CompTIA Security+ SY0-601

Multi-factor Authentication – SY0-601 CompTIA Security+ : 2.4

We use many different factors during the authentication process. In this video, you’ll learn about the AAA framework, multi-factor authentication factors, and multi-factor authentication attributes. << Previous Video: Biometrics Next: Disk Redundancy >>     We’re all familiar with the process of authenticating into a system. Usually you use a username, a password, and perhaps […]

Multi-factor Authentication – SY0-601 CompTIA Security+ : 2.4 Read More »

Biometrics – SY0-601 CompTIA Security+ : 2.4

There are many ways to authenticate someone based on a biometric feature. In this video, you’ll learn about fingerprint scanners, retinal scanners, voice recognition, and more. << Previous Video: Authentication Methods Next: Multi-factor Authentication >> A biometric authentication factor refers to something you are, this would be something like a fingerprint. For example, fingerprint scanners

Biometrics – SY0-601 CompTIA Security+ : 2.4 Read More »

Authentication Methods – SY0-601 CompTIA Security+ : 2.4

We use many different technologies during the authentication process. In this video, you’ll learn about directory services, federation, attestation, and more. << Previous Video: Automation and Scripting Next: Biometrics >>     Many operating systems will use a feature known as directory services. This is a central database that stores usernames, passwords, computers, printers, and

Authentication Methods – SY0-601 CompTIA Security+ : 2.4 Read More »

Automation and Scripting – SY0-601 CompTIA Security+ : 2.3

One challenge for any developer is the process of creating and publishing application updates. In this video, you’ll learn about continuous integration, continuous delivery, and continuous deployment. << Previous Video: Software Diversity Next: Authentication Methods >>     The application development process is a constantly moving and constantly changing process. And it becomes important to

Automation and Scripting – SY0-601 CompTIA Security+ : 2.3 Read More »

Secure Coding Techniques – SY0-601 CompTIA Security+ : 2.3

An application developer must use many different techniques to keep their code secure. In this video, you’ll learn about stored procedures, obfuscation, input validation, memory management, and more. << Previous Video: Provisioning and Deprovisioning Next: Software Diversity >>     Creating an application is always a balancing act between, how much time it takes to

Secure Coding Techniques – SY0-601 CompTIA Security+ : 2.3 Read More »

Provisioning and Deprovisioning – SY0-601 CompTIA Security+ : 2.3

Cloud computing has put an updated focus on our approach to provisioning and deprovisioning applications. In this video, you’ll learn about scalability, elasticity, and orchestration of application instances. << Previous Video: Secure Deployments Next: Secure Coding Techniques >>     Provisioning is the process of making something available. If you are provisioning an application, then

Provisioning and Deprovisioning – SY0-601 CompTIA Security+ : 2.3 Read More »

Secure Deployments – SY0-601 CompTIA Security+ : 2.3

The application development process can be a challenge to implement. In this video, you’ll learn how to securely create and deploy applications from the development process through production. << Previous Video: Virtualization Security Next: Provisioning and Deprovisoning >> If you’re an organization that does your own development work, there’s always a challenge in getting the

Secure Deployments – SY0-601 CompTIA Security+ : 2.3 Read More »

Virtualization Security – SY0-601 CompTIA Security+ : 2.2

The security of our cloud-based systems is paramount. In this video, you’ll learn about the importance of VM sprawl avoidance and VM escape protection. << Previous Video: Infrastructure as Code Next: Secure Deployments >> One of the huge advantages that cloud computing brings is the ability to deploy a new set of application instances with

Virtualization Security – SY0-601 CompTIA Security+ : 2.2 Read More »