SY0-601 Videos

Load Balancing – SY0-601 CompTIA Security+ : 3.3

Load balancers provides many options for keeping services available and efficient. In this video, you’ll learn about load balancing, scheduling, affinity, and active/passive load balancing. << Previous Video: Application Hardening Next: Network Segmentation >> If you’re watching this video on the Professor Messer website, then you are taking advantage of load-balancing technology. Load balancing is […]

Load Balancing – SY0-601 CompTIA Security+ : 3.3 Read More »

Application Hardening – SY0-601 CompTIA Security+ : 3.2

There are some best practices to use when managing the security of applications. In this video, you’ll learn how to harden application through the use of port filters, registry settings, disk encryption, patch management, and more. << Previous Video: Application Security Next: Load Balancing >> As a security professional, there are a number of techniques

Application Hardening – SY0-601 CompTIA Security+ : 3.2 Read More »

Application Security – SY0-601 CompTIA Security+ : 3.2

Application development use a number of different techniques to keep our applications secure. In this video, you’ll learn about input validation, fuzzing, secure cookies, code signing, and more. << Previous Video: Database Security Next: Application Hardening >> As security professionals, we’re tasked with making sure that our applications and operating systems are always updated to

Application Security – SY0-601 CompTIA Security+ : 3.2 Read More »

Boot Integrity – SY0-601 CompTIA Security+ : 3.2

It’s important to secure the boot process to prevent the installation of malicious software. In this video, you’ll learn about hardware root of trust, secure boot, trusted boot, and measured boot. << Previous Video: Endpoint Protection Next: Database Security >> One consistent aspect of IT security is that the attackers are constantly going after our

Boot Integrity – SY0-601 CompTIA Security+ : 3.2 Read More »

Endpoint Protection – SY0-601 CompTIA Security+ : 3.2

We use many different techniques to keep our endpoint devices safe. In this video, you’ll learn about anti-malware, EDR, data loss prevention, host-based firewalls, and more. << Previous Video: Secure Protocols Next: Boot Integrity >> We’re keeping an increasing amount of sensitive information on our computing devices and we’re using different kinds of computing devices.

Endpoint Protection – SY0-601 CompTIA Security+ : 3.2 Read More »

Cryptography Limitations – SY0-601 CompTIA Security+ : 2.8

Although cryptography provides significant functionality, it’s not without tradeoffs. In this video, you’ll learn the use and limitations of using cryptography technology in practical use. << Previous Video: Cryptography Use Cases Next: Secure Protocols >> Although cryptography provides us with a number of very powerful capabilities, there are still limitations into how we use cryptography.

Cryptography Limitations – SY0-601 CompTIA Security+ : 2.8 Read More »

Cryptography Use Cases – SY0-601 CompTIA Security+ : 2.8

Cryptography provides numerous capabilities to our technical life. In this video, you’ll learn about the use cases associated with the implementation of cryptographic technologies. << Previous Video: Blockchain Technology Next: Cryptography Limitations >> We use cryptography in many aspects of our lives. And in this video, we’ll go through a number of these important cryptography

Cryptography Use Cases – SY0-601 CompTIA Security+ : 2.8 Read More »

Blockchain Technology – SY0-601 CompTIA Security+ : 2.8

Although blockchain technology is often associated with cryptocurrencies, there are many other implementations. In this video, you’ll get an overview of the processes used with blockchain technologies. << Previous Video: Stream and Block Ciphers Next: Cryptography Use Cases >> A blockchain is a distributed ledger. It’s a way to keep track of a particular event.

Blockchain Technology – SY0-601 CompTIA Security+ : 2.8 Read More »