SY0-601 Videos

Biometrics – SY0-601 CompTIA Security+ : 2.4

There are many ways to authenticate someone based on a biometric feature. In this video, you’ll learn about fingerprint scanners, retinal scanners, voice recognition, and more. << Previous Video: Authentication Methods Next: Multi-factor Authentication >> A biometric authentication factor refers to something you are, this would be something like a fingerprint. For example, fingerprint scanners …

Biometrics – SY0-601 CompTIA Security+ : 2.4 Read More »

Authentication Methods – SY0-601 CompTIA Security+ : 2.4

We use many different technologies during the authentication process. In this video, you’ll learn about directory services, federation, attestation, and more. << Previous Video: Automation and Scripting Next: Biometrics >>     Many operating systems will use a feature known as directory services. This is a central database that stores usernames, passwords, computers, printers, and …

Authentication Methods – SY0-601 CompTIA Security+ : 2.4 Read More »

Automation and Scripting – SY0-601 CompTIA Security+ : 2.3

One challenge for any developer is the process of creating and publishing application updates. In this video, you’ll learn about continuous integration, continuous delivery, and continuous deployment. << Previous Video: Software Diversity Next: Authentication Methods >>     The application development process is a constantly moving and constantly changing process. And it becomes important to …

Automation and Scripting – SY0-601 CompTIA Security+ : 2.3 Read More »

Software Diversity – SY0-601 CompTIA Security+ : 2.3

One way to minimize the attack surface is to use different application binaries to perform the same task. In this video, you’ll learn about software diversity and some of the advantages and disadvantages of this security strategy. << Previous Video: Secure Coding Techniques Next: Automation and Scripting >>     Attackers are very good at …

Software Diversity – SY0-601 CompTIA Security+ : 2.3 Read More »

Secure Coding Techniques – SY0-601 CompTIA Security+ : 2.3

An application developer must use many different techniques to keep their code secure. In this video, you’ll learn about stored procedures, obfuscation, input validation, memory management, and more. << Previous Video: Provisioning and Deprovisioning Next: Software Diversity >>     Creating an application is always a balancing act between, how much time it takes to …

Secure Coding Techniques – SY0-601 CompTIA Security+ : 2.3 Read More »

Provisioning and Deprovisioning – SY0-601 CompTIA Security+ : 2.3

Cloud computing has put an updated focus on our approach to provisioning and deprovisioning applications. In this video, you’ll learn about scalability, elasticity, and orchestration of application instances. << Previous Video: Secure Deployments Next: Secure Coding Techniques >>     Provisioning is the process of making something available. If you are provisioning an application, then …

Provisioning and Deprovisioning – SY0-601 CompTIA Security+ : 2.3 Read More »

Secure Deployments – SY0-601 CompTIA Security+ : 2.3

The application development process can be a challenge to implement. In this video, you’ll learn how to securely create and deploy applications from the development process through production. << Previous Video: Virtualization Security Next: Provisioning and Deprovisoning >> If you’re an organization that does your own development work, there’s always a challenge in getting the …

Secure Deployments – SY0-601 CompTIA Security+ : 2.3 Read More »

Virtualization Security – SY0-601 CompTIA Security+ : 2.2

The security of our cloud-based systems is paramount. In this video, you’ll learn about the importance of VM sprawl avoidance and VM escape protection. << Previous Video: Infrastructure as Code Next: Secure Deployments >> One of the huge advantages that cloud computing brings is the ability to deploy a new set of application instances with …

Virtualization Security – SY0-601 CompTIA Security+ : 2.2 Read More »

Infrastructure as Code – SY0-601 CompTIA Security+ : 2.2

An important characteristic of cloud computing is the ability to easily deploy perfectly configured application instances at any time. In this video, you’ll learn how infrastructure as code can be used to simplify and streamline the deployment of cloud-based application instances. << Previous Video: Designing the Cloud Next: Virtualization Security >>     In previous …

Infrastructure as Code – SY0-601 CompTIA Security+ : 2.2 Read More »

Designing the Cloud – SY0-601 CompTIA Security+ : 2.2

Cloud technologies have added new capabilities to application deployments and modularized applications. In this video, you’ll learn about virtual machines, application containerization, microservices, serverless architectures, and more. << Previous Video: Edge and Fog Computing Next: Infrastructure as Code >>     The cloud has forever changed how we deploy applications. We can click a button …

Designing the Cloud – SY0-601 CompTIA Security+ : 2.2 Read More »