Today’s 220-1102 CompTIA A+ Pop Quiz: It’s a party now
Today’s 220-1102 CompTIA A+ Pop Quiz: It’s a party now Read More »
There are many ways to increase the security of a password. In this video, you’ll learn about password complexity, password managers, passwordless authentication, and more. << Previous Video: Multifactor Authentication Next Video: Scripting and Automation >> When you’re choosing a password, you often see instructions on creating a password that will be difficult for someone
Password Security – CompTIA Security+ SY0-701 – 4.6 Read More »
A username and password can be enhanced through the use of multifactor authentication. In this video, you’ll learn about something you know, something you have, something you are, and somewhere you are. << Previous Video: Access Controls Next Video: Password Security >> When you log into a website, it’s very common to use a username
Multifactor Authentication – CompTIA Security+ SY0-701 – 4.6 Read More »
There are many different ways to provide authorization, rights, and permissions. In this video, you’ll learn about least privilege, access control types, time-of-day restrictions, and more. << Previous Video: Identity and Access Management Next Video: Multifactor Authentication >> Once someone authenticates to a network, we still need to provide them with access to the resources
Access Controls – CompTIA Security+ SY0-701 – 4.6 Read More »
An important aspect of security is to match the right permissions to the right people at the right time. In this video, you’ll learn about IAM (Identity and Access Management), account provisioning, permission assignments, single sign-on, and more. << Previous Video: Endpoint Security Next Video: Access Controls >> As you’re aware, we use applications on
Identity and Access Management – CompTIA Security+ SY0-701 – 4.6 Read More »
The endpoint is one of the best vectors for an attacker. In this video, you’ll learn about posture assessments, health checks, EDR (Endpoint Detection and Response), and more. << Previous Video: Monitoring Data Next Video: Identity and Access Management >> The endpoint is the device used by the user. This might be a desktop, a
Endpoint Security – CompTIA Security+ SY0-701 – 4.5 Read More »
A good offense against an attacker is to have a good defense. In this video, you’ll learn about data loss prevention, file integrity monitoring, USB blocking, and more. << Previous Video: Email Security Next Video: Endpoint Security >> If you’ve ever managed a server or an application instance, then you know that there are a
Monitoring Data – CompTIA Security+ SY0-701 – 4.5 Read More »
We rely on email as one of our most common methods of communication. In this video, you’ll learn about SPF (Secure Policy Framework), DKIM (Domain Keys Identified Mail), and DMARC (Domain-based Message Authentication, Reporting, and Conformance). << Previous Video: Secure Protocols Next Video: Monitoring Data >> If you check your spam folder right now, you’ll
Email Security – CompTIA Security+ SY0-701 – 4.5 Read More »
Encrypting network traffic is an important security best practice. In this video, you’ll learn about protocol and port selection, transport methods, and VPN tunnels. << Previous Video: Operating System Security Next Video: Email Security >> Whether you’re sending traffic over a wired network or a wireless network, you still need to make sure that everything
Secure Protocols – CompTIA Security+ SY0-701 – 4.5 Read More »
Operating systems are important resources to secure. In this video, you’ll learn about Active Directory, Group Policy, and Security-Enhanced Linux (SELinux). << Previous Video: Web Filtering Next Video: Secure Protocols >> If you’re working in an environment with many Windows devices, then you’re probably taking advantage of Active Directory. Active Directory is a database containing
Operating System Security – CompTIA Security+ SY0-701 – 4.5 Read More »