-
Change Management
After watching this video; you will be able to recognize characteristics of change management.
-
Training and Awareness
After watching this video; you will be able to use training and awareness data for security assessment and testing.
-
Virtual Appliances
After watching this video; you will be able to describe characteristics of virtual appliances and their role in virtual environments.
-
Snapshots
Snapshots are an effective and viable backup option from an enterprise security perspective. In this video; Steven Crawford discusses the use of snapshots.
-
Flow Control
After watching this video; you will be able to distinguish between flow control methods.
-
Virtualized Networks
After watching this video; you will be able to describe the concept of virtualized networks.
-
Network Access Control
When preparing for the CompTIA CASP CAS-002 examination; you're expected to know about network security feature – Network Access Control (NAC) which measures the configuration of connecting clients against a health policy. It then only allows the connection if the client is healthy. In this video; Glen Clarke discusses the features of NAC and the health policy.
-
Transmission Media
After watching this video; you will be able to describe the security characteristic of different choices of network media.
-
Digital Signatures
After watching this video; you will be able to describe characteristics and best practices for applying digital signatures.
-
Separation of Duties
After watching this video; you will be able to recognize the characteristics of separation of duties.
-
Disaster Recovery and Business Continuity
After watching this video; you will be able to use disaster recovery and business continuity data for security assessment and testing.
-
Security Policy
After watching this video; you will be able to identify best practices for developing and implementing a documented security policy.
-
Copying and Moving Files
After watching this video; you will be able to distinguish NTFS permission behaviors when copying and moving files.
-
Share Permissions
After watching this video; you will be able to distinguish and apply share permissions.
-
Routing
After watching this video; you will be able to identify characteristics of routing.
-
Deployment Requirements
After watching this video; you will be able to identify characteristics of software deployment requirements.
-
Embedded Systems
After watching this video; you will be able to distinguish between control systems and firmware.
-
Hypervisor
After watching this video; you will be able to identify characteristics and role of hypervisors in virtual environments.
-
Phishing and Pharming
After watching this video; you will be able to distinguish between phishing and pharming.
-
Endpoint Security
After watching this video; you will be able to describe local on-device security for network end systems.
-
Interfaces
After watching this video; you will be able to identify characteristics of interfaces as a security capability within information systems.
-
Security Zones
When preparing for the CompTIA CASP CAS-002 examination; you're expected to know how security zones are used to secure network environments. In this video; Glen E. Clarke discusses security zones; how they operate to control communication between different zones; as well as separate critical assets to secure a network environment.
-
Confidentiality
Three concepts are central to IT security – confidentiality; integrity; and availability (CIA). In this video; Travis Welton discusses these principles; explains what’s meant by confidentiality and how it’s implemented; and outlines different confidentiality classifications.
-
Integrity
After watching this video; you will be able to identify the role of integrity when applying cryptography.
-
Water Issues
After watching this video; you will be able to identify best practices for preventing and responding to water risks.
-
Intrusion Detection and Intrusion Prevention Systems
After watching this video; you will be able to distinguish between the two main types of IDS/IPS.
-
Packet Filtering Firewalls
After watching this video; you will be able to recognize characteristics of packet filtering firewalls.
-
Zones
With Microsoft Windows; it is vitally important to be aware of security fundamentals. Microsoft added the use of four security content zones to Internet Explorer to improve Internet security. In this video; Travis Welton demonstrates how to configure the four security content zones and further customize the security levels in Internet Explorer.
-
Account Management Data
After watching this video; you will be able to use account management data for security assessment and testing.
-
Addressing Embedded Device Vulnerabilities
After watching this video; you will be able to identify best practices for assessing and mitigating embedded device and cyber-physical system vulnerabilities.
-
Addressing Mobile System Vulnerabilities
After watching this video; you will be able to identify best practices for assessing and mitigating mobile system vulnerabilities.
-
Addressing Web-based Systems Vulnerabilities
After watching this video; you will be able to identify best practices for assessing and mitigating web-based systems vulnerabilities.
