Using Forensics Data – CompTIA Security+ SY0-501 – 5.5

After you’ve collected forensics data, what processes should you follow? In this video, you’ll learn about the preservation of evidence, recovery of data, and tracking man hours and expenses. << Previous Video: Gathering Forensics Data Next: Disaster Recovery Sites >> It’s important to preserve all of your forensics data, and there will be a lot

Using Forensics Data – CompTIA Security+ SY0-501 – 5.5 Read More »

Gathering Forensics Data – CompTIA Security+ SY0-501 – 5.5

The process of gathering forensics data requires planning and attention to detail. In this video, you’ll learn about the process of gathering and storing important information after a security incident. << Previous Video: Incident Response Process Next: Using Forensics Data >> During and after a security incident there will always be a need to collect

Gathering Forensics Data – CompTIA Security+ SY0-501 – 5.5 Read More »

Cloud Deployment Models – CompTIA Security+ SY0-501 – 3.7

There are many different cloud architectures to consider when designing the perfect cloud. In this video, you’ll learn about cloud services, public clouds, private clouds, and more. << Previous Video: Virtualization Security Next: Security in the Cloud >> With Software as a Service, there’s no need to have any local installation of hardware or software

Cloud Deployment Models – CompTIA Security+ SY0-501 – 3.7 Read More »