CompTIA Security+ SY0-601

Infrastructure as Code – SY0-601 CompTIA Security+ : 2.2

An important characteristic of cloud computing is the ability to easily deploy perfectly configured application instances at any time. In this video, you’ll learn how infrastructure as code can be used to simplify and streamline the deployment of cloud-based application instances. << Previous Video: Designing the Cloud Next: Virtualization Security >>     In previous …

Infrastructure as Code – SY0-601 CompTIA Security+ : 2.2 Read More »

Designing the Cloud – SY0-601 CompTIA Security+ : 2.2

Cloud technologies have added new capabilities to application deployments and modularized applications. In this video, you’ll learn about virtual machines, application containerization, microservices, serverless architectures, and more. << Previous Video: Edge and Fog Computing Next: Infrastructure as Code >>     The cloud has forever changed how we deploy applications. We can click a button …

Designing the Cloud – SY0-601 CompTIA Security+ : 2.2 Read More »

Edge and Fog Computing – SY0-601 CompTIA Security+ : 2.2

An optimal cloud computing infrastructure will make strategic use of edge computing and fog computing. In this video, you’ll learn how edge and fog computing are used to create an efficient and effective cloud computing design. << Previous Video: Cloud Models Next: Designing the Cloud >>     Cloud computing has changed the way that …

Edge and Fog Computing – SY0-601 CompTIA Security+ : 2.2 Read More »

Cloud Models – SY0-601 CompTIA Security+ : 2.2

A cloud-based infrastructure can take many different forms. In this video, you’ll learn about IaaS, SaaS, PaaS, cloud deployment models, and more. << Previous Video: Honeypots and Deception Next: Edge and Fog Computing >> If you’ve contracted with a cloud service provider to outsource your equipment, then you’re probably using the model of Infrastructure as …

Cloud Models – SY0-601 CompTIA Security+ : 2.2 Read More »

Honeypots and Deception – SY0-601 CompTIA Security+ : 2.1

There is a constant battle taking place on your network between the attackers and your defensive front. In this video, you’ll learn about honeypots, honeynets, fake telemetry, and DNS sinkholes. << Previous Video: Site Resiliency Next: Cloud Models >> A honeypot is a system, or series of systems, that’s designed to look very attractive to …

Honeypots and Deception – SY0-601 CompTIA Security+ : 2.1 Read More »

Site Resiliency – SY0-601 CompTIA Security+ : 2.1

Maintaining uptime and availability during a disaster is often the primary objective of the IT team. In this video, you’ll learn about hot sites, cold sites, and warm sites. << Previous Video: Managing Security Next: Honeypots and Deception >>     If you’ve gone through the process of creating a disaster recovery plan, then you …

Site Resiliency – SY0-601 CompTIA Security+ : 2.1 Read More »

Managing Security – SY0-601 CompTIA Security+ : 2.1

There are various security requirements that need to be considered when managing an organization’s data. In this video, you’ll learn about geographical considerations, SSL inspection, hashing, and API security considerations. << Previous Video: Data Loss Prevention Next: Site Resiliency >>     We often think of our technology being in the cloud, or being at …

Managing Security – SY0-601 CompTIA Security+ : 2.1 Read More »

Data Loss Prevention – SY0-601 CompTIA Security+ : 2.1

Data loss prevention can help protect sensitive data from unauthorized use. In this video, you’ll learn about DLP, USB blocking, cloud-based DLP, and DLP in email systems. << Previous Video: Protecting Data Next: Managing Security >>     We maintain and collect a lot of different types of data on our networks. We could keep …

Data Loss Prevention – SY0-601 CompTIA Security+ : 2.1 Read More »

Protecting Data – SY0-601 CompTIA Security+ : 2.1

There are many different ways to protect our application data. In this video, you’ll learn about data sovereignty, data masking, encryption, tokenization, and more. << Previous Video: Configuration Management Next: Data Loss Prevention >> An organization’s data is one of the most important assets they have, so it’s up to you as an IT security …

Protecting Data – SY0-601 CompTIA Security+ : 2.1 Read More »