-
Aligning Security Function to the Organization
After watching this video; you will be able to align the security function to an organization's strategy; goals; mission; and objectives.
-
Analyzing Test Outputs
After watching this video; you will be able to identify best practices for analyzing security assessment and testing results.
-
API Security
After watching this video; you will be able to describe best practices for application programming interface security.
-
Applying Availability
After watching this video; you will be able to identify best practices when applying the concept of availability.
-
Applying Complete Mediation to Engineering Processes
After watching this video; you will be able to apply the secure design principle of complete mediation when implementing and managing engineering processes.
-
Applying Confidentiality
After watching this video; you will be able to identify best practices when applying the concept of confidentiality.
-
Applying Defense in Depth to Engineering Processes
After watching this video; you will be able to apply the secure design principle of defense in depth when implementing and managing engineering processes.
-
Applying Economy of Mechanism to Engineering Processes
After watching this video; you will be able to apply the secure design principle of economy of mechanism when implementing and managing engineering processes.
-
Applying Fail Safe to Engineering Processes
After watching this video; you will be able to apply the secure design principle of fail safe when implementing and managing engineering processes.
-
Applying Integrity
After watching this video; you will be able to identify best practices when applying the concept of integrity.
-
Applying Least Common Mechanism
After watching this video; you will be able to apply the secure design principle of least common mechanism when implementing and managing engineering processes.
-
Applying Least Design to Engineering Processes
After watching this video; you will be able to apply the secure design principle of least design when implementing and managing engineering processes.
-
Applying Least Privilege to Security Operations
After watching this video; you will be able to apply the concept of least privilege to security operations.
-
Applying Open Design to Engineering Processes
After watching this video; you will be able to apply the secure design principle of open design when implementing and managing engineering processes.
-
Applying Psychological Acceptability
After watching this video; you will be able to apply the secure design principle of psychological acceptability when implementing and managing engineering processes.
-
Applying Separation of Duties to Engineering Processes
After watching this video; you will be able to apply the secure design principle of separation of duties when implementing and managing engineering processes.
-
Applying Separation of Duties to Security Operations
After watching this video; you will be able to apply the concept of separation of duties and responsibilities to security operations.
-
Applying Weakest Link to Engineering Processes
After watching this video; you will be able to apply the secure design principle of weakest link when implementing and managing engineering processes.
-
Assessing and Mitigating Client-Based Vulnerabilities
After watching this video; you will be able to identify best practices for assessing client-based vulnerabilities in security architectures; design; and solution elements.
-
Assessing and Mitigating Server-Based Vulnerabilities
After watching this video; you will be able to identify best practices for assessing server-based vulnerabilities in security architectures; design; and solution elements.
-
Assessing Risk
After watching this video; you will be able to distinguish between qualitative; quantitative; and hybrid risk assessment strategies.
-
Assessing Risk Controls
After watching this video; you will be able to identify best practices for assessing risk controls.
-
Assessing Security through Change Logs and Audits
After watching this video; you will be able to use audits and change logs to assess the effectiveness of software security.
-
Assigning and Accepting Risk
After watching this video; you will be able to identify options for assigning and accepting risk.
-
Asymmetric Cryptography
After watching this video; you will be able to identify characteristics of asymmetric cryptography.
-
Auditor Role and Responsibilities
After watching this video; you will be able to identify the role of auditors in asset security.
-
Backup Storage Strategies
After watching this video; you will be able to distinguish between backup storage options.
-
Backup Verification Data
After watching this video; you will be able to use backup verification data for security assessment and testing.
-
Baselines
After watching this video; you will be able to use baselines to determine appropriate date security controls.
-
Business Classification Levels
After watching this video; you will be able to distinguish between the four common business classification levels.
-
Civil Investigation Requirements
After watching this video; you will be able to identify requirements for civil investigations.
-
Cloud Identity Services
After watching this video; you will be able to describe cloud identity services; and the functioning of identity as a service.
-
Code Repository Security
After watching this video; you will be able to describe best practices for code repository security.
