Security Operations II

Email Security We rely on email as one of our most common methods of communication. In this video, you’ll learn about SPF (Secure Policy Framework), DKIM (Domain Keys Identified Mail), and DMARC (Domain-based Message Authentication, Reporting, and Conformance). Monitoring Data A good offense against an attacker is to have a good defense. In this video, […]

Threats, Vulnerabilities, and Mitigations II

2.4 – Indicators of Malicious Activity An Overview of Malware Malware is a significant security concern on our modern networks. In this video, you’ll learn how malware and ransomware is used in cybersecurity attacks. Viruses and Worms Viruses and worms can be used to gain access to our systems. In this video, you’ll learn about […]

Security Program Management and Oversight

5.1 – Security Governance Security Policies Policies are the foundation of our security processes and procedures. In this video, you’ll learn about information security policies, acceptable use policies, business continuity, and more. Security Standards Some security parameters are administratively managed. In this video, you’ll learn about standards for password policies, access control, physical security, and […]

Security Operations

4.1 – Security Techniques Secure Baselines The security of an application environment should be well defined. In this video, you’ll learn about establishing, deploying, and maintaining security baselines. Hardening Targets No system is secure with the default configurations. In this video, you’ll learn about hardening mobile devices, servers, embedded systems, IoT devices, and more. Securing […]

Security Architecture

3.1 – Architecture Models Cloud Infrastructures Security in the cloud is a constant challenge. In this video, you’ll learn about infrastructure as code, serverless architectures, APIs, and more. Network Infrastructure Concepts Cloud-based network infrastructures can provide significant security features. In this video, you’ll learn about logical segmentation and how software defined networking can be securely […]

General Security Concepts

0.1 – Introduction How to Pass Your SY0-701 Security+ Exam CompTIA’s Security+ certification is one of the most popular entry-level certifications for Information Technology professionals. In this video, you’ll learn about the certification requirements and the best methods for studying for the Security+ exam. 1.1 – Security Controls Security Controls We rely on security controls […]

CompTIA Security+ Study Guide

About this app All of the questions and study material in this app are hand-written in house by our team of IT professionals (all who have passed their CompTIA Security+ exams) and are based on the content in Professor Messer’s video series, the official CompTIA study guides and Josh Madakor’s practice material.  How to Study […]