CompTIA Security+ SY0-601

Privacy and Data Breaches – SY0-601 CompTIA Security+ : 5.5

Data privacy is a significant concern for organizations. In this video, you’ll learn about the information life cycle, breach consequences, notification requirements, and more. << Previous Video: Business Impact Analysis Next: Data Classifications >> If you’re going to protect data, it’s important to understand the entire lifecycle of information. We start with the creation and […]

Privacy and Data Breaches – SY0-601 CompTIA Security+ : 5.5 Read More »

Business Impact Analysis – SY0-601 CompTIA Security+ : 5.4

Performing a risk analysis can assist in understanding recovery options, single points of failure, and the impact on the organization. In this video, you’ll learn about functional recovery plans, redundancy, disaster recovery plans, and more. << Previous Video: Risk Analysis Next: Privacy and Data Breaches >> Nobody likes downtime to impact the business, but it’s

Business Impact Analysis – SY0-601 CompTIA Security+ : 5.4 Read More »

Risk Management Types – SY0-601 CompTIA Security+ : 5.4

Every organization participates in some type of risk management. In this video, you’ll learn about risk assessment, multi-party risk, and risk management strategies. << Previous Video: Organizational Policies Next: Risk Analysis >> If you’re assessing risk in your organization, then you need to identify all of the assets that could be affected by some type

Risk Management Types – SY0-601 CompTIA Security+ : 5.4 Read More »

Organizational Policies – SY0-601 CompTIA Security+ : 5.3

Change is a challenging by-product of information technology. In this video, you’ll learn about the change control process and how asset management can assist with the security of user data and devices. << Previous Video: Credential Policies Next: Risk Management Types >> [MUSIC PLAYING] The one constant in it is that there’s always change. There

Organizational Policies – SY0-601 CompTIA Security+ : 5.3 Read More »

Credential Policies – SY0-601 CompTIA Security+ : 5.3

It’s important to match credentials to the task at hand. In this video, you’ll learn about differences between accounts used by personnel, third-parties, devices, services, and administrators. << Previous Video: Managing Data Next: Organizational Policies >> The credential management process we use with our usernames, passwords, and other credentials is a critical part of our

Credential Policies – SY0-601 CompTIA Security+ : 5.3 Read More »

Managing Data – SY0-601 CompTIA Security+ : 5.3

Managing an organization’s data is often one of the most challenging aspects of IT security. In this video, you’ll learn about data governance, data classifications, and data retention policies. << Previous Video: Third-party Risk Management Next: Credential Policies >> If your organization is collecting data, then there needs to be a set of processes and

Managing Data – SY0-601 CompTIA Security+ : 5.3 Read More »

Third-party Risk Management – SY0-601 CompTIA Security+ : 5.3

Security risks are everywhere, including with third-parties. In this video, you’ll learn about risks associated with vendors, the supply chain, business partners, and more. << Previous Video: Personnel Security Next: Managing Data >> If you are part of a company, then you’re certainly going to be working with some third party vendors. These could be

Third-party Risk Management – SY0-601 CompTIA Security+ : 5.3 Read More »

Personnel Security – SY0-601 CompTIA Security+ : 5.3

There are many security policies required to protect employee data. In this video, you’ll learn about acceptable use policies, least privilege, background checks, user training, and more. << Previous Video: Secure Configurations Next: Third-party Risk Management >> Most organizations will have a documented set of rules called an Acceptable Use Policy, or an AUP. This

Personnel Security – SY0-601 CompTIA Security+ : 5.3 Read More »

Security Configurations – SY0-601 CompTIA Security+ : 5.2

The default configuration of a system is rarely the most secure. In this video, you’ll learn about secure configurations for web servers, operating systems, application servers, and network infrastructure devices. << Previous Video: Security Frameworks Next: Personnel Security >> If you’ve installed a server, an operating system, or some other device, the default configuration is

Security Configurations – SY0-601 CompTIA Security+ : 5.2 Read More »