-
Code Review and Testing
After watching this video; you will be able to distinguish between code review and testing types for security control testing.
-
Collection Limitations and Privacy Protection
After watching this video; you will be able to identify data collection best practices to ensure privacy protection.
-
Common Software Vulnerabilities
After watching this video; you will be able to list CWE and SAN top software vulnerabilities.
-
Communications Cryptography
After watching this video; you will be able to identify common cryptographic protocols used for communications.
-
Computer Crimes
After watching this video; you will be able to identify characteristics of computer crimes that pertain to information security.
-
Computer; Equipment; and Data Security
After watching this video; you will be able to identify best practices for computer and equipment room security.
-
Conducting an Audit
After watching this video; you will be able to describe the process for conducting an audit.
-
Confidentiality Security Models
After watching this video; you will be able to identify characteristics of confidentiality security models.
-
Configuration Management for Secure Coding
After watching this video; you will be able to use configuration management as a method for securing the coding environment.
-
Content-Distribution Networks
After watching this video; you will be able to describe content distribution networks and their security implications.
-
Contingency Planning
After watching this video; you will be able to describe characteristics of contingency planning.
-
Continuous Improvement
After watching this video; you will be able to specify the purpose and best practices of continuous improvement as a result of risk management activities.
-
Continuous Monitoring
After watching this video; you will be able to describe characteristics of continuous monitoring.
-
Continuous Security Monitoring
After watching this video; you will be able to define an Information Systems Continuous Monitoring strategy.
-
Control Frameworks
After watching this video; you will be able to apply security governance principles through the use of control frameworks.
-
Controlling Access to Computer Systems
After watching this video; you will be able to describe methods to control access to computer systems.
-
Controlling Access to Devices
After watching this video; you will be able to describe methods to control access to devices; including BYOD.
-
Controlling Access to Facilities
After watching this video; you will be able to describe methods to control physical access to buildings and facilities.
-
Controlling Access to Information
After watching this video; you will be able to describe methods to control access to information assets.
-
Converged Protocols
After watching this video; you will be able to describe protocol convergence and common protocols for converging voice and video on IP networks.
-
Credential Management and Federation
After watching this video; you will be able to describe credential management and federated authentication systems.
-
Crime Prevention through Environmental Design
After watching this video; you will be able to describe crime prevention through environmental design when assessing sites and facilities.
-
Criminal Investigation Requirements
After watching this video; you will be able to identify requirements for criminal investigations.
-
Critical Building Components
After watching this video; you will be able to identify the critical building components that should be physically located away from main entrances; vehicular circulation; parking; and maintenance areas.
-
Cryptanalytic Attack Methods
After watching this video; you will be able to distinguish between cryptanalytic attack methods.
-
Cryptographic Life Cycle
After watching this video; you will be able to recognize characteristics of the cryptographic life cycle.
-
Cryptographic Systems Vulnerabilities
After watching this video; you will be able to identify best practices for assessing and mitigating cryptographic systems vulnerabilities.
-
Data Breaches
After watching this video; you will be able to identify best practices for addressing data breaches that pertain to information security.
-
Data Classification Criteria
After watching this video; you will be able to distinguish between data classification categories.
-
Data Custodian Role and Responsibilities
After watching this video; you will be able to identify the role of data custodians in asset security.
-
Data Networks and Communications
After watching this video; you will be able to identify network types and describe data communication on a network.
-
Data Owner Role and Responsibilities
After watching this video; you will be able to identify the role of data owners in asset security.
-
Data Owners Role in Privacy Protection
After watching this video; you will be able to specify data owner best practices to ensure privacy protection.
-
Data Processors and Privacy Protection
After watching this video; you will be able to specify data processor best practices to ensure privacy protection.
-
Data Remnants and Privacy Protection
After watching this video; you will be able to specify data remanence best practices to ensure privacy protection.
-
Database Security Vulnerabilities
After watching this video; you will be able to identify best practices for assessing and mitigating database security vulnerabilities.
-
Delegated Identity
After watching this video; you will be able to describe delegated identity in the context of authentication systems.
