Taking Hashes – CompTIA Security+ SY0-401: 2.4
How can you tell if a digital file on a piece of storage media has been altered? In this video, you’ll learn about hashing, and I’ll demonstrate how to compare hashes with a file that has been altered.
How can you tell if a digital file on a piece of storage media has been altered? In this video, you’ll learn about hashing, and I’ll demonstrate how to compare hashes with a file that has been altered.
Time is relative, and that’s certainly the case with a computer’s internal clock. In this video, you’ll learn how operating systems count time and how a computer’s timezone setting can change how you look at data.
Recording Time Offsets – CompTIA Security+ SY0-401: 2.4 Read More »
A video can sometimes provide much more information that weeks of log files. In this video, you’ll learn some strategies for collecting evidence with video.
Capturing Video – CompTIA Security+ SY0-401: 2.4 Read More »
The packets traversing network can be a wealth of information. In this video, you’ll learn how to collect information from network traffic and logs.
Capturing Network Traffic and Logs – CompTIA Security+ SY0-401: 2.4 Read More »
Imaging a system can be a very effective way of preserving evidence. In this video, you’ll learn about system imaging and some strategies for obtaining system data without directly imaging a storage drive.
Capturing System Images – CompTIA Security+ SY0-401: 2.4 Read More »
Not all data sticks around, and some data stays around longer than others. In this video, you’ll learn about the order of data volatility and which data should be gathered more urgently than others.
Order of Volatility – CompTIA Security+ SY0-401: 2.4 Read More »
If there’s no monitoring of data leakage, then your customer’s private information could find its way out. In this video, you’ll learn some strategies around data loss prevention and how some organizations found customer data exfiltrating their network.
Data Loss Prevention – CompTIA Security+ SY0-401: 2.3 Read More »
Our data is some of the most important assets in our organization. In this video, you’ll learn about the implementation of data loss and data theft policies.
Data Loss and Theft Policies – CompTIA Security+ SY0-401: 2.3 Read More »
Nobody likes an audit, but it’s one of the best things you can do to provide a check of your network security. In this video, you’ll learn the importance of an audit and which audit types may be appropriate for your organization.
Security Audits – CompTIA Security+ SY0-401: 2.3 Read More »
How important is the management of user rights and permissions? In this video, you’ll learn which questions you should be asking to provide the best security for your users and your important data.
User Rights and Permissions – CompTIA Security+ SY0-401: 2.3 Read More »