States of Data – CompTIA Security+ SY0-401: 4.4
The state of a piece of data will assist in determining the best way to secure it. In this video, you’ll learn about securing data in-transit, at-rest, and in-use.
The state of a piece of data will assist in determining the best way to secure it. In this video, you’ll learn about securing data in-transit, at-rest, and in-use.
You can add additional security features by using hardware to assist with the encryption process. In this video, you’ll learn about trusted platform modules, hardware security modules, usb encryption, and hardware-assisted hard drive encryption.
Hardware-based Encryption – CompTIA Security+ SY0-401: 4.4 Read More »
If you want to keep your data safe, then you need to encrypt it. In this video, you’ll learn about encrypting full-disks, databases, individual files, removable media, and data on mobile devices.
Data Encryption – CompTIA Security+ SY0-401: 4.4 Read More »
Our data is becoming increasingly distributed, and our security strategies have changed to keep up with these dramatic changes. In this video, you’ll learn some best practices for protecting the data that week in the cloud and in our SAN.
Cloud and SAN Storage Data Security – CompTIA Security+ SY0-401: 4.4 Read More »
Our virtual systems have changed the way that we think about security. In this video, you’ll learn about virtualization technologies and some of the more important security considerations in a virtual environment.
Virtualization Security – CompTIA Security+ SY0-401: 4.3 Read More »
How safe is your software? In this video, you’ll learn how to create a security baseline on a server and considerations for baselining cloud-based devices.
Host Software Baselining – CompTIA Security+ SY0-401: 4.3 Read More »
Our physical devices need as much security as our operating systems. In this video, you’ll learn how cable locks, safes, and locking cabinets can help keep our systems under our control.
Hardware Security – CompTIA Security+ SY0-401: 4.3 Read More »
On a public Wi-Fi network, all of your security is whatever you’ve configured in your operating system. In this video, you’ll learn about host-based firewalls and intrusion protection systems.
Host-based Security – CompTIA Security+ SY0-401: 4.3 Read More »
It takes a lot of work to certify a trusted OS. In this video, you’ll learn about trusted operating systems and how much time and money it can take to validate this trust.
Trusted Operating Systems – CompTIA Security+ SY0-401: 4.3 Read More »
One common strategy of managing applications is to set specific restrictions on their use. In this video, you’ll learn about the advantages and disadvantages of white listing and black listing applications.
White Listing and Black Listing Applications – CompTIA Security+ SY0-401: 4.3 Read More »