-
Designing Assessment and Test Strategies
After watching this video; you will be able to identify best practices when designing assessment and test strategies.
-
Destruction of Sensitive Information
After watching this video; you will be able to establish best practices for destruction of sensitive information.
-
Determining and Diagramming Potential Attacks
After watching this video; you will be able to use threat trees to diagram potential attacks.
-
Determining IS Training and Education Requirements
After watching this video; you will be able to specify appropriate information system training; education and awareness levels for an organization.
-
Developing a Recovery Strategy
After watching this video; you will be able to identify best practices for developing a recovery strategy.
-
Development Lifecycle Change Management Security
After watching this video; you will be able to identify secure change management best practices during the software development lifecycle.
-
Digital Forensics
After watching this video; you will be able to identify characteristics of digital forensics and their role in security investigations.
-
Digital Rights Management
After watching this video; you will be able to identify best practices for managing digital rights.
-
Disaster Recovery Assessment
After watching this video; you will be able to identify best practices for ensuring appropriate event assessment during disaster recovery activities.
-
Disaster Recovery Communications
After watching this video; you will be able to identify best practices for ensuring adequate communications during disaster recovery activities.
-
Disaster Recovery Personnel
After watching this video; you will be able to identify best practices for ensuring adequate personnel practices during disaster recovery activities.
-
Disaster Recovery Response
After watching this video; you will be able to identify best practices for ensuring adequate response during disaster recovery activities.
-
Disaster Recovery Restoration
After watching this video; you will be able to identify best practices for ensuring restoration during disaster recovery activities.
-
Disaster Recovery Training and Awareness
After watching this video; you will be able to identify best practices for incorporating disaster recovery training and awareness in security operations.
-
Discretionary and Mandatory Access Controls
After watching this video; you will be able to identify discretionary and mandatory access controls.
-
Distributed Systems Vulnerabilities
After watching this video; you will be able to identify best practices for assessing and mitigating distributed systems vulnerabilities.
-
Due Care
After watching this video; you will be able to apply due care.
-
Due Diligence
After watching this video; you will be able to apply due diligence.
-
Duress Considerations
After watching this video; you will be able to describe challenges and best practices for incorporating duress considerations in security policies.
-
Egress Monitoring
After watching this video; you will be able to describe characteristics of egress monitoring.
-
Electronic Discovery Investigation Requirements
After watching this video; you will be able to identify requirements for e-Discovery investigations.
-
Elliptic Curve Cryptography
After watching this video; you will be able to identify characteristics of elliptic curve cryptography.
-
Employment Agreements and Policies
After watching this video; you will be able to identify best security practices for employment agreements and policies.
-
Employment Candidate Screening
After watching this video; you will be able to identify best security practices for screening employee candidates.
-
Employment Termination Processes
After watching this video; you will be able to identify best security practices for employment termination processes.
-
Evaluating Systems Security
After watching this video; you will be able to identify characteristics of systems security evaluation.
-
Evidence Collection and Handling
After watching this video; you will be able to describe best practices for evidence collection and handling.
-
Facility Security Considerations
After watching this video; you will be able to identify considerations when planning facility security for an organization.
-
Fire Issues
After watching this video; you will be able to identify best practices for preventing; detecting; and suppressing fires and fire-related security risks and damage.
-
Full-interruption Testing
After watching this video; you will be able to identify best practices for performing full-interruption testing of a recovery plan.
-
Government Classification Levels
After watching this video; you will be able to distinguish between the five typical government/military classification levels.
-
Hardware Asset Retention
After watching this video; you will be able to identify best practices to appropriately retain hardware assets.
-
Honeypots and Honeynets
After watching this video; you will be able to identify best practices for using honeypots and honeynets as a preventative measure.
-
Identifying Threats and Vulnerabilities
After watching this video; you will be able to identify security threats and vulnerabilities.
-
Identifying Threats Through Threat Modeling
After watching this video; you will be able to identify threats using threat modeling techniques.
