SY0-701 Videos

Risk Analysis video title page

Risk Analysis – CompTIA Security+ SY0-701 – 5.2

To manage risk, we have to understand the risk we carry. In this video, you’ll learn about risk assessments, risk appetite, risk tolerance, and risk registers. << Previous Video: Risk Management Next Video: Risk Management Strategies >> Determining levels of risk can vary widely on how many different variables are involved. One way to evaluate […]

Risk Analysis – CompTIA Security+ SY0-701 – 5.2 Read More »

Risk Management video title page

Risk Management – CompTIA Security+ SY0-701 – 5.2

Risk management helps to understand the potential risks to an organization. In this video, you’ll learn about risk assessments, ad hoc assessments, and recurring assessments. << Previous Video: Data Roles and Responsibilities Next Video: Risk Analysis >> Most organizations have some level of risk management that allows them to identify where risks might be and

Risk Management – CompTIA Security+ SY0-701 – 5.2 Read More »

Data Roles and Responsibilities video title page

Data Roles and Responsibilities – CompTIA Security+ SY0-701 – 5.1

The management of data is the responsibility of many individuals. In this video, you’ll learn about data owners, data controllers, data processors, and more. << Previous Video: Security Considerations Next Video: Risk Management >> There are many different people in the organization responsible for different aspects of the data that we’re storing. And in this

Data Roles and Responsibilities – CompTIA Security+ SY0-701 – 5.1 Read More »

Security Considerations video title page

Security Considerations – CompTIA Security+ SY0-701 – 5.1

There are many requirements associated with IT security. In this video, you’ll learn about regulatory requirements, legal issues, industry standards, and more. << Previous Video: Security Procedures Next Video: Data Roles and Responsibilities >> IT security professionals have to be aware of regulations associated with the organization that they work for and the type of

Security Considerations – CompTIA Security+ SY0-701 – 5.1 Read More »

Security Procedures video title page

Security Procedures – CompTIA Security+ SY0-701 – 5.1

IT security maintains a number of procedures to ensure control of data and services. In this video, you’ll learn about change management, onboarding, offboarding, playbooks, and more. << Previous Video: Security Standards Next Video: Security Considerations >> One of the most common security procedures for almost any organization is one related to change management. Change

Security Procedures – CompTIA Security+ SY0-701 – 5.1 Read More »

Security Standards video title page

Security Standards – CompTIA Security+ SY0-701 – 5.1

Some security parameters are administratively managed. In this video, you’ll learn about standards for password policies, access control, physical security, and more. << Previous Video: Security Policies Next Video: Security Procedures >> In the technology industry, we rely on standards to let everyone know what the formal process is for handling different situations. This provides

Security Standards – CompTIA Security+ SY0-701 – 5.1 Read More »

Security Policies video title page

Security Policies – CompTIA Security+ SY0-701 – 5.1

Policies are the foundation of our security processes and procedures. In this video, you’ll learn about information security policies, acceptable use policies, business continuity, and more. << Previous Video: Log Data Next Video: Security Standards >> One primary goal of every security administrator is to create Confidentiality, Integrity, and Availability, or what we often abbreviate

Security Policies – CompTIA Security+ SY0-701 – 5.1 Read More »

Log Data video title page

Log Data – CompTIA Security+ SY0-701 – 4.9

Log files can provide a comprehensive record of data flows, firewall dispositions, and many other important data points. In this video, you’ll learn about logs from firewalls, applications, endpoints, operating systems, and more. << Previous Video: Digital Forensics Next Video: Security Policies >> We store a massive amount of security related information in log files

Log Data – CompTIA Security+ SY0-701 – 4.9 Read More »

Digital Forensics video title page

Digital Forensics – CompTIA Security+ SY0-701 – 4.8

The data collection process is an important part of digital forensics. In this video, you’ll learn about legal hold, chain of custody, event reporting, e-discovery, and more. << Previous Video: Incident Planning Next Video: Log Data >> As security professionals, we are often responsible for collecting data when a security event occurs. This process of

Digital Forensics – CompTIA Security+ SY0-701 – 4.8 Read More »

Incident Planning video title page

Incident Planning – CompTIA Security+ SY0-701 – 4.8

The incident response process can be refined through the use of event planning. In this video, you’ll learn about tabletop exercises, simulations, root cause analysis, and more. << Previous Video: Incident Response Next Video: Digital Forensics >> Before an actual security event occurs, it’s always a good idea to perform some testing. This gives you

Incident Planning – CompTIA Security+ SY0-701 – 4.8 Read More »