CompTIA Security+ SY0-301: 3.6 – Reporting
You can’t stop the bad guys if you can’t see them. In this video, you’ll learn how alarms, alerts, and trends can help you visualize your organization’s security.
You can’t stop the bad guys if you can’t see them. In this video, you’ll learn how alarms, alerts, and trends can help you visualize your organization’s security.
When do you detect, and when do you prevent? In this video, you’ll learn the advantages of cameras vs. guards and the differences between IDS and IPS strategies.
CompTIA Security+ SY0-301: 3.6 – Detection vs. Prevention Read More »
The security posture of your organization is an important security fundamental. In this video, you’ll learn about the importance of a security posture, continuous security monitoring, and remediation.
CompTIA Security+ SY0-301: 3.6 – Security Posture Read More »
Some fundamental physical port security best practices can help protect your network from unwanted systems. In this video, you’ll learn about MAC filtering, 802.1X features, and the importance of disabling unused ports.
CompTIA Security+ SY0-301: 3.6 – Physical Port Security Read More »
There are many different ways to make your computer more secure. In this video, you’ll learn about techniques like disabling unnecessary services, best practices for password protection, disabling unnecessary accounts, and more.
CompTIA Security+ SY0-301: 3.6 – Operating System Hardening Read More »
We not only must stop the bad guys from digitally entering our network, but we also have to stop them at the door of our building. In this video, you’ll learn about physical security, hardware locks, mantraps, video surveillance, and fencing.
CompTIA Security+ SY0-301: 3.6 – Physical Security Read More »
Your logs contain valuable information, if you know where to look. In this video, you’ll learn about log monitoring, the use of security baselines and thresholds, and the importance of securing your log information.
CompTIA Security+ SY0-301: 3.6 – Monitoring System Logs Read More »
The bad guys know that attachments and add-ons are some of the easiest ways to attack our computer systems. In this video, you’ll learn about malicious attachments and how some bad guys have used add-ons to take over our PCs.
CompTIA Security+ SY0-301: 3.5 – Malicious Add-ons and Attachments Read More »
Our browsers are very good at saving “cookies” of information to our hard drive, and these details can often be used against us. In this video, you’ll learn how session information saved in browser cookies can be easily manipulated in packet headers to gain unauthorized access to web applications.
CompTIA Security+ SY0-301: 3.5 – Cookies, Header Manipulation, and Session Hijacking Read More »
Are your applications susceptible to attack? In this video, you’ll learn about zero-day attacks and what happens when a zero-day attack is announced.
CompTIA Security+ SY0-301: 3.5 – Zero-day Attacks Read More »