CompTIA Security+ SY0-301: 2.4 – User Habits and Threat Awareness
Our user habits can make or break our security policies. In this video, you’ll learn some important user habits, and you’ll learn about the threats that should always be top of mind.
Our user habits can make or break our security policies. In this video, you’ll learn some important user habits, and you’ll learn about the threats that should always be top of mind.
In some organizations, compliance is one of their primary security objectives. In this video, you’ll learn how compliance requirements are changing the ways that we approach network security.
Some organizations must store data for an extended timeframe. In this video, you’ll learn about labeling data, some important handling issues, and how to dispose of the data once it’s no longer needed.
How do you categorize your data? In this video, you’ll see how some of the most secure networks in the world segment their data into specific security classifications.
Privacy is a big security challenge for everyone in today’s well-connected world. In this video, you’ll learn why personal data has become such an important security concern.
How knowledgeable are your users? In this video, you’ll learn how to set up training sessions for your user community.
If you’re the first one on the scene of a security event, there are a number of best practices to consider. In this video, you’ll learn which tasks the first person on a scene need to follow and how to handle the evidence you find.
Accounting for costs and preventing further damage are important aspects of security forensics. In this video, you’ll learn about expense accounting and methods for limiting the damage of a security event.
The state of a computer screen and a statement from a witness can be powerful forensics data when captured properly. In this video, you’ll learn how to gather forensics information directly from the screen and important considerations when taking witness statements.
Taking hashes during the forensics process can provide valuable verification later. In this video, you’ll learn about digest ciphers and other methods for verifying data.