-
Identity Access Lifecycle
After watching this video; you will be able to describe the identity access lifecycle.
-
Identity Access Regulatory Considerations
After watching this video; you will be able to describe regulatory considerations for identity and access control systems.
-
Identity and Access Management Best Practice
After watching this video; you will be able to identify best practice for identity and access management.
-
Identity Management Implementation
After watching this video; you will be able to identify implementations of identity management.
-
Identity Providers
After watching this video; you will be able to identify on-premises identity providers.
-
Identity Registration and Proofing
After watching this video; you will be able to describe systems for registering identity and assuring identity with a level of certainty.
-
Implementing a Classification Scheme
After watching this video; you will be able to identify the seven phases of implementing a classification scheme.
-
Implementing ISCM
After watching this video; you will be able to implement an Information Systems Continuous Monitoring strategy.
-
Implementing Risk Countermeasures and Controls
After watching this video; you will be able to implement risk countermeasures and controls.
-
Import/Export Controls
After watching this video; you will be able to identify characteristics of import and export controls that pertain to information security.
-
Incident Detection
After watching this video; you will be able to identify best practices for incident detection.
-
Incident Recovery
After watching this video; you will be able to identify best practices for incident recovery.
-
Incident Remediation and Lessons Learned
After watching this video; you will be able to identify best practices for incident remediation.
-
Incident Reporting
After watching this video; you will be able to identify best practices for incident reporting.
-
Incident Response and Mitigation
After watching this video; you will be able to identify best practices for incident response and mitigation.
-
Industrial Control Systems Vulnerabilities
After watching this video; you will be able to identify best practices for assessing and mitigating industrial control systems vulnerabilities.
-
Information Lifecycle and Security Operations
After watching this video; you will be able to describe the role of the information lifecycle in security operations.
-
Integrated Product Team
After watching this video; you will be able to describe the purpose and best practices of IPTs and their role in secure software development.
-
Integrity Security Models
After watching this video; you will be able to identify characteristics of integrity security models.
-
Interface Testing
After watching this video; you will be able to use interface testing as a security control testing technique.
-
Internal Audits
After watching this video; you will be able to identify best practices for performing internal audits.
-
Internal Security Controls
After watching this video; you will be able to identify appropriate internal security measures.
-
Intrusion Detection and Prevention Systems
After watching this video; you will be able to distinguish between different intrusion detection and prevention systems.
-
Investigation Reporting and Documenting
After watching this video; you will be able to describe best practices for reporting and documenting investigation activities.
-
Investigative Techniques
After watching this video; you will be able to distinguish between different investigative techniques.
-
IP Networks
After watching this video; you will be able to describe the IP protocol.
-
Job Rotation
After watching this video; you will be able to describe best practices for using job rotation in security operations.
-
Key Management Practices
After watching this video; you will be able to identify best practices for key management.
-
Key Performance and Risk Indicators
After watching this video; you will be able to use key performance and risk indicators data for security assessment and testing.
-
Large-Scale Parallel Data Systems Vulnerabilities
After watching this video; you will be able to identify best practices for assessing and mitigating large-scale parallel data systems vulnerabilities.
-
Legislative and Regulatory Compliance
After watching this video; you will be able to apply legislative and regulatory compliance requirements to information system security practices.
-
Leveraging Existing Components
After watching this video; you will be able to apply the secure design principle of leveraging existing components when implementing and managing engineering processes.
-
Licensing and Intellectual Property
After watching this video; you will be able to identify characteristics of licensing and intellectual property that pertain to information security.
-
Log Reviews
After watching this video; you will be able to use log reviews as part of security control testing.
-
Malicious Code Attacks
After watching this video; you will be able to describe the use of malicious code or malware in access control attacks.
-
Marking and Labeling Media
After watching this video; you will be able to establish best practices for marking and labeling media.
-
Maturity Models
After watching this video; you will be able to identify characteristics of capability maturity models and their role in software development lifecycle security.
-
Measuring and Monitoring Risk
After watching this video; you will be able to identify best practices for measuring and monitoring risk.
