SY0-601 Videos

Shell and Script Environments – SY0-601 CompTIA Security+ : 4.1

There are many options when working with shells and scripting environments. In this video, you’ll learn about SSH, Windows PowerShell, Python, and OpenSSL. << Previous Video: File Manipulation Tools Next: Packet Tools >> If you’re connecting to a remote device and using the terminal screen on that device, looks a little like this example here, …

Shell and Script Environments – SY0-601 CompTIA Security+ : 4.1 Read More »

Reconnaissance Tools – Part 2 – SY0-601 CompTIA Security+ : 4.1

Third-party reconnaissance tools can provide extensive information about users, networks, and devices. In this video, you’ll learn about hping, Nmap, theHarvester, sn1per, scanless, and more. << Previous Video: Reconnaissance Tools – Part 1 Next: File Manipulation Tools >> In this video, we’ll look at some reconnaissance tools that may require you to install some additional …

Reconnaissance Tools – Part 2 – SY0-601 CompTIA Security+ : 4.1 Read More »

Reconnaissance Tools – Part 1 – SY0-601 CompTIA Security+ : 4.1

There are many reconnaissance tools that may be built-into your operating system. In this video, you’ll learn about traceroute, nslookup, ping, pathping, netstat, and more. << Previous Video: Certificate Concepts Next: Reconnaissance Tools – Part 2 >> The traceroute command allows you to map an entire path between two devices to know exactly what routers …

Reconnaissance Tools – Part 1 – SY0-601 CompTIA Security+ : 4.1 Read More »

Certificate Concepts – SY0-601 CompTIA Security+ : 3.9

Certificate management is an important part of a PKI. In this video, you’ll learn about offline CAs, OCSP stapling, certification pinning, trust relationships, certificate chaining, and more. << Previous Video: Certificate Formats Next: Reconnaissance Tools – Part 1 >> If you’re managing a certificate authority, one of the things you do not want to have …

Certificate Concepts – SY0-601 CompTIA Security+ : 3.9 Read More »

Certificates – SY0-601 CompTIA Security+ : 3.9

We use digital certificates extensively for servers, users, and software. In this video, you’ll learn about using certificates for web servers, code signing, machines, email, and more. << Previous Video: Public Key Infrastructure Next: Certificate Formats >> In previous videos we talked a lot about what’s inside of a certificate but we haven’t talked about …

Certificates – SY0-601 CompTIA Security+ : 3.9 Read More »

Public Key Infrastructure – SY0-601 CompTIA Security+ : 3.9

It takes many different components to build a successful PKI. In this video, you’ll learn about the key management lifecycle, digital certificates, certificate authorities, and more. << Previous Video: Access Control Next: Certificates >> PKI or Public Key Infrastructure, is the process of managing practically every aspect of digital certificates. This covers the policies and …

Public Key Infrastructure – SY0-601 CompTIA Security+ : 3.9 Read More »

Access Control – SY0-601 CompTIA Security+ : 3.8

Access control is a fundamental aspect of IT security. In this video, you’ll learn about mandatory, discretionary, role-based, attribute-based, and rule-based access control. << Previous Video: Federated Identities Next: Public Key Infrastructure >> Once a user gains access to a service, we now need to determine what type of resources does that user have access …

Access Control – SY0-601 CompTIA Security+ : 3.8 Read More »