SY0-701 Videos

Operating System Security video title page

Operating System Security – CompTIA Security+ SY0-701 – 4.5

Operating systems are important resources to secure. In this video, you’ll learn about Active Directory, Group Policy, and Security-Enhanced Linux (SELinux). << Previous Video: Web Filtering Next Video: Secure Protocols >> If you’re working in an environment with many Windows devices, then you’re probably taking advantage of Active Directory. Active Directory is a database containing […]

Operating System Security – CompTIA Security+ SY0-701 – 4.5 Read More »

Web Filtering video title page

Web Filtering – CompTIA Security+ SY0-701 – 4.5

Many filtering methods are available to protect against attacks. In this video, you’ll learn about content filtering, URL scanning, proxies, DNS filtering, and more. << Previous Video: Firewalls Next Video: Operating System Security >> Many organizations have a firewall that provides them a way to allow or disallow access from certain applications. But what if

Web Filtering – CompTIA Security+ SY0-701 – 4.5 Read More »

Firewalls video title page

Firewalls – CompTIA Security+ SY0-701 – 4.5

Firewalls are an important part of any security protection strategy. In this video, you’ll learn about next-generation firewalls, firewall rules, screen subnets, and more. << Previous Video: Security Tools Next Video: Web Filtering >> A network-based firewall is an appliance that sits inline in your network and makes decisions about whether traffic should be allowed

Firewalls – CompTIA Security+ SY0-701 – 4.5 Read More »

Security Tools video title page

Security Tools – CompTIA Security+ SY0-701 – 4.4

Security administrators have many tools to help protect network resources. In this video, you’ll learn about Security Content Automation Protocol (SCAP), secure baselines, SIEMs, and more. << Previous Video: Security Monitoring Next Video: Firewalls >> On your enterprise network, there are probably many different security tools. You might have next generation firewalls, intrusion prevention systems,

Security Tools – CompTIA Security+ SY0-701 – 4.4 Read More »

Security Monitoring video title page

Security Monitoring – CompTIA Security+ SY0-701 – 4.4

There are many methods for monitoring and reacting to security events. In this video, you’ll learn about log aggregation, scanning, reporting, alerting, and more. << Previous Video: Vulnerability Remediation Next Video: Security Tools >> Attackers are constantly trying to gain access to our systems and services. So for that reason, we also have to constantly

Security Monitoring – CompTIA Security+ SY0-701 – 4.4 Read More »

Vulnerability Remediation video title page

Vulnerability Remediation – CompTIA Security+ SY0-701 – 4.3

Once a vulnerability is identified, a security professional is required to mitigate the issue. In this video, you’ll learn about patching, insurance, segmentation, compensating controls, and more. << Previous Video: Analyzing Vulnerabilities Next Video: Security Monitoring >> In the vast majority of cases where a vulnerability has been identified, it can easily be mitigated by

Vulnerability Remediation – CompTIA Security+ SY0-701 – 4.3 Read More »

Analyzing Vulnerabilities video title page

Analyzing Vulnerabilities – CompTIA Security+ SY0-701 – 4.3

Identifying and analyzing vulnerabilities can be a relatively complex process. In this video, you’ll learn about vulnerability databases, classification, exposure factor, risk tolerance, and more. << Previous Video: Penetration Testing Next Video: Vulnerability Remediation >> One of the challenges when looking through log files or receiving reports of vulnerability scans is that you’ll often have

Analyzing Vulnerabilities – CompTIA Security+ SY0-701 – 4.3 Read More »

Penetration Testing video title page

Penetration Testing – CompTIA Security+ SY0-701 – 4.3

Penetration tests can simulate an attack to exploit vulnerabilities. In this video, you’ll learn about rules of engagement, the exploitation process, responsible disclosure programs, and more. << Previous Video: Threat Intelligence Next Video: Analyzing Vulnerabilities >> Penetration testing or pen testing is a process where we simulate an attack on our own systems. This is

Penetration Testing – CompTIA Security+ SY0-701 – 4.3 Read More »

Threat Intelligence video title page

Threat Intelligence – CompTIA Security+ SY0-701 – 4.3

To identify threats, we first must know the threats exist. In this video, you’ll learn about threat intelligence gathering techniques such as OSINT, third-parties, information sharing, the dark web, and more. << Previous Video: Vulnerability Scanning Next Video: Penetration Testing >> As an IT security professional, you’ll be expected to always keep up to date

Threat Intelligence – CompTIA Security+ SY0-701 – 4.3 Read More »

Vulnerability Scanning video title page

Vulnerability Scanning – CompTIA Security+ SY0-701 – 4.3

Security researchers may use many techniques to identify vulnerabilities on a system or in software. In this video, you’ll learn about vulnerability scans, static code analyzers, and fuzzing. << Previous Video: Asset Management Next Video: Threat Intelligence >> Vulnerability scans are used to determine if a system may be susceptible to a type of attack.

Vulnerability Scanning – CompTIA Security+ SY0-701 – 4.3 Read More »