SY0-601 Videos

Edge and Fog Computing – SY0-601 CompTIA Security+ : 2.2

An optimal cloud computing infrastructure will make strategic use of edge computing and fog computing. In this video, you’ll learn how edge and fog computing are used to create an efficient and effective cloud computing design. << Previous Video: Cloud Models Next: Designing the Cloud >>     Cloud computing has changed the way that …

Edge and Fog Computing – SY0-601 CompTIA Security+ : 2.2 Read More »

Cloud Models – SY0-601 CompTIA Security+ : 2.2

A cloud-based infrastructure can take many different forms. In this video, you’ll learn about IaaS, SaaS, PaaS, cloud deployment models, and more. << Previous Video: Honeypots and Deception Next: Edge and Fog Computing >> If you’ve contracted with a cloud service provider to outsource your equipment, then you’re probably using the model of Infrastructure as …

Cloud Models – SY0-601 CompTIA Security+ : 2.2 Read More »

Honeypots and Deception – SY0-601 CompTIA Security+ : 2.1

There is a constant battle taking place on your network between the attackers and your defensive front. In this video, you’ll learn about honeypots, honeynets, fake telemetry, and DNS sinkholes. << Previous Video: Site Resiliency Next: Cloud Models >> A honeypot is a system, or series of systems, that’s designed to look very attractive to …

Honeypots and Deception – SY0-601 CompTIA Security+ : 2.1 Read More »

Managing Security – SY0-601 CompTIA Security+ : 2.1

There are various security requirements that need to be considered when managing an organization’s data. In this video, you’ll learn about geographical considerations, SSL inspection, hashing, and API security considerations. << Previous Video: Data Loss Prevention Next: Site Resiliency >>     We often think of our technology being in the cloud, or being at …

Managing Security – SY0-601 CompTIA Security+ : 2.1 Read More »

Protecting Data – SY0-601 CompTIA Security+ : 2.1

There are many different ways to protect our application data. In this video, you’ll learn about data sovereignty, data masking, encryption, tokenization, and more. << Previous Video: Configuration Management Next: Data Loss Prevention >> An organization’s data is one of the most important assets they have, so it’s up to you as an IT security …

Protecting Data – SY0-601 CompTIA Security+ : 2.1 Read More »

Configuration Management – SY0-601 CompTIA Security+ : 2.1

Documentation and configuration management can be a life saver when things go wrong. In this video, you’ll learn about network diagrams, baseline configurations, standard naming conventions, and more. << Previous Video: Security Teams Next: Protecting Data >>     One of the challenges with information technology is keeping up with all of the changes that …

Configuration Management – SY0-601 CompTIA Security+ : 2.1 Read More »

Reconnaissance – SY0-601 CompTIA Security+ : 1.8

Before performing a penetration test, it’s often useful to gather information about the intended target. In this video, you’ll learn about reconnaissance methods used for passive footprinting and active footprinting. << Previous Video: Penetration Testing Next: Security Teams >> Before you perform a penetration test, it’s always good to gather information about the systems that …

Reconnaissance – SY0-601 CompTIA Security+ : 1.8 Read More »