Free CompTIA Security+ Training

Federated Identities – CompTIA Security+ SY0-501 – 4.2

There are many different ways to implement authentication in an application. In this video, you’ll learn about server-based authentication, token-based authentication, and the advantages of using federation for user authentication. << Previous Video: PAP, CHAP, and MS-CHAP Next: Access Control Models >> Authenticating to a web server can be somewhat of a challenge. That’s because […]

Federated Identities – CompTIA Security+ SY0-501 – 4.2 Read More »

PAP, CHAP, and MS-CHAP – CompTIA Security+ SY0-501 – 4.2

Some legacy authentication protocols are still in use today. In this video, you’ll learn about the operation of PAP, CHAP, and Microsoft’s MS-CHAP protocols. << Previous Video: Identity and Access Services Next: Federated Identities >> If you need to authenticate on a Point-to-Point network, then you need the Point-to-Point Protocol, or PPP, to be able

PAP, CHAP, and MS-CHAP – CompTIA Security+ SY0-501 – 4.2 Read More »

Identity and Access Services – CompTIA Security+ SY0-501 – 4.2

The authentication process can many different protocols to verify a person’s identity. In this video, you’ll learn about RADIUS, TACACS, LDAP, and more. << Previous Video: AAA and Authentication Next: PAP, CHAP, and MS-CHAP >> When we want to gain access to some type of network resource, then we need to provide the credentials. Those

Identity and Access Services – CompTIA Security+ SY0-501 – 4.2 Read More »

AAA and Authentication – CompTIA Security+ SY0-501 – 4.1

The authentication process is a foundational aspect of network security. In this video, you’ll learn about AAA, authentication factors, federation, single sign-on, and more. << Previous Video: Physical Security Controls Next: Identity and Access Services >> The AAA framework is a foundation of network security. When we’re logging into our network to gain access to

AAA and Authentication – CompTIA Security+ SY0-501 – 4.1 Read More »

Physical Security Controls – CompTIA Security+ SY0-501 – 3.9

We rely on physical controls to provide a layer of security that’s not available from digital security controls. In this video, you’ll learn about some of the most popular physical security controls in use today. << Previous Video: Redundancy, Fault Tolerance, and High Availability Next: AAA and Authentication >> Bad guys don’t like to be

Physical Security Controls – CompTIA Security+ SY0-501 – 3.9 Read More »

Redundancy, Fault Tolerance, and High Availability – CompTIA Security+ SY0-501 – 3.8

Now that you’ve built your cloud-based application instances, how to keep them running with 100% availability? In this video, you’ll learn about redundant systems, building fault tolerant architectures, and the advantages of high availability. << Previous Video: Resiliency and Automation Next: Physical Security Controls >> If someone’s trying to gain access to your servers or

Redundancy, Fault Tolerance, and High Availability – CompTIA Security+ SY0-501 – 3.8 Read More »

Resiliency and Automation – CompTIA Security+ SY0-501 – 3.8

In the cloud, things happen fast. In this video, you’ll learn resiliency and automation can be used to maintain the uptime and availability of these dynamic computing platforms. << Previous Video: Security in the Cloud Next: Redundancy, Fault Tolerance, and High Availability >> If you’re maintaining a cloud-based infrastructure, then there’s going to be a

Resiliency and Automation – CompTIA Security+ SY0-501 – 3.8 Read More »

Security in the Cloud – CompTIA Security+ SY0-501 – 3.7

Now that our applications and data are in the cloud, how do we secure them? In this video, you’ll learn about cloud security, cloud access security brokers, security as a service, and more. << Previous Video: Cloud Deployment Models Next: Resiliency and Automation >> If you’re running an application infrastructure that is on premise, or

Security in the Cloud – CompTIA Security+ SY0-501 – 3.7 Read More »

Virtualization Security – CompTIA Security+ SY0-501 – 3.7

How secure is your virtual environment? In this video, you’ll learn about avoiding VM sprawl and how to protect against VM escapes. << Previous Video: Virtualization Overview Next: Cloud Deployment Models >> With virtualization, it’s very easy to build a computer out of the resources available in your virtualization environment. So you simply click a

Virtualization Security – CompTIA Security+ SY0-501 – 3.7 Read More »