Today’s Core 2 CompTIA A+ Pop Quiz: A constant issue
Today’s Core 2 CompTIA A+ Pop Quiz: A constant issue Read More »
We use many different factors during the authentication process. In this video, you’ll learn about the AAA framework, multi-factor authentication factors, and multi-factor authentication attributes. << Previous Video: Biometrics Next: Disk Redundancy >> We’re all familiar with the process of authenticating into a system. Usually you use a username, a password, and perhaps
Multi-factor Authentication – SY0-601 CompTIA Security+ : 2.4 Read More »
There are many ways to authenticate someone based on a biometric feature. In this video, you’ll learn about fingerprint scanners, retinal scanners, voice recognition, and more. << Previous Video: Authentication Methods Next: Multi-factor Authentication >> A biometric authentication factor refers to something you are, this would be something like a fingerprint. For example, fingerprint scanners
We use many different technologies during the authentication process. In this video, you’ll learn about directory services, federation, attestation, and more. << Previous Video: Automation and Scripting Next: Biometrics >> Many operating systems will use a feature known as directory services. This is a central database that stores usernames, passwords, computers, printers, and
Authentication Methods – SY0-601 CompTIA Security+ : 2.4 Read More »
One challenge for any developer is the process of creating and publishing application updates. In this video, you’ll learn about continuous integration, continuous delivery, and continuous deployment. << Previous Video: Software Diversity Next: Authentication Methods >> The application development process is a constantly moving and constantly changing process. And it becomes important to
Automation and Scripting – SY0-601 CompTIA Security+ : 2.3 Read More »
One way to minimize the attack surface is to use different application binaries to perform the same task. In this video, you’ll learn about software diversity and some of the advantages and disadvantages of this security strategy. << Previous Video: Secure Coding Techniques Next: Automation and Scripting >> Attackers are very good at
Software Diversity – SY0-601 CompTIA Security+ : 2.3 Read More »
An application developer must use many different techniques to keep their code secure. In this video, you’ll learn about stored procedures, obfuscation, input validation, memory management, and more. << Previous Video: Provisioning and Deprovisioning Next: Software Diversity >> Creating an application is always a balancing act between, how much time it takes to
Secure Coding Techniques – SY0-601 CompTIA Security+ : 2.3 Read More »
Cloud computing has put an updated focus on our approach to provisioning and deprovisioning applications. In this video, you’ll learn about scalability, elasticity, and orchestration of application instances. << Previous Video: Secure Deployments Next: Secure Coding Techniques >> Provisioning is the process of making something available. If you are provisioning an application, then
Provisioning and Deprovisioning – SY0-601 CompTIA Security+ : 2.3 Read More »
The application development process can be a challenge to implement. In this video, you’ll learn how to securely create and deploy applications from the development process through production. << Previous Video: Virtualization Security Next: Provisioning and Deprovisoning >> If you’re an organization that does your own development work, there’s always a challenge in getting the
Secure Deployments – SY0-601 CompTIA Security+ : 2.3 Read More »