SY0-701 Videos

Technical Change Management video title page

Technical Change Management – CompTIA Security+ SY0-701 – 1.3

A technician is ultimately responsible for putting the change management process into action. In this video, you’ll learn about the technical change management process. << Previous Video: Change Management Next Video: Public Key Infrastructure >> In our previous video, we talked about the change management process. But of course, eventually, the actual change will need […]

Technical Change Management – CompTIA Security+ SY0-701 – 1.3 Read More »

Change Management video title page

Change Management – CompTIA Security+ SY0-701 – 1.3

As IT professionals, we are constantly updating, modifying, and changing the devices we manage. In this video, you’ll learn how we manage this process with change management. << Previous Video: Deception and Disruption Next Video: Technical Change Management >> When you’re making a change to an application or an operating system that you use at

Change Management – CompTIA Security+ SY0-701 – 1.3 Read More »

Deception and Disruption video title page

Deception and Disruption – CompTIA Security+ SY0-701 – 1.2

There are many ways to fool an attacker into disclosing important information about their methods and techniques. In this video, you’ll learn how to use deception and disruption to protect your network. << Previous Video: Physical Security Next Video: Change Management >> As an IT security professional, you’ll spend a lot of time trying to

Deception and Disruption – CompTIA Security+ SY0-701 – 1.2 Read More »

Physical Security video title page

Physical Security – CompTIA Security+ SY0-701 – 1.2

Security tools in the physical world can be effectively used to protect our computing systems. In this video, you’ll learn about physical security devices and techniques. << Previous Video: Zero Trust Next Video: Deception and Disruption >> IT security professionals not only need to be proficient in digital security. They also need to have a

Physical Security – CompTIA Security+ SY0-701 – 1.2 Read More »

Authentication, Authorization, and Accounting video title page

Authentication, Authorization, and Accounting – CompTIA Security+ SY0-701 – 1.2

The AAA process is an important part of network security. In this video, you’ll learn more about authentication, authorization, and accounting. << Previous Video: Non-repudiation Next Video: Gap Analysis >> We’re all very familiar with the login process. You put in your username, your password. There might be some additional authentication factors. And if all

Authentication, Authorization, and Accounting – CompTIA Security+ SY0-701 – 1.2 Read More »

Non-repudiation video title page

Non-repudiation – CompTIA Security+ SY0-701 – 1.2

Non-repudiation is an important function of cryptography. In this video, you’ll learn about hashing, digital signatures, and non-repudiation. << Previous Video: The CIA Triad Next Video: Authentication, Authorization, and Accounting >> One of the important foundations of cryptography is ensuring that when someone sends data to a third party, that that third party is able

Non-repudiation – CompTIA Security+ SY0-701 – 1.2 Read More »

The CIA Triad video title page

The CIA Triad – CompTIA Security+ SY0-701 – 1.2

The CIA triad describes the foundational goals of IT security. In this video, you’ll learn more about confidentiality, integrity, and availability. << Previous Video: Security Controls Next Video: Non-repudiation >> The CIA Triad is an easy way to remember the fundamentals of IT security. Sometimes you’ll see this referred to as the AIC Triad to

The CIA Triad – CompTIA Security+ SY0-701 – 1.2 Read More »