Professor Messer

Load Balancing – SY0-601 CompTIA Security+ : 3.3

Load balancers provides many options for keeping services available and efficient. In this video, you’ll learn about load balancing, scheduling, affinity, and active/passive load balancing. << Previous Video: Application Hardening Next: Network Segmentation >> If you’re watching this video on the Professor Messer website, then you are taking advantage of load-balancing technology. Load balancing is […]

Load Balancing – SY0-601 CompTIA Security+ : 3.3 Read More »

Professor Messer’s 220-1001 CompTIA A+ Study Group – April 2021

Professor Messer’s CompTIA A+ Core 1 Course Notes: Click here to learn about my Core 1 and Core 2 A+ downloadable PDF Course Notes. Professor Messer’s 220-1001 Core 1 A+ Practice Exams: Are you ready for your 220-1001 exam? Click here to learn about my 220-1001 Core 1 A+ Practice Exams. How well do you

Professor Messer’s 220-1001 CompTIA A+ Study Group – April 2021 Read More »

Application Hardening – SY0-601 CompTIA Security+ : 3.2

There are some best practices to use when managing the security of applications. In this video, you’ll learn how to harden application through the use of port filters, registry settings, disk encryption, patch management, and more. << Previous Video: Application Security Next: Load Balancing >> As a security professional, there are a number of techniques

Application Hardening – SY0-601 CompTIA Security+ : 3.2 Read More »

Application Security – SY0-601 CompTIA Security+ : 3.2

Application development use a number of different techniques to keep our applications secure. In this video, you’ll learn about input validation, fuzzing, secure cookies, code signing, and more. << Previous Video: Database Security Next: Application Hardening >> As security professionals, we’re tasked with making sure that our applications and operating systems are always updated to

Application Security – SY0-601 CompTIA Security+ : 3.2 Read More »

Boot Integrity – SY0-601 CompTIA Security+ : 3.2

It’s important to secure the boot process to prevent the installation of malicious software. In this video, you’ll learn about hardware root of trust, secure boot, trusted boot, and measured boot. << Previous Video: Endpoint Protection Next: Database Security >> One consistent aspect of IT security is that the attackers are constantly going after our

Boot Integrity – SY0-601 CompTIA Security+ : 3.2 Read More »

Endpoint Protection – SY0-601 CompTIA Security+ : 3.2

We use many different techniques to keep our endpoint devices safe. In this video, you’ll learn about anti-malware, EDR, data loss prevention, host-based firewalls, and more. << Previous Video: Secure Protocols Next: Boot Integrity >> We’re keeping an increasing amount of sensitive information on our computing devices and we’re using different kinds of computing devices.

Endpoint Protection – SY0-601 CompTIA Security+ : 3.2 Read More »

Cryptography Limitations – SY0-601 CompTIA Security+ : 2.8

Although cryptography provides significant functionality, it’s not without tradeoffs. In this video, you’ll learn the use and limitations of using cryptography technology in practical use. << Previous Video: Cryptography Use Cases Next: Secure Protocols >> Although cryptography provides us with a number of very powerful capabilities, there are still limitations into how we use cryptography.

Cryptography Limitations – SY0-601 CompTIA Security+ : 2.8 Read More »