CompTIA Security+ SY0-501

Security Controls – CompTIA Security+ SY0-501 – 5.7

There are many ways to prevent or minimize the impact of a security event. In this video, you’ll learn about the different security control categories. << Previous Video: Continuity of Operations Next: Data Destruction >> There are many different security risks out there, and there are all different shapes and forms. We have to protect […]

Security Controls – CompTIA Security+ SY0-501 – 5.7 Read More »

Continuity of Operations – CompTIA Security+ SY0-501 – 5.6

Maintaining the technology for an organization can be a challenge in the best of circumstances. In this video, you’ll learn about planning for disaster with tabletop exercises, after-action reports, failover plans, and more. << Previous Video: Geographic Considerations Next: Security Controls >> If you’ve built a plan for a security incident, it’s always a good

Continuity of Operations – CompTIA Security+ SY0-501 – 5.6 Read More »

Geographic Considerations – CompTIA Security+ SY0-501 – 5.6

Selecting the location of a disaster recovery site isn’t as simple as it may seem. In this video, you’ll learn about the challenges of geographic location, off-site backups, and issues with international data and travel. << Previous Video: Application Recovery Next: Continuity of Operations >> Whenever you’re preparing for any kind of incident, you must

Geographic Considerations – CompTIA Security+ SY0-501 – 5.6 Read More »

Application Recovery – CompTIA Security+ SY0-501 – 5.6

When a security incident occurs, you’ll need to get applications running again as quickly as possible. In this video, you’ll learn about application restoration priorities and backup strategies. << Previous Video: Disaster Recovery Sites Next: Geographic Considerations >> When you’re recovering applications, some applications may have a higher priority than others. Applications that are customer

Application Recovery – CompTIA Security+ SY0-501 – 5.6 Read More »

Disaster Recovery Sites – CompTIA Security+ SY0-501 – 5.6

If you’re building out a disaster recovery site, there are many options available to you. In this video, you’ll learn about cold sites, warm sites, and hot sites. << Previous Video: Using Forensics Data Next: Application Recovery >> If you’re building out a disaster recovery site, there are many different options available. In this video,

Disaster Recovery Sites – CompTIA Security+ SY0-501 – 5.6 Read More »

Using Forensics Data – CompTIA Security+ SY0-501 – 5.5

After you’ve collected forensics data, what processes should you follow? In this video, you’ll learn about the preservation of evidence, recovery of data, and tracking man hours and expenses. << Previous Video: Gathering Forensics Data Next: Disaster Recovery Sites >> It’s important to preserve all of your forensics data, and there will be a lot

Using Forensics Data – CompTIA Security+ SY0-501 – 5.5 Read More »

Gathering Forensics Data – CompTIA Security+ SY0-501 – 5.5

The process of gathering forensics data requires planning and attention to detail. In this video, you’ll learn about the process of gathering and storing important information after a security incident. << Previous Video: Incident Response Process Next: Using Forensics Data >> During and after a security incident there will always be a need to collect

Gathering Forensics Data – CompTIA Security+ SY0-501 – 5.5 Read More »

Cloud Deployment Models – CompTIA Security+ SY0-501 – 3.7

There are many different cloud architectures to consider when designing the perfect cloud. In this video, you’ll learn about cloud services, public clouds, private clouds, and more. << Previous Video: Virtualization Security Next: Security in the Cloud >> With Software as a Service, there’s no need to have any local installation of hardware or software

Cloud Deployment Models – CompTIA Security+ SY0-501 – 3.7 Read More »

Incident Response Process – CompTIA Security+ SY0-501 – 5.4

What processes should you have in place before, during, and after a security incident? In this video, you’ll learn about the processes you can follow to help detect, contain, and resolve a security incident. << Previous Video: Incident Response Planning Next: Gathering Forensics Data >> If you ever want to read through some guidelines that

Incident Response Process – CompTIA Security+ SY0-501 – 5.4 Read More »