-
Media Asset Retention
After watching this video; you will be able to identify best practices to appropriately retain media assets.
-
Memory and Virtualization
After watching this video; you will be able to distinguish between memory protection and virtualization security capabilities within information systems.
-
Minimum Security Requirements
After watching this video; you will be able to identify best practices when establishing minimum security requirements for acquisition activities.
-
Misuse Case Testing
After watching this video; you will be able to use misuse case testing as a security control testing technique.
-
Mitigating Access Control Attacks
After watching this video; you will be able to describe mitigation strategies for access control attacks.
-
Monitoring and Privacy Policies
After watching this video; you will be able to identify best practices for incorporating monitoring and privacy considerations in security policies.
-
Monitoring Special Privileges
After watching this video; you will be able to describe best practices for monitoring special privileges in security operations.
-
Multilayer Protocols
After watching this video; you will be able to describe common protocols and their layer in the relevant models.
-
Multi-level Security Models
After watching this video; you will be able to identify characteristics of multi-level security models.
-
Multimedia Collaboration
After watching this video; you will be able to identify options for securing multimedia channels in the network.
-
Multiple Processing Sites
After watching this video; you will be able to identify characteristics of multiple processing sites.
-
Network Access Control Devices
After watching this video; you will be able to describe network access control and the components of a NAC system.
-
Network Models
After watching this video; you will be able to describe the TCP/IP and the OSI network models.
-
Network Security and Vulnerability Management
After watching this video; you will be able to describe network security management techniques.
-
Nonrepudiation
After watching this video; you will be able to identify the role of nonrepudiation when applying cryptography.
-
Operational Investigation Requirements
After watching this video; you will be able to identify requirements for operational investigations.
-
Organizational Code of Ethics
After watching this video; you will be able to identify best practices for compliance with organizational code of ethics.
-
Outsourcing Considerations
After watching this video; you will be able to identify best practices for ensuring risk considerations are applied when outsourcing hardware; software and services.
-
Overview of Change Management in Security Operations
After watching this video; you will be able to identify the role of change management in security operations.
-
Overview of Cryptography
After watching this video; you will be able to describe cryptography features and history.
-
Overview of Disaster Recovery
After watching this video; you will be able to identify the role of disaster recovery in security operations.
-
Overview of Patch and Vulnerability Management
After watching this video; you will be able to identify the role of patch and vulnerability management in security operations.
-
Parallel Testing
After watching this video; you will be able to identify best practices for performing a parallel test of a recovery plan.
-
Patch Installation and Deployment
After watching this video; you will be able to describe best practices for patch installation and deployment.
-
Patch Management Audit and Assessment
After watching this video; you will be able to describe best practices for auditing and assessing patch management activities.
-
Patch Management Consistency and Compliance
After watching this video; you will be able to describe best practices for ensuring patch management consistency and compliance.
-
Patch Prioritization and Scheduling
After watching this video; you will be able to describe best practices for patch prioritization and scheduling activities.
-
Patch Testing
After watching this video; you will be able to describe best practices for patch testing activities.
-
Penetration Testing
After watching this video; you will be able to use penetration testing as a method for conducting security control testing.
-
Performing Reduction Analysis
After watching this video; you will be able to identify best practices when performing a reduction analysis.
-
Perimeter Security Controls
After watching this video; you will be able to identify appropriate perimeter security controls.
-
Personnel Asset Retention
After watching this video; you will be able to identify best practices to appropriately retain personnel assets.
-
Personnel Security Compliance Policies
After watching this video; you will be able to identify best practices for establishing personnel security compliance policies.
-
Personnel Security Privacy Policies
After watching this video; you will be able to identify best practices for implementing personnel security policies.
-
Physical Protection Programs
After watching this video; you will be able to describe the role of physical protection programs in operational security.
-
Privacy Requirements Compliance
After watching this video; you will be able to apply privacy requirement compliance in information system security practices.
-
Provisioning Access
After watching this video; you will be able to describe the identity access lifecycle provisioning stage.
