CompTIA Security+ SY0-601

Securing Cloud Storage – SY0-601 CompTIA Security+ : 3.6

Additional security is important when storing information in the cloud. In this video, you’ll learn about permissions, encryption, and replication. << Previous Video: Cloud Security Controls Next: Securing Cloud Networks >> As security professionals, we have to manage applications that are running in the cloud. And of course, there will be user data that is …

Securing Cloud Storage – SY0-601 CompTIA Security+ : 3.6 Read More »

Cloud Security Controls – SY0-601 CompTIA Security+ : 3.6

The cloud introduces new security requirements for our enterprise networks. In this video, you’ll learn about HA across zones, resource policies, secrets management, and security auditing. << Previous Video: Mobile Deployment Models Next: Securing Cloud Storage >> One of the key aspects of IT security is maintaining the uptime and availability of our applications. For …

Cloud Security Controls – SY0-601 CompTIA Security+ : 3.6 Read More »

Mobile Deployment Models – SY0-601 CompTIA Security+ : 3.5

There are a number of different options available when deploying mobile devices. In this video, you’ll learn about BYOD, COPE, corporate-owned, and VDI/VMI deployments. << Previous Video: Mobile Device Enforcement Next: Cloud Security Controls >> The first type of mobile deployment we’ll discuss in this video is bring your own device you may see this …

Mobile Deployment Models – SY0-601 CompTIA Security+ : 3.5 Read More »

Mobile Device Enforcement – SY0-601 CompTIA Security+ : 3.5

A mobile device administrator uses many different enforcement options to keep the organization’s data safe. In this video, you’ll learn about rooting, carrier unlocking, firmware OTA upgrades, accessory use, and more. << Previous Video: Mobile Device Security Next: Mobile Deployment Models >> If you are an Apple iOS device, then you’re probably very aware of …

Mobile Device Enforcement – SY0-601 CompTIA Security+ : 3.5 Read More »

Mobile Device Security – SY0-601 CompTIA Security+ : 3.5

Security administrators use many different technologies to protect their mobile devices. In this video, you’ll learn about MicroSD HSMs, Unified Endpoint Management, Mobile Application Management, and SEAndroid. << Previous Video: Mobile Device Management Next: Mobile Device Enforcement >> A hardware security module is a physical device that provides cryptographic features for your computer. This can …

Mobile Device Security – SY0-601 CompTIA Security+ : 3.5 Read More »

Mobile Device Management – SY0-601 CompTIA Security+ : 3.5

Protecting an organization’s data on a mobile device is an ongoing challenge. In this video, you’ll learn about mobile device management, content management, geofencing, and more. << Previous Video: Mobile Networks Next: Mobile Device Security >> In many organizations, employees have mobile devices that they use to do their jobs. Those mobile devices can be …

Mobile Device Management – SY0-601 CompTIA Security+ : 3.5 Read More »

Mobile Networks – SY0-601 CompTIA Security+ : 3.5

A single smartphone can contain many different mobile network technologies. In this video, you’ll learn about Wi-Fi, Bluetooth, RFID, NFC, and much more. << Previous Video: Installing Wireless Networks Next: Mobile Device Management >> Some wireless networks provide a one-to-one connection between the two devices communicating on that network. You might use a point-to-point connection …

Mobile Networks – SY0-601 CompTIA Security+ : 3.5 Read More »

Installing Wireless Networks – SY0-601 CompTIA Security+ : 3.4

Installing a wireless network can be an involved process. In this video, you’ll learn about site surveys, channel selection, access point placement, and more. << Previous Video: Wireless Authentication Protocols Next: Mobile Networks >> Before installing a wireless network, it’s useful to know the environment that you’re installing this equipment in. So it’s common to …

Installing Wireless Networks – SY0-601 CompTIA Security+ : 3.4 Read More »

Wireless Authentication Protocols – SY0-601 CompTIA Security+ : 3.4

There are many options available when configuring wireless authentication. In this video, you’ll learn about EAP, EAP-FAST, PEAP, EAP-TLS, and more. << Previous Video: Wireless Authentication Methods Next: Installing Wireless Networks >> In a previous video, we talked about the need for authenticating to a wireless network. And of course, there are many different ways …

Wireless Authentication Protocols – SY0-601 CompTIA Security+ : 3.4 Read More »