CompTIA Security+ SY0-701

Cloud Infrastructures video title page

Cloud Infrastructures – CompTIA Security+ SY0-701 – 3.1

Security in the cloud is a constant challenge. In this video, you’ll learn about infrastructure as code, serverless architectures, APIs, and more. << Previous Video: Hardening Techniques Next Video: Network Infrastructure Concepts >> At this point in the evolution of cloud technologies, it’s very likely that you or your organization has one or many applications […]

Cloud Infrastructures – CompTIA Security+ SY0-701 – 3.1 Read More »

Hardening Techniques video title page

Hardening Techniques – CompTIA Security+ SY0-701 – 2.5

There are many different techniques for making a system more difficult to exploit. In this video, you’ll learn about encryption, open ports, default passwords, and more. << Previous Video: Mitigation Techniques Next Video: Cloud Infrastructures >> If you take a look around your network, your servers, and other devices, you may find opportunities to make

Hardening Techniques – CompTIA Security+ SY0-701 – 2.5 Read More »

Mitigation Techniques video title page

Mitigation Techniques – CompTIA Security+ SY0-701 – 2.5

There are many ways to prevent or reduce the impact of a cybersecurity attack. In this video, you’ll learn about patching, encryption, monitoring, least privilege, and more. << Previous Video: Segmentation and Access Control Next Video: Hardening Techniques >> Mitigation is the process of reducing the impact of a security event or a potential security

Mitigation Techniques – CompTIA Security+ SY0-701 – 2.5 Read More »

Segmentation and Access Control video title page

Segmentation and Access Control – CompTIA Security+ SY0-701 – 2.5

Segmenting the network can provide significant security advantages. In this video, you’ll learn about access control lists, application allow lists, and more. << Previous Video: Indicators of Compromise Next Video: Mitigation Techniques >> In order to limit the scope of any type of security event, it may be useful to segment your network into smaller

Segmentation and Access Control – CompTIA Security+ SY0-701 – 2.5 Read More »

Indicators of Compromise video title page

Indicators of Compromise – CompTIA Security+ SY0-701 – 2.4

It’s important to identify an intrusion as soon as possible. In this video, you’ll learn about indicators such as account lockouts, impossible travel, resource consumption, and more. << Previous Video: Password Attacks Next Video: Segmentation and Access Control >> As an IT security professional, you’ll often be looking for any evidence that someone may have

Indicators of Compromise – CompTIA Security+ SY0-701 – 2.4 Read More »

Password Attacks video title page

Password Attacks – CompTIA Security+ SY0-701 – 2.4

Our passwords are often the first and last security measure we use. In this video, you’ll learn how attackers obtain our credentials using password spraying and brute force. << Previous Video: Cryptographic Attacks Next Video: Indicators of Compromise >> In your IT career, there is a possibility that you could run across an application that

Password Attacks – CompTIA Security+ SY0-701 – 2.4 Read More »

Cryptographic Attacks video title page

Cryptographic Attacks – CompTIA Security+ SY0-701 – 2.4

Poorly implemented cryptography can often be the source of an attack. In this video, you’ll learn about downgrade attacks, SSL stripping, and hash collisions. << Previous Video: Application Attacks Next Video: Password Attacks >> Cryptography is a technology we use many times a day. But we often don’t even think about what’s happening behind the

Cryptographic Attacks – CompTIA Security+ SY0-701 – 2.4 Read More »

Application Attacks video title page

Application Attacks – CompTIA Security+ SY0-701 – 2.4

Our applications can be the weakest links in our security armor. In this video, you’ll learn about privilege escalation, directory traversal, and more. << Previous Video: Malicious Code Next Video: Cryptographic Attacks >> An injection attack is a very common way to attack an application because an attacker can easily add additional malicious code to

Application Attacks – CompTIA Security+ SY0-701 – 2.4 Read More »