SY0-601 Videos

Embedded Systems Constraints – SY0-601 CompTIA Security+ : 2.6

There are advantages and disadvantages when using embedded systems. In this video, you’ll learn about the limitations associated with power, networking, upgradability, patching, and more. << Previous Video: Embedded Systems Communication Next: Physical Security Controls >>   One of the challenges you have with embedded systems is they’re usually running on a device that is […]

Embedded Systems Constraints – SY0-601 CompTIA Security+ : 2.6 Read More »

Embedded Systems Communication – SY0-601 CompTIA Security+ : 2.6

Embedded systems can use many different methods for communication. In this video, you’ll learn how embedded systems use 5G, narrowband, baseband, and Zigbee networks. << Previous Video: Embedded Systems Next: Embedded Systems Constraints >>     With the increasing number of embedded systems that are being deployed, it’s important to know how these devices communicate

Embedded Systems Communication – SY0-601 CompTIA Security+ : 2.6 Read More »

Embedded Systems – SY0-601 CompTIA Security+ : 2.6

We are installing an increasing amount of embedded systems on our networks. In this video, you’ll learn about security concerns surrounding systems on a chip, field-programmable gate arrays, SCADA devices, IoT devices, and more. << Previous Video: Resiliency Next: Embedded Systems Communication >> An embedded system is a computer and software that has been built

Embedded Systems – SY0-601 CompTIA Security+ : 2.6 Read More »

Resiliency – SY0-601 CompTIA Security+ : 2.5

There are many different strategies that should be used to maintain uptime and availability. In this video, you’ll learn about non-persistence, high availability, the order of restoration, and technological diversity. << Previous Video: Backup Types Next: Embedded Systems >>     A cloud-based environment is constantly in motion. We are creating new application instances and

Resiliency – SY0-601 CompTIA Security+ : 2.5 Read More »

Replication – SY0-601 CompTIA Security+ : 2.5

Replication is a useful method of maintaining application and data availability. In this video, you’ll learn about SAN replication, VM replication, and a comparison of on premises and cloud redundancy. << Previous Video: Power Redundancy Next: Backup Types >> When we deploy an application instance, it’s very common that the computing engine that is able

Replication – SY0-601 CompTIA Security+ : 2.5 Read More »

Power Redundancy – SY0-601 CompTIA Security+ : 2.5

Maintaining a power source is an important part of any security strategy. In this video, you’ll learn about UPS systems, generators, dual-power supplies, and power distribution units. << Previous Video: Network Redundancy Next: Replication >> Perhaps the primary resource we need to be able to operate our computers, our laptops, and mobile devices is power.

Power Redundancy – SY0-601 CompTIA Security+ : 2.5 Read More »

Multi-factor Authentication – SY0-601 CompTIA Security+ : 2.4

We use many different factors during the authentication process. In this video, you’ll learn about the AAA framework, multi-factor authentication factors, and multi-factor authentication attributes. << Previous Video: Biometrics Next: Disk Redundancy >>     We’re all familiar with the process of authenticating into a system. Usually you use a username, a password, and perhaps

Multi-factor Authentication – SY0-601 CompTIA Security+ : 2.4 Read More »