There are many ways to permanently remove data from a storage device. In this video, you’ll learn about physical destruction, purging data, and data wiping.
We often focus on digital technologies to protect our networks, but there are many physical devices that can provide additional security. In this video, you’ll learn about access control vestibules, alarms, signs, industrial camouflage, and more. << Previous Video: Embedded Systems Constraints Next: Secure Areas >>
There are advantages and disadvantages when using embedded systems. In this video, you’ll learn about the limitations associated with power, networking, upgradability, patching, and more. << Previous Video: Embedded Systems Communication Next: Physical Security Controls >>
Embedded systems can use many different methods for communication. In this video, you’ll learn how embedded systems use 5G, narrowband, baseband, and Zigbee networks. << Previous Video: Embedded Systems Next: Embedded Systems Constraints >>
We are installing an increasing amount of embedded systems on our networks. In this video, you’ll learn about security concerns surrounding systems on a chip, field-programmable gate arrays, SCADA devices, IoT devices, and more. << Previous Video: Resiliency Next: Embedded Systems Communication >>
Professor Messer’s Security+ Course Notes: Have you watched my CompTIA Security+ videos, but you’d like to have all of the notes available in one place? With this detailed Security+ study guide, you can focus your study efforts and make your study time more efficient! Audio Replay:
There are many different strategies that should be used to maintain uptime and availability. In this video, you’ll learn about non-persistence, high availability, the order of restoration, and technological diversity. << Previous Video: Backup Types Next: Embedded Systems >>