-
Recovery Plan Read-through
After watching this video; you will be able to identify best practices when performing a recovery plan read-through.
-
Recovery Plan Walkthrough
After watching this video; you will be able to identify best practices for performing recovery plan walkthroughs.
-
Recovery Site Strategies
After watching this video; you will be able to distinguish between recovery site options.
-
Regulatory Investigation Requirements
After watching this video; you will be able to identify requirements for regulatory investigations.
-
Remediating Threats Using Technologies
After watching this video; you will be able to distinguish between different technologies and processes that can be used to remediate threats.
-
Remote Access and Connections
After watching this video; you will be able to describe remote access options and security considerations for the network.
-
Remote Management and User Technologies
After watching this video; you will be able to identify remote management and users technologies used in network environments.
-
Reporting Test Outputs
After watching this video; you will be able to identify best practices for reporting security assessment and testing results.
-
Resource Security through Configuration Management
After watching this video; you will be able to identify best practices for using configuration management as a technique to secure resources.
-
Restricted and Work Area Security
After watching this video; you will be able to identify best practices for securing restricted work areas.
-
Reviewing IS Training Information for Relevancy
After watching this video; you will be able to identify best practices for conducting periodic reviews for content relevancy.
-
Revoking Access
After watching this video; you will be able to describe the identity access lifecycle revoking access stage.
-
Risk Control Types
After watching this video; you will be able to distinguish between preventive; detective; and corrective risk control types.
-
Rule-based Access Control
After watching this video; you will be able to describe the functioning of rule-based access control systems.
-
Sandboxing
After watching this video; you will be able to identify best practices for using sandboxing as a preventative measure.
-
Scoping and Tailoring
After watching this video; you will be able to use scoping and tailoring to determine appropriate security controls.
-
Securing Applications
After watching this video; you will be able to identify best practices for securing applications.
-
Securing Asset Inventory
After watching this video; you will be able to identify best practices for securing asset inventory.
-
Securing Cloud Assets
After watching this video; you will be able to describe best practices for securing cloud assets.
-
Securing Networks and Hardware
After watching this video; you will be able to describe security of networks and hardware network design security considerations.
-
Securing Physical Assets
After watching this video; you will be able to describe best practices for securing physical assets.
-
Securing Virtual Assets
After watching this video; you will be able to describe best practices for securing virtual assets.
-
Security and Patch Information Sources
After watching this video; you will be able to identify best practices for vetting information required for patch and vulnerability management activities.
-
Security Controls and Metrics
After watching this video; you will be able to define security controls and metrics as part of a risk management framework.
-
Security Impact Analysis
After watching this video; you will be able to describe the role of a security impact analysis in change management.
-
Security in Iterative Development Methodologies
After watching this video; you will be able to describe characteristics of iterative development methodologies and their role in software development security.
-
Security in Non-iterative Development Methodologies
After watching this video; you will be able to describe characteristics of non-iterative development methodologies and their role in software development security.
-
Security Information and Event Management
After watching this video; you will be able to describe characteristics of SIEM.
-
Security Investigations Overview
After watching this video; you will be able to identify characteristics of security investigations.
-
Security Procedures
After watching this video; you will be able to identify best practices for developing and implementing documented security procedures.
-
Security Professional Role and Responsibilities
After watching this video; you will be able to identify the role of security professionals in asset security.
-
Security Standards and Guidelines
After watching this video; you will be able to identify best practices for developing and implementing documented security standards and guidelines.
-
Security Threats
After watching this video; you will be able to identify categories of threats that organizations face.
-
Selecting Controls and Countermeasures
After watching this video; you will be able to identify best practices for selecting controls and countermeasures based on security evaluation models.
-
Selecting Countermeasures
After watching this video; you will be able to select risk countermeasures.
-
Senior Manager Role and Responsibilities
After watching this video; you will be able to identify the role of senior managers in asset security.
-
Service-level Agreements in Security Operations
After watching this video; you will be able to describe the role of service-level agreements in security operations.
