SY0-601 Videos

Federated Identities – SY0-601 CompTIA Security+ : 3.8

Instead of maintaining your own authentication database, you might use one from a third-party. In this video, you’ll learn about federation, SAML, OpenID Connect, and OAuth. << Previous Video: Identity and Access Services Next: Access Control >> Federation is a way that you could provide access to your network using credentials that someone uses for …

Federated Identities – SY0-601 CompTIA Security+ : 3.8 Read More »

Identity and Access Services – SY0-601 CompTIA Security+ : 3.8

As a security professional, you’ll need to use different authentication methods in different situations. In this video, you’ll learn about authentication using RADIUS, TACACS, Kerberos, and 802.1X. << Previous Video: PAP and CHAP Next: Federated Identities >> One of the more common authentication authorization and accounting protocols is the RADIUS protocol. RADIUS is the Remote …

Identity and Access Services – SY0-601 CompTIA Security+ : 3.8 Read More »

PAP and CHAP – SY0-601 CompTIA Security+ : 3.8

Authentication protocols have been used for many years in IT security. In this video, you’ll learn about the authentication process and the differences between PAP and CHAP authentication. << Previous Video: Authentication Management Next: Identity and Access Services >> There are many different ways to provide authentication to a network. And in this video, we’ll …

PAP and CHAP – SY0-601 CompTIA Security+ : 3.8 Read More »

Authentication Management – SY0-601 CompTIA Security+ : 3.8

As a security professional, you’ll have many options for managing your passwords. In this video, you’ll learn about password keys, password vaults, trusted platform modules, hardware security modules, and knowledge-based authentication. << Previous Video: Account Policies Next: PAP and CHAP >> One type of hardware-based authentication might be something like a password key. This is …

Authentication Management – SY0-601 CompTIA Security+ : 3.8 Read More »

Account Policies – SY0-601 CompTIA Security+ : 3.7

A security administrator has a number of challenges associated with accounts. In this video, you’ll learn about routine audits, password complexity, account lockouts, and location-based policies. << Previous Video: Account Types Next: Authentication Management >> When an administrator is configuring a user on a system, there are many different policies to consider. For example, the …

Account Policies – SY0-601 CompTIA Security+ : 3.7 Read More »

Account Types – SY0-601 CompTIA Security+ : 3.7

There are many different types of accounts. In this video, you’ll learn about user accounts, shared and generic accounts, guest accounts, service accounts, and privileged accounts. << Previous Video: Identity Controls Next: Account Policies >> If you’re watching this video on your computer, then you’re probably logged in with a user account. A user account …

Account Types – SY0-601 CompTIA Security+ : 3.7 Read More »

Identity Controls – SY0-601 CompTIA Security+ : 3.7

Verifying the identity of a user is an important step in the authentication process. In this video, you’ll learn about identity providers, certificates, tokens, and SSH keys. << Previous Video: Cloud Security Solutions Next: Account Types >> When you have an application that’s running on your local network you probably have a pretty good idea …

Identity Controls – SY0-601 CompTIA Security+ : 3.7 Read More »

Cloud Security Solutions – SY0-601 CompTIA Security+ : 3.6

We have created new technologies to protect a new generation of cloud-based applications. In this video, you’ll learn about CASB, secure web gateways, firewalls in the cloud, and other security controls. << Previous Video: Securing Compute Clouds Next: Identity Controls >> One of the challenges that a security professional has is being able to maintain …

Cloud Security Solutions – SY0-601 CompTIA Security+ : 3.6 Read More »

Securing Compute Clouds – SY0-601 CompTIA Security+ : 3.6

Our compute cloud instances are the core of a cloud-based application instance. In this video, you’ll learn about security groups, dynamic resource allocation, VPC endpoints, and container security. << Previous Video: Securing Cloud Networks Next: Cloud Security Solutions >> When we’re creating our cloud based applications, we need some components that will perform the actual …

Securing Compute Clouds – SY0-601 CompTIA Security+ : 3.6 Read More »

Securing Cloud Networks – SY0-601 CompTIA Security+ : 3.6

The cloud introduces new security challenges to our connectivity and networking. In this video, you’ll learn about virtual networks, public and private subnets, segmentation, and API inspection. << Previous Video: Securing Cloud Storage Next: Securing Compute Clouds >> If we have applications that are running in the cloud and we’re storing data in the cloud, …

Securing Cloud Networks – SY0-601 CompTIA Security+ : 3.6 Read More »