Symmetric and Asymmetric Encryption – CompTIA Security+ SY0-501 – 6.1

If you’re planning to implement cryptography, then you’ll probably be using either symmetric encryption or asymmetric encryption. In this video, you’ll learn about both of these valuable encryption mechanisms. << Previous Video: Cryptography Concepts Next: Hashing and Digital Signatures >> If you’ve implemented symmetric encryption using a single shared key for both the encryption process […]

Symmetric and Asymmetric Encryption – CompTIA Security+ SY0-501 – 6.1 Read More »

Cryptography Concepts – CompTIA Security+ SY0-501 – 6.1

The basics of cryptography are valuable fundamentals for building a secure network. In this video, you’ll learn about cryptographic terms, the value of the key, the concepts of confusion and diffusion, and more. << Previous Video: Data Roles and Retention Next: Symmetric and Asymmetric Encryption >> Cryptography is derived from the Greek word “kryptos,” which

Cryptography Concepts – CompTIA Security+ SY0-501 – 6.1 Read More »

Data Roles and Retention – CompTIA Security+ SY0-501 – 5.8

Who owns your data, and how long do you keep copies of your data? In this video, you’ll learn about specific data roles and options for data retention. << Previous Video: Handling Sensitive Data Next: Cryptography Concepts >> In most organizations, data doesn’t exist on its own. There is a relationship between the data and

Data Roles and Retention – CompTIA Security+ SY0-501 – 5.8 Read More »

Handling Sensitive Data – CompTIA Security+ SY0-501 – 5.8

Different types of data need to be uniquely managed. In this video, you’ll learn about labeling sensitive data and some common sensitive data types. << Previous Video: Data Destruction Next: Data Roles and Retention >> In your organization, you’re going to be working with lots of different kinds of data. But not all of the

Handling Sensitive Data – CompTIA Security+ SY0-501 – 5.8 Read More »

Security Controls – CompTIA Security+ SY0-501 – 5.7

There are many ways to prevent or minimize the impact of a security event. In this video, you’ll learn about the different security control categories. << Previous Video: Continuity of Operations Next: Data Destruction >> There are many different security risks out there, and there are all different shapes and forms. We have to protect

Security Controls – CompTIA Security+ SY0-501 – 5.7 Read More »

Continuity of Operations – CompTIA Security+ SY0-501 – 5.6

Maintaining the technology for an organization can be a challenge in the best of circumstances. In this video, you’ll learn about planning for disaster with tabletop exercises, after-action reports, failover plans, and more. << Previous Video: Geographic Considerations Next: Security Controls >> If you’ve built a plan for a security incident, it’s always a good

Continuity of Operations – CompTIA Security+ SY0-501 – 5.6 Read More »

Geographic Considerations – CompTIA Security+ SY0-501 – 5.6

Selecting the location of a disaster recovery site isn’t as simple as it may seem. In this video, you’ll learn about the challenges of geographic location, off-site backups, and issues with international data and travel. << Previous Video: Application Recovery Next: Continuity of Operations >> Whenever you’re preparing for any kind of incident, you must

Geographic Considerations – CompTIA Security+ SY0-501 – 5.6 Read More »

Application Recovery – CompTIA Security+ SY0-501 – 5.6

When a security incident occurs, you’ll need to get applications running again as quickly as possible. In this video, you’ll learn about application restoration priorities and backup strategies. << Previous Video: Disaster Recovery Sites Next: Geographic Considerations >> When you’re recovering applications, some applications may have a higher priority than others. Applications that are customer

Application Recovery – CompTIA Security+ SY0-501 – 5.6 Read More »

Disaster Recovery Sites – CompTIA Security+ SY0-501 – 5.6

If you’re building out a disaster recovery site, there are many options available to you. In this video, you’ll learn about cold sites, warm sites, and hot sites. << Previous Video: Using Forensics Data Next: Application Recovery >> If you’re building out a disaster recovery site, there are many different options available. In this video,

Disaster Recovery Sites – CompTIA Security+ SY0-501 – 5.6 Read More »