Free CompTIA Security+ Training

Geographic Considerations – CompTIA Security+ SY0-501 – 5.6

Selecting the location of a disaster recovery site isn’t as simple as it may seem. In this video, you’ll learn about the challenges of geographic location, off-site backups, and issues with international data and travel. << Previous Video: Application Recovery Next: Continuity of Operations >> Whenever you’re preparing for any kind of incident, you must […]

Geographic Considerations – CompTIA Security+ SY0-501 – 5.6 Read More »

Application Recovery – CompTIA Security+ SY0-501 – 5.6

When a security incident occurs, you’ll need to get applications running again as quickly as possible. In this video, you’ll learn about application restoration priorities and backup strategies. << Previous Video: Disaster Recovery Sites Next: Geographic Considerations >> When you’re recovering applications, some applications may have a higher priority than others. Applications that are customer

Application Recovery – CompTIA Security+ SY0-501 – 5.6 Read More »

Disaster Recovery Sites – CompTIA Security+ SY0-501 – 5.6

If you’re building out a disaster recovery site, there are many options available to you. In this video, you’ll learn about cold sites, warm sites, and hot sites. << Previous Video: Using Forensics Data Next: Application Recovery >> If you’re building out a disaster recovery site, there are many different options available. In this video,

Disaster Recovery Sites – CompTIA Security+ SY0-501 – 5.6 Read More »

Using Forensics Data – CompTIA Security+ SY0-501 – 5.5

After you’ve collected forensics data, what processes should you follow? In this video, you’ll learn about the preservation of evidence, recovery of data, and tracking man hours and expenses. << Previous Video: Gathering Forensics Data Next: Disaster Recovery Sites >> It’s important to preserve all of your forensics data, and there will be a lot

Using Forensics Data – CompTIA Security+ SY0-501 – 5.5 Read More »

Gathering Forensics Data – CompTIA Security+ SY0-501 – 5.5

The process of gathering forensics data requires planning and attention to detail. In this video, you’ll learn about the process of gathering and storing important information after a security incident. << Previous Video: Incident Response Process Next: Using Forensics Data >> During and after a security incident there will always be a need to collect

Gathering Forensics Data – CompTIA Security+ SY0-501 – 5.5 Read More »

Cloud Deployment Models – CompTIA Security+ SY0-501 – 3.7

There are many different cloud architectures to consider when designing the perfect cloud. In this video, you’ll learn about cloud services, public clouds, private clouds, and more. << Previous Video: Virtualization Security Next: Security in the Cloud >> With Software as a Service, there’s no need to have any local installation of hardware or software

Cloud Deployment Models – CompTIA Security+ SY0-501 – 3.7 Read More »

Incident Response Process – CompTIA Security+ SY0-501 – 5.4

What processes should you have in place before, during, and after a security incident? In this video, you’ll learn about the processes you can follow to help detect, contain, and resolve a security incident. << Previous Video: Incident Response Planning Next: Gathering Forensics Data >> If you ever want to read through some guidelines that

Incident Response Process – CompTIA Security+ SY0-501 – 5.4 Read More »

Incident Response Planning – CompTIA Security+ SY0-501 – 5.4

Are you ready for the next security incident in your organization? In this video, you’ll learn about the categories of incidents, roles and responsibilities of your incident response team, and the importance of running exercises prior to an actual incident. << Previous Video: Risk Assessment Next: Incident Response Process >> There are many different kinds

Incident Response Planning – CompTIA Security+ SY0-501 – 5.4 Read More »

Risk Assessment – CompTIA Security+ SY0-501 – 5.3

What risks can affect your organization, and what kind of impact will they have? In this video, you’ll learn about the importance of risk assessment. << Previous Video: Business Impact Analysis Next: Incident Response Planning >> When you’re assessing risk, you need to understand the threats. Some threats may be created by the environment around

Risk Assessment – CompTIA Security+ SY0-501 – 5.3 Read More »