Professor Messer

Development Life Cycle Models – CompTIA Security+ SY0-501 – 3.6

There are many different ways to build an application. In this video, you’ll learn about two of the most popular life cycle models for application development; waterfall and agile. << Previous Video: Embedded Systems Next: Secure DevOps >> The process of building an application is referred to as the systems development lifecycle, although you may […]

Development Life Cycle Models – CompTIA Security+ SY0-501 – 3.6 Read More »

Embedded Systems – CompTIA Security+ SY0-501 – 3.5

We use embedded operating systems every day, but we don’t always consider the underlying operation and complexities of these embedded technologies. In this video, you’ll learn about the security concerns associated with many different embedded systems. << Previous Video: Secure Deployments Next: Development Life-Cycle Models >> SCADA stands for Supervisory Control and Data Acquisition System.

Embedded Systems – CompTIA Security+ SY0-501 – 3.5 Read More »

Secure Deployments – CompTIA Security+ SY0-501 – 3.4

It’s a long road between development and production. In this video, you’ll learn about the deployment process and how to secure every step along the way. << Previous Video: Peripheral Security Next: Embedded Systems >> Here’s a common challenge in many organizations. You’ve got a development team that has been working for months programming a

Secure Deployments – CompTIA Security+ SY0-501 – 3.4 Read More »

Peripheral Security – CompTIA Security+ SY0-501 – 3.3

We not only need to maintain the security of our computers, we also have to be concerned about the devices that we connect to our computers. In this video, you’ll learn how to secure your displays, printers, storage devices, and other peripherals. << Previous Video: Operating System Security Next: Secure Deployments >> We don’t often

Peripheral Security – CompTIA Security+ SY0-501 – 3.3 Read More »

Operating System Security – CompTIA Security+ SY0-501 – 3.3

Maintaining the security of our operating systems is an ongoing necessity. In this video, you’ll learn about patch management, least functionality, application management, and other OS security requirements. << Previous Video: Hardware Security Next: Peripheral Security >> When securing operating systems, there are some broad categorizations that you can consider when you’re planning your security

Operating System Security – CompTIA Security+ SY0-501 – 3.3 Read More »

Professor Messer’s CompTIA A+ Study Group – December 2017

Professor Messer’s A+ Core 1 Course Notes: Click here to learn about my Core 1 and Core 2 A+ downloadable PDF Course Notes. Professor Messer’s 220-1001 Core 1 A+ Practice Exams: Are you ready for your 220-1001 exam? Click here to learn about my 220-1001 Core 1 A+ Practice Exams. CompTIA Exam Objectives – http://www.professormesser.com/objectives/

Professor Messer’s CompTIA A+ Study Group – December 2017 Read More »

Hardware Security – CompTIA Security+ SY0-501 – 3.3

We rely on many different hardware components to keep our networks secure. In this video, you’ll learn how these hardware devices work together to provide the highest levels of security. << Previous Video: Securing SDN Next: Operating System Security >> If you’re concerned about protecting the data that’s on your storage devices, then you probably

Hardware Security – CompTIA Security+ SY0-501 – 3.3 Read More »

Securing SDN – CompTIA Security+ SY0-501 – 3.2

Software-defined networking combines traditional network design with automated and flexible deployment. In this video, you’ll learn about SDN and how security professionals can integrate their security strategy in an SDN environment. << Previous Video: Security Technology Placement Next: Hardware Security >> Imagine being able to build a networking infrastructure by simply clicking a few buttons,

Securing SDN – CompTIA Security+ SY0-501 – 3.2 Read More »

Security Technology Placement – CompTIA Security+ SY0-501 – 3.2

Now that you’ve acquired your security technology, you’ll need somewhere to place it in your network. In this video, you’ll learn about some of the best practices for placing sensors, firewalls, SSL concentrators, and other security technologies. << Previous Video: VPN Technologies Next: Securing SDN >> Most networking and security professionals will have sensors and

Security Technology Placement – CompTIA Security+ SY0-501 – 3.2 Read More »

VPN Technologies – CompTIA Security+ SY0-501 – 3.2

There are many different ways to design a VPN solution. In this video, you’ll learn about the most common ways to implement VPN technologies on your network. << Previous Video: Network Segmentation Next: Security Technology Placement >> There’s many different ways to connect a virtual private network together. And in many environments, they’re using multiple

VPN Technologies – CompTIA Security+ SY0-501 – 3.2 Read More »