changed how we deploy applications. We can click a button

Designing the Cloud – SY0-601 CompTIA Security+ : 2.2 Read More »

Edge and Fog Computing – SY0-601 CompTIA Security+ : 2.2

An optimal cloud computing infrastructure will make strategic use of edge computing and fog computing. In this video, you’ll learn how edge and fog computing are used to create an efficient and effective cloud computing design. << Previous Video: Cloud Models Next: Designing the Cloud >>     Cloud computing has changed the way that

Edge and Fog Computing – SY0-601 CompTIA Security+ : 2.2 Read More »

Cloud Models – SY0-601 CompTIA Security+ : 2.2

A cloud-based infrastructure can take many different forms. In this video, you’ll learn about IaaS, SaaS, PaaS, cloud deployment models, and more. << Previous Video: Honeypots and Deception Next: Edge and Fog Computing >> If you’ve contracted with a cloud service provider to outsource your equipment, then you’re probably using the model of Infrastructure as

Cloud Models – SY0-601 CompTIA Security+ : 2.2 Read More »

Honeypots and Deception – SY0-601 CompTIA Security+ : 2.1

There is a constant battle taking place on your network between the attackers and your defensive front. In this video, you’ll learn about honeypots, honeynets, fake telemetry, and DNS sinkholes. << Previous Video: Site Resiliency Next: Cloud Models >> A honeypot is a system, or series of systems, that’s designed to look very attractive to

Honeypots and Deception – SY0-601 CompTIA Security+ : 2.1 Read More »