-
Service-level Requirements
After watching this video; you will be able to use an SLA to define appropriate service-level requirements.
-
Site and Facility Planning Considerations
After watching this video; you will be able to identify site and facility design considerations.
-
Site and Facility Security Assessments
After watching this video; you will be able to identify elements of site and facility security assessments.
-
Social Engineering Attacks
After watching this video; you will be able to describe social engineering attacks related to access control.
-
Software Assurance Best Practices
After watching this video; you will be able to identify the general questions that should be answered as part of an effective software assurance policy.
-
Software Assurance Phases
After watching this video; you will be able to distinguish between the three major phases of SwA.
-
Software Development Lifecycle Operations Security
After watching this video; you will be able to identify secure operations and maintenance best practices during the software development lifecycle.
-
Software Environment Security
After watching this video; you will be able to distinguish between security controls and best practices for the software environment.
-
Software Security Acceptance Testing
After watching this video; you will be able to describe acceptance testing best practices when assessing the effectiveness of software security.
-
Software Security Risk Analysis and Mitigation
After watching this video; you will be able to describe risk analysis and mitigation best practices when assessing the effectiveness of software security.
-
Source-code Level Security Vulnerabilities
After watching this video; you will be able to identify source-code level security vulnerabilities and methods to mitigate risk from them.
-
Spoofing and Vulnerability Attacks
After watching this video; you will be able to describe spoofing and vulnerability attacks and identify mitigation strategies.
-
Standards Selection
After watching this video; you will be able to use standards selection to determine appropriate security controls.
-
Storing Media
After watching this video; you will be able to establish best practices for storing media.
-
Symmetric Cryptography
After watching this video; you will be able to identify characteristics of symmetric cryptography.
-
Synthetic Transactions
After watching this video; you will be able to use synthetic transactions as a security control testing technique.
-
System Resilience and Fault Tolerance Requirements
After watching this video; you will be able to identify best practices for ensuring system resilience and fault tolerance.
-
Systems Security Evaluation Models
After watching this video; you will be able to distinguish between security evaluation models.
-
Test Coverage Analysis
After watching this video; you will be able to perform test coverage analysis as part of security control testing.
-
The (ISC)² Code of Professional Ethics
After watching this video; you will be able to follow the (ISC)2 Code of Professional Ethics.
-
The Change Management Process
After watching this video; you will be able to distinguish between the different phases of a change management process.
-
The EMO Management Team
After watching this video; you will be able to identify the key responsibilities of the EMO management team.
-
The Project Scope and Plan
After watching this video; you will be able to develop and document a project scope and plan.
-
The Systems Development Life Cycle
After watching this video; you will be able to distinguish between the basic phases of the SDLC.
-
Third-Party Assessment and Monitoring
After watching this video; you will be able to recognize third-party assessment and monitoring techniques for risk mitigation.
-
Third-party Audits
After watching this video; you will be able to identify best practices for performing third-party audits.
-
Third-Party Security Services
After watching this video; you will be able to identify best practices for using third-party security services as a preventative measure.
-
Trans-border Data Flow
After watching this video; you will be able to identify characteristics of trans-border data flow issues that pertain to information security.
-
Travel Security Policies
After watching this video; you will be able to identify travel security best practices to incorporate in security policies.
-
Trusted Platform Module (TPM)
After watching this video; you will be able to identify characteristics of TPM as a security capability within information systems.
-
Unauthorized Physical Access Attacks
After watching this video; you will be able to describe unauthorized physical access attacks.
-
User Accountability and Session Management
After watching this video; you will be able to identify areas of accountability with respect to authentication; including session management tasks; such as locking workstations and setting screensaver timeouts.
-
User Role and Responsibilities
After watching this video; you will be able to identify the role of user in asset security.
-
Using Asset Management for Resource Protection
After watching this video; you will be able to use hardware and software asset management as a resource protection technique.
-
Using Firewalls as a Preventative Measure
After watching this video; you will be able to describe best practices for operating and maintaining firewalls as a preventative measure.
-
Using Media Management for Resource