CompTIA Security+ SY0-601

Infrastructure as Code – SY0-601 CompTIA Security+ : 2.2

An important characteristic of cloud computing is the ability to easily deploy perfectly configured application instances at any time. In this video, you’ll learn how infrastructure as code can be used to simplify and streamline the deployment of cloud-based application instances. << Previous Video: Designing the Cloud Next: Virtualization Security >>     In previous […]

Infrastructure as Code – SY0-601 CompTIA Security+ : 2.2 Read More »

Designing the Cloud – SY0-601 CompTIA Security+ : 2.2

Cloud technologies have added new capabilities to application deployments and modularized applications. In this video, you’ll learn about virtual machines, application containerization, microservices, serverless architectures, and more. << Previous Video: Edge and Fog Computing Next: Infrastructure as Code >>     The cloud has forever changed how we deploy applications. We can click a button

Designing the Cloud – SY0-601 CompTIA Security+ : 2.2 Read More »

Edge and Fog Computing – SY0-601 CompTIA Security+ : 2.2

An optimal cloud computing infrastructure will make strategic use of edge computing and fog computing. In this video, you’ll learn how edge and fog computing are used to create an efficient and effective cloud computing design. << Previous Video: Cloud Models Next: Designing the Cloud >>     Cloud computing has changed the way that

Edge and Fog Computing – SY0-601 CompTIA Security+ : 2.2 Read More »

Cloud Models – SY0-601 CompTIA Security+ : 2.2

A cloud-based infrastructure can take many different forms. In this video, you’ll learn about IaaS, SaaS, PaaS, cloud deployment models, and more. << Previous Video: Honeypots and Deception Next: Edge and Fog Computing >> If you’ve contracted with a cloud service provider to outsource your equipment, then you’re probably using the model of Infrastructure as

Cloud Models – SY0-601 CompTIA Security+ : 2.2 Read More »

Honeypots and Deception – SY0-601 CompTIA Security+ : 2.1

There is a constant battle taking place on your network between the attackers and your defensive front. In this video, you’ll learn about honeypots, honeynets, fake telemetry, and DNS sinkholes. << Previous Video: Site Resiliency Next: Cloud Models >> A honeypot is a system, or series of systems, that’s designed to look very attractive to

Honeypots and Deception – SY0-601 CompTIA Security+ : 2.1 Read More »

Managing Security – SY0-601 CompTIA Security+ : 2.1

There are various security requirements that need to be considered when managing an organization’s data. In this video, you’ll learn about geographical considerations, SSL inspection, hashing, and API security considerations. << Previous Video: Data Loss Prevention Next: Site Resiliency >>     We often think of our technology being in the cloud, or being at

Managing Security – SY0-601 CompTIA Security+ : 2.1 Read More »