CompTIA Security+ SY0-601

Multi-factor Authentication – SY0-601 CompTIA Security+ : 2.4

We use many different factors during the authentication process. In this video, you’ll learn about the AAA framework, multi-factor authentication factors, and multi-factor authentication attributes. << Previous Video: Biometrics Next: Disk Redundancy >>     We’re all familiar with the process of authenticating into a system. Usually you use a username, a password, and perhaps …

Multi-factor Authentication – SY0-601 CompTIA Security+ : 2.4 Read More »

Biometrics – SY0-601 CompTIA Security+ : 2.4

There are many ways to authenticate someone based on a biometric feature. In this video, you’ll learn about fingerprint scanners, retinal scanners, voice recognition, and more. << Previous Video: Authentication Methods Next: Multi-factor Authentication >> A biometric authentication factor refers to something you are, this would be something like a fingerprint. For example, fingerprint scanners …

Biometrics – SY0-601 CompTIA Security+ : 2.4 Read More »

Authentication Methods – SY0-601 CompTIA Security+ : 2.4

We use many different technologies during the authentication process. In this video, you’ll learn about directory services, federation, attestation, and more. << Previous Video: Automation and Scripting Next: Biometrics >>     Many operating systems will use a feature known as directory services. This is a central database that stores usernames, passwords, computers, printers, and …

Authentication Methods – SY0-601 CompTIA Security+ : 2.4 Read More »

Automation and Scripting – SY0-601 CompTIA Security+ : 2.3

One challenge for any developer is the process of creating and publishing application updates. In this video, you’ll learn about continuous integration, continuous delivery, and continuous deployment. << Previous Video: Software Diversity Next: Authentication Methods >>     The application development process is a constantly moving and constantly changing process. And it becomes important to …

Automation and Scripting – SY0-601 CompTIA Security+ : 2.3 Read More »

Software Diversity – SY0-601 CompTIA Security+ : 2.3

One way to minimize the attack surface is to use different application binaries to perform the same task. In this video, you’ll learn about software diversity and some of the advantages and disadvantages of this security strategy. << Previous Video: Secure Coding Techniques Next: Automation and Scripting >>     Attackers are very good at …

Software Diversity – SY0-601 CompTIA Security+ : 2.3 Read More »

Secure Coding Techniques – SY0-601 CompTIA Security+ : 2.3

An application developer must use many different techniques to keep their code secure. In this video, you’ll learn about stored procedures, obfuscation, input validation, memory management, and more. << Previous Video: Provisioning and Deprovisioning Next: Software Diversity >>     Creating an application is always a balancing act between, how much time it takes to …

Secure Coding Techniques – SY0-601 CompTIA Security+ : 2.3 Read More »

Provisioning and Deprovisioning – SY0-601 CompTIA Security+ : 2.3

Cloud computing has put an updated focus on our approach to provisioning and deprovisioning applications. In this video, you’ll learn about scalability, elasticity, and orchestration of application instances. << Previous Video: Secure Deployments Next: Secure Coding Techniques >>     Provisioning is the process of making something available. If you are provisioning an application, then …

Provisioning and Deprovisioning – SY0-601 CompTIA Security+ : 2.3 Read More »

Secure Deployments – SY0-601 CompTIA Security+ : 2.3

The application development process can be a challenge to implement. In this video, you’ll learn how to securely create and deploy applications from the development process through production. << Previous Video: Virtualization Security Next: Provisioning and Deprovisoning >> If you’re an organization that does your own development work, there’s always a challenge in getting the …

Secure Deployments – SY0-601 CompTIA Security+ : 2.3 Read More »

Virtualization Security – SY0-601 CompTIA Security+ : 2.2

The security of our cloud-based systems is paramount. In this video, you’ll learn about the importance of VM sprawl avoidance and VM escape protection. << Previous Video: Infrastructure as Code Next: Secure Deployments >> One of the huge advantages that cloud computing brings is the ability to deploy a new set of application instances with …

Virtualization Security – SY0-601 CompTIA Security+ : 2.2 Read More »