CompTIA Security+ SY0-701

Firewalls video title page

Firewalls – CompTIA Security+ SY0-701 – 4.5

Firewalls are an important part of any security protection strategy. In this video, you’ll learn about next-generation firewalls, firewall rules, screen subnets, and more. << Previous Video: Security Tools Next Video: Web Filtering >> A network-based firewall is an appliance that sits inline in your network and makes decisions about whether traffic should be allowed […]

Firewalls – CompTIA Security+ SY0-701 – 4.5 Read More »

Security Tools video title page

Security Tools – CompTIA Security+ SY0-701 – 4.4

Security administrators have many tools to help protect network resources. In this video, you’ll learn about Security Content Automation Protocol (SCAP), secure baselines, SIEMs, and more. << Previous Video: Security Monitoring Next Video: Firewalls >> On your enterprise network, there are probably many different security tools. You might have next generation firewalls, intrusion prevention systems,

Security Tools – CompTIA Security+ SY0-701 – 4.4 Read More »

Security Monitoring video title page

Security Monitoring – CompTIA Security+ SY0-701 – 4.4

There are many methods for monitoring and reacting to security events. In this video, you’ll learn about log aggregation, scanning, reporting, alerting, and more. << Previous Video: Vulnerability Remediation Next Video: Security Tools >> Attackers are constantly trying to gain access to our systems and services. So for that reason, we also have to constantly

Security Monitoring – CompTIA Security+ SY0-701 – 4.4 Read More »

Vulnerability Remediation video title page

Vulnerability Remediation – CompTIA Security+ SY0-701 – 4.3

Once a vulnerability is identified, a security professional is required to mitigate the issue. In this video, you’ll learn about patching, insurance, segmentation, compensating controls, and more. << Previous Video: Analyzing Vulnerabilities Next Video: Security Monitoring >> In the vast majority of cases where a vulnerability has been identified, it can easily be mitigated by

Vulnerability Remediation – CompTIA Security+ SY0-701 – 4.3 Read More »

Analyzing Vulnerabilities video title page

Analyzing Vulnerabilities – CompTIA Security+ SY0-701 – 4.3

Identifying and analyzing vulnerabilities can be a relatively complex process. In this video, you’ll learn about vulnerability databases, classification, exposure factor, risk tolerance, and more. << Previous Video: Penetration Testing Next Video: Vulnerability Remediation >> One of the challenges when looking through log files or receiving reports of vulnerability scans is that you’ll often have

Analyzing Vulnerabilities – CompTIA Security+ SY0-701 – 4.3 Read More »

Penetration Testing video title page

Penetration Testing – CompTIA Security+ SY0-701 – 4.3

Penetration tests can simulate an attack to exploit vulnerabilities. In this video, you’ll learn about rules of engagement, the exploitation process, responsible disclosure programs, and more. << Previous Video: Threat Intelligence Next Video: Analyzing Vulnerabilities >> Penetration testing or pen testing is a process where we simulate an attack on our own systems. This is

Penetration Testing – CompTIA Security+ SY0-701 – 4.3 Read More »

Threat Intelligence video title page

Threat Intelligence – CompTIA Security+ SY0-701 – 4.3

To identify threats, we first must know the threats exist. In this video, you’ll learn about threat intelligence gathering techniques such as OSINT, third-parties, information sharing, the dark web, and more. << Previous Video: Vulnerability Scanning Next Video: Penetration Testing >> As an IT security professional, you’ll be expected to always keep up to date

Threat Intelligence – CompTIA Security+ SY0-701 – 4.3 Read More »

Vulnerability Scanning video title page

Vulnerability Scanning – CompTIA Security+ SY0-701 – 4.3

Security researchers may use many techniques to identify vulnerabilities on a system or in software. In this video, you’ll learn about vulnerability scans, static code analyzers, and fuzzing. << Previous Video: Asset Management Next Video: Threat Intelligence >> Vulnerability scans are used to determine if a system may be susceptible to a type of attack.

Vulnerability Scanning – CompTIA Security+ SY0-701 – 4.3 Read More »

Asset Management video title page

Asset Management – CompTIA Security+ SY0-701 – 4.2

An important part of IT security is the management of hardware and software. In this video, you’ll learn best practices for the procurement process, asset tracking, media sanitization, physical destruction, and more. << Previous Video: Application Security Next Video: Vulnerability Scanning >> Every organization has a formal process for acquiring goods and services from third

Asset Management – CompTIA Security+ SY0-701 – 4.2 Read More »

Application Security video title page

Application Security – CompTIA Security+ SY0-701 – 4.1

Application developers will follow best practices for security in their code. In this video, you’ll learn about input validation, secure cookies, code signing, sandboxing, and more. << Previous Video: Wireless Security Settings Next Video: Asset Management >> As IT professionals, we’re often tasked with installing security patches for applications which have been found to have

Application Security – CompTIA Security+ SY0-701 – 4.1 Read More »