Today’s SY0-601 CompTIA Security+ Pop Quiz: Maybe they need coffee
Today’s SY0-601 CompTIA Security+ Pop Quiz: Maybe they need coffee Read More »
Log files can provide a comprehensive record of data flows, firewall dispositions, and many other important data points. In this video, you’ll learn about logs from firewalls, applications, endpoints, operating systems, and more. << Previous Video: Digital Forensics Next Video: Security Policies >> We store a massive amount of security related information in log files
The data collection process is an important part of digital forensics. In this video, you’ll learn about legal hold, chain of custody, event reporting, e-discovery, and more. << Previous Video: Incident Planning Next Video: Log Data >> As security professionals, we are often responsible for collecting data when a security event occurs. This process of
Digital Forensics – CompTIA Security+ SY0-701 – 4.8 Read More »
The incident response process can be refined through the use of event planning. In this video, you’ll learn about tabletop exercises, simulations, root cause analysis, and more. << Previous Video: Incident Response Next Video: Digital Forensics >> Before an actual security event occurs, it’s always a good idea to perform some testing. This gives you
Incident Planning – CompTIA Security+ SY0-701 – 4.8 Read More »
When a security incident occurs, it’s important to properly address the incident. In this video, you’ll learn about preparation, isolation, recovery, and more. << Previous Video: Scripting and Automation Next Video: Incident Planning >> Understanding how to deal with security incidents are an important part of any security administrator’s job. Security incidents can involve many
Incident Response – CompTIA Security+ SY0-701 – 4.8 Read More »
Scripting enables automation, speed, and a more streamlined security posture. In this video, you’ll learn about automation benefits, cases for automation, and scripting consideration. << Previous Video: Password Security Next Video: Incident Response >> Scripting allows for the automation of functions that normally you would have to perform manually. This means, when situations occur, you
Scripting and Automation – CompTIA Security+ SY0-701 – 4.7 Read More »
There are many ways to increase the security of a password. In this video, you’ll learn about password complexity, password managers, passwordless authentication, and more. << Previous Video: Multifactor Authentication Next Video: Scripting and Automation >> When you’re choosing a password, you often see instructions on creating a password that will be difficult for someone
Password Security – CompTIA Security+ SY0-701 – 4.6 Read More »
A username and password can be enhanced through the use of multifactor authentication. In this video, you’ll learn about something you know, something you have, something you are, and somewhere you are. << Previous Video: Access Controls Next Video: Password Security >> When you log into a website, it’s very common to use a username
Multifactor Authentication – CompTIA Security+ SY0-701 – 4.6 Read More »
There are many different ways to provide authorization, rights, and permissions. In this video, you’ll learn about least privilege, access control types, time-of-day restrictions, and more. << Previous Video: Identity and Access Management Next Video: Multifactor Authentication >> Once someone authenticates to a network, we still need to provide them with access to the resources
Access Controls – CompTIA Security+ SY0-701 – 4.6 Read More »
An important aspect of security is to match the right permissions to the right people at the right time. In this video, you’ll learn about IAM (Identity and Access Management), account provisioning, permission assignments, single sign-on, and more. << Previous Video: Endpoint Security Next Video: Access Controls >> As you’re aware, we use applications on
Identity and Access Management – CompTIA Security+ SY0-701 – 4.6 Read More »