Reporting – CompTIA Security+ SY0-401: 3.6
If you can’t see a problem, then you can’t fix it. In this video, you’ll learn how reporting can help you create and maintain a security computing environment.
If you can’t see a problem, then you can’t fix it. In this video, you’ll learn how reporting can help you create and maintain a security computing environment.
You can’t build a security policy unless you know how to plan, monitor, and remediate security issues. In this video, you’ll learn some best-practices for baselining, watching, and resolving security problems.
Security Posture – CompTIA Security+ SY0-401: 3.6 Read More »
Physical access to a network can be a significant security concern. In this video, you’ll learn how to protect your physical network interfaces using configuration settings and access control software.
Physical Port Security – CompTIA Security+ SY0-401: 3.6 Read More »
Out of the box, your operating system probably isn’t the most secure. In this video, you’ll learn some best practices for security your operating system from the bad guys.
Operating System Hardening – CompTIA Security+ SY0-401: 3.6 Read More »
Your system logs contain a wealth of security details. In this video, you’ll learn about the different log types and how they can be used to security your network.
Monitoring System Logs – CompTIA Security+ SY0-401: 3.6 Read More »
A serious programming error can open your computer to code that can be run from anywhere in the world. In this video, you’ll learn about remote code execution and how you can avoid having your computer taken over by the bad guys.
Arbitrary and Remote Code Execution – CompTIA Security+ SY0-401: 3.5 Read More »
We are constantly installing new software and add-ons, but how do we know if this software is safe to use? In this video, you’ll learn about add-ons and attachments, and I’ll give you some real-world examples of malicious add-ons.
Malicious Add-ons and Attachments – CompTIA Security+ SY0-401: 3.5 Read More »
A number of security concerns are related to cookies and the information that we’re storing in our computer. In this video, you’ll learn about Flash cookies and how these locally shared objects can potentially leak information to the bad guys.
Locally Shared Objects and Flash Cookies – CompTIA Security+ SY0-401: 3.5 Read More »
If you have the right information, it may be possible to gain access to a user’s account information without any authentication. In this video, you’ll learn about session hijacking and I’ll demonstrate a live session hijack by gaining access to cookie information and manipulating HTTP headers.
Cookies, Header Manipulation, and Session Hijacking – CompTIA Security+ SY0-401: 3.5 Read More »
Many of our applications contain security vulnerabilities that haven’t been discovered yet. In this video, you’ll learn about zero-day attacks and why it’s important to patch our systems as quickly as possible.
Zero-Day Attacks – CompTIA Security+ SY0-401: 3.5 Read More »