CompTIA Security+ SY0-501

Security in the Cloud – CompTIA Security+ SY0-501 – 3.7

Now that our applications and data are in the cloud, how do we secure them? In this video, you’ll learn about cloud security, cloud access security brokers, security as a service, and more. << Previous Video: Cloud Deployment Models Next: Resiliency and Automation >> If you’re running an application infrastructure that is on premise, or […]

Security in the Cloud – CompTIA Security+ SY0-501 – 3.7 Read More »

Virtualization Security – CompTIA Security+ SY0-501 – 3.7

How secure is your virtual environment? In this video, you’ll learn about avoiding VM sprawl and how to protect against VM escapes. << Previous Video: Virtualization Overview Next: Cloud Deployment Models >> With virtualization, it’s very easy to build a computer out of the resources available in your virtualization environment. So you simply click a

Virtualization Security – CompTIA Security+ SY0-501 – 3.7 Read More »

Virtualization Overview – CompTIA Security+ SY0-501 – 3.7

Virtualization is the cornerstone of today’s cloud-based technologies. In this video, you’ll learn how virtualization can be used to optimize the use of your hardware. << Previous Video: Code Quality and Testing Next: Virtualization Security >> Virtualization is a remarkable technology that allows you to run multiple individual operating systems, all on the same piece

Virtualization Overview – CompTIA Security+ SY0-501 – 3.7 Read More »

Code Quality and Testing – CompTIA Security+ SY0-501 – 3.6

Now that you’re written your application, how can determine if your code is secure? In this video, you’ll learn how to test and evaluate your application code. << Previous Video: Secure Coding Techniques Next: Virtualization Overview >> If you’re a developer who would like to test your code to see if there are any security

Code Quality and Testing – CompTIA Security+ SY0-501 – 3.6 Read More »

Secure Coding Techniques – CompTIA Security+ SY0-501 – 3.6

If you’re writing your own applications, there are a number of best-practices you should follow to ensure that your code is secure. In this video, you’ll learn about some of the most common secure coding techniques and how to implement them into your development process. << Previous Video: Provisioning and Deprovisioning Next: Code Quality and

Secure Coding Techniques – CompTIA Security+ SY0-501 – 3.6 Read More »

Provisioning and Deprovisioning – CompTIA Security+ SY0-501 – 3.6

In today’s dynamic infrastructures, application platforms are constantly created and dismantled. In this video, you’ll learn about the security concerns associated with provisioning and deprovisioning these application platforms. << Previous Video: Version Control and Change Management Next: Secure Coding Techniques >> The process of provisioning means that we’re going to make something available. That means

Provisioning and Deprovisioning – CompTIA Security+ SY0-501 – 3.6 Read More »

Version Control and Change Management – CompTIA Security+ SY0-501 – 3.6

Version control and change management procedures are important to both the operations team and the security team. In this video, you’ll learn about the security concerns associated with version control and how change management can be part of a safe infrastructure. << Previous Video: Secure DevOps Next: Provisioning and Deprovisioning >> There are always going

Version Control and Change Management – CompTIA Security+ SY0-501 – 3.6 Read More »

Secure DevOps – CompTIA Security+ SY0-501 – 3.6

The combining of development and operations provides some enhanced capabilities for the security team as well. In this video, you’ll learn about DevOps and how security is integrating into this new structure of application development and deployment. << Previous Video: Development Life-Cycle Models Next: Version Control and Change Management >> Traditionally, there have always been

Secure DevOps – CompTIA Security+ SY0-501 – 3.6 Read More »

Development Life Cycle Models – CompTIA Security+ SY0-501 – 3.6

There are many different ways to build an application. In this video, you’ll learn about two of the most popular life cycle models for application development; waterfall and agile. << Previous Video: Embedded Systems Next: Secure DevOps >> The process of building an application is referred to as the systems development lifecycle, although you may

Development Life Cycle Models – CompTIA Security+ SY0-501 – 3.6 Read More »

Embedded Systems – CompTIA Security+ SY0-501 – 3.5

We use embedded operating systems every day, but we don’t always consider the underlying operation and complexities of these embedded technologies. In this video, you’ll learn about the security concerns associated with many different embedded systems. << Previous Video: Secure Deployments Next: Development Life-Cycle Models >> SCADA stands for Supervisory Control and Data Acquisition System.

Embedded Systems – CompTIA Security+ SY0-501 – 3.5 Read More »