SY0-601 Videos

Penetration Testing – SY0-601 CompTIA Security+ : 1.8

The process of exploiting a vulnerability in a controlled environment is a penetration test. In this video, you’ll learn about pentesting, rules of engagement, exploiting vulnerabilities, and more. << Previous Video: Security Information and Event Management Next: Reconnaissance >>     If you’re performing a penetration test, then you are actively trying to gain access […]

Penetration Testing – SY0-601 CompTIA Security+ : 1.8 Read More »

Security Information and Event Management – SY0-601 CompTIA Security+ : 1.7

If you are monitoring the security of your network, then you are almost certainly using a SIEM. In this video, you’ll learn about SEIMs, using syslog, and the fundamentals of SOAR. << Previous Video: Vulnerability Scans Next: Penetration Testing >> To be able to manage the massive amount of information you receive from log files

Security Information and Event Management – SY0-601 CompTIA Security+ : 1.7 Read More »

Vulnerability Scans – SY0-601 CompTIA Security+ : 1.7

It’s important to find vulnerabilities in your network before the attackers. In this video, you’ll learn about vulnerability scans, false positives, credentialed scans, and more. << Previous Video: Threat Hunting Next: Security Information and Event Management >> If you’re working in IT security you are undoubtedly going to be performing some vulnerability scans. These scans

Vulnerability Scans – SY0-601 CompTIA Security+ : 1.7 Read More »

Vulnerability Impacts – SY0-601 CompTIA Security+ : 1.6

Vulnerabilities can have an effect on many parts of an organization. In this video, you’ll learn about data loss, identity theft, financial loss, reputation impacts, and availability loss. << Previous Video: Third-party Risks Next: Threat Hunting >> In February of 2018, the United States Council of Economic Advisors produced a report called The Cost of

Vulnerability Impacts – SY0-601 CompTIA Security+ : 1.6 Read More »

Third-party Risks – SY0-601 CompTIA Security+ : 1.6

Interacting with third-parties adds additional security concerns. In this video, you’ll learn about system integration risk, lack of vendor support, supply chain risk, outsourced code development, and data storage risks. << Previous Video: Vulnerability Types Next: Vulnerability Impacts >>     No matter the size of your organization, there will be some type of third

Third-party Risks – SY0-601 CompTIA Security+ : 1.6 Read More »

Threat Research – SY0-601 CompTIA Security+ : 1.5

Researching and understanding potential threats is an ongoing part of any security professional’s job. In this video, you’ll learn about vendor websites, vulnerability feeds, academic journals, RFCs, and more. << Previous Video: Threat Intelligence Next: Vulnerability Types >> To be able to stop a threat you have to know the threat exists. And as an

Threat Research – SY0-601 CompTIA Security+ : 1.5 Read More »

Threat Intelligence – SY0-601 CompTIA Security+ : 1.5

There are many ways to research and prepare for threats. In this video, you’ll learn about OSINT, vulnerability databases, information sharing, and other intelligence sources. << Previous Video: Attack Vectors Next: Threat Research >>     As a security professional, you may be spending quite a bit of time researching threats that could be potentially

Threat Intelligence – SY0-601 CompTIA Security+ : 1.5 Read More »