CompTIA Security+ SY0-501

Network Intrusion Detection and Prevention – CompTIA Security+ SY0-501 – 2.1

If you want to stop an unwanted attack, then you’ll want to include an IPS as part of your defense-in-depth strategy. In this video, you’ll learn about intrusion detection systems and intrusion prevention systems, and you’ll learn how they work in both out-of-band and in-band response configurations. << Previous Video: VPN Concentrators Next: Router and […]

Network Intrusion Detection and Prevention – CompTIA Security+ SY0-501 – 2.1 Read More »

VPN Concentrators – CompTIA Security+ SY0-501 – 2.1

A virtual private network (VPN) is a valuable security technique that’s commonly used to protect data sent across insecure networks. In this video, you’ll learn about VPN technologies, types of VPN implementations, and how IPsec protocols are used to protect your data at the packet level. << Previous Video: Firewalls Next: Network Intrusion Detection and

VPN Concentrators – CompTIA Security+ SY0-501 – 2.1 Read More »

Firewalls – CompTIA Security+ SY0-501 – 2.1

If you have a network connection or operating system, then you certainly have a firewall. In this video, you’ll learn about firewall states, application-aware firewalls, and how to evaluate a firewall ruleset. << Previous Video: Vulnerability Types Next: VPN Concentrators >> What is a more ubiquitous security technology than the firewall? We use it everywhere.

Firewalls – CompTIA Security+ SY0-501 – 2.1 Read More »

Vulnerability Types – CompTIA Security+ SY0-501 – 1.6

A vulnerability scan can identify many different vulnerability types. In this video, you’ll learn some of the most common types of vulnerabilities. << Previous Video: Vulnerability Scanning Next: Firewalls >> When a security researcher finds a vulnerability in an operating system or an application, they qualify the type of vulnerability that it is. There are

Vulnerability Types – CompTIA Security+ SY0-501 – 1.6 Read More »

Vulnerability Scanning – CompTIA Security+ SY0-501 – 1.5

A vulnerability scan can tell you a lot about potential threats. In this video, you’ll learn about different vulnerability scan types, the results of a vulnerability scan, and how to deal with false positives. << Previous Video: Penetration Testing Next: Vulnerability Types >> Unlike a penetration test, a vulnerability scan usually is not very invasive.

Vulnerability Scanning – CompTIA Security+ SY0-501 – 1.5 Read More »

Penetration Testing – CompTIA Security+ SY0-501 – 1.4

If you really want to determine if your systems are vulnerable to an attack, you’ll have to try attacking them yourself. In this video, you’ll learn about penetration tests and how pentesting can be used to make your network more secure. << Previous Video: Threat Actors Next: Vulnerability Scanning >> If you’re performing a penetration

Penetration Testing – CompTIA Security+ SY0-501 – 1.4 Read More »

Threat Actors – CompTIA Security+ SY0-501 – 1.3

The type and motivation of an attacker can vary dramatically. In this video, you’ll learn about the types of different threat actors and the motivations behind their attacks. << Previous Video: Cryptographic Attacks Next: Penetration Testing >> There are people in organizations that are after your computers and your data. You can call these bad

Threat Actors – CompTIA Security+ SY0-501 – 1.3 Read More »

Cryptographic Attacks – CompTIA Security+ SY0-501 – 1.2

If you can’t hack the user, you may be able to hack the cryptography. In this video, you’ll learn about some common cryptographic attacks. << Previous Video: Wireless Disassociation Attacks Next: Threat Actors >> So you’ve taken some data and you’ve encrypted it. You’ve effectively put it into a safe and you’ve shipped that safe

Cryptographic Attacks – CompTIA Security+ SY0-501 – 1.2 Read More »

Wireless Disassociation Attacks – CompTIA Security+ SY0-501 – 1.2

One moment you’re connected to the wireless network, and the next moment you’re disconnected. In this video, you’ll see a wireless disassociation attack in action and you’ll learn what you can do to prevent this attack from happening to you. << Previous Video: RFID and NFC Attacks Next: Cryptographic Attacks >> A wireless disassociation attack

Wireless Disassociation Attacks – CompTIA Security+ SY0-501 – 1.2 Read More »