CompTIA Security+ SY0-601

Configuration Management – SY0-601 CompTIA Security+ : 2.1

Documentation and configuration management can be a life saver when things go wrong. In this video, you’ll learn about network diagrams, baseline configurations, standard naming conventions, and more. << Previous Video: Security Teams Next: Protecting Data >>     One of the challenges with information technology is keeping up with all of the changes that …

Configuration Management – SY0-601 CompTIA Security+ : 2.1 Read More »

Reconnaissance – SY0-601 CompTIA Security+ : 1.8

Before performing a penetration test, it’s often useful to gather information about the intended target. In this video, you’ll learn about reconnaissance methods used for passive footprinting and active footprinting. << Previous Video: Penetration Testing Next: Security Teams >> Before you perform a penetration test, it’s always good to gather information about the systems that …

Reconnaissance – SY0-601 CompTIA Security+ : 1.8 Read More »

Penetration Testing – SY0-601 CompTIA Security+ : 1.8

The process of exploiting a vulnerability in a controlled environment is a penetration test. In this video, you’ll learn about pentesting, rules of engagement, exploiting vulnerabilities, and more. << Previous Video: Security Information and Event Management Next: Reconnaissance >>     If you’re performing a penetration test, then you are actively trying to gain access …

Penetration Testing – SY0-601 CompTIA Security+ : 1.8 Read More »

Security Information and Event Management – SY0-601 CompTIA Security+ : 1.7

If you are monitoring the security of your network, then you are almost certainly using a SIEM. In this video, you’ll learn about SEIMs, using syslog, and the fundamentals of SOAR. << Previous Video: Vulnerability Scans Next: Penetration Testing >> To be able to manage the massive amount of information you receive from log files …

Security Information and Event Management – SY0-601 CompTIA Security+ : 1.7 Read More »

Vulnerability Scans – SY0-601 CompTIA Security+ : 1.7

It’s important to find vulnerabilities in your network before the attackers. In this video, you’ll learn about vulnerability scans, false positives, credentialed scans, and more. << Previous Video: Threat Hunting Next: Security Information and Event Management >> If you’re working in IT security you are undoubtedly going to be performing some vulnerability scans. These scans …

Vulnerability Scans – SY0-601 CompTIA Security+ : 1.7 Read More »

Vulnerability Impacts – SY0-601 CompTIA Security+ : 1.6

Vulnerabilities can have an effect on many parts of an organization. In this video, you’ll learn about data loss, identity theft, financial loss, reputation impacts, and availability loss. << Previous Video: Third-party Risks Next: Threat Hunting >> In February of 2018, the United States Council of Economic Advisors produced a report called The Cost of …

Vulnerability Impacts – SY0-601 CompTIA Security+ : 1.6 Read More »

Third-party Risks – SY0-601 CompTIA Security+ : 1.6

Interacting with third-parties adds additional security concerns. In this video, you’ll learn about system integration risk, lack of vendor support, supply chain risk, outsourced code development, and data storage risks. << Previous Video: Vulnerability Types Next: Vulnerability Impacts >>     No matter the size of your organization, there will be some type of third …

Third-party Risks – SY0-601 CompTIA Security+ : 1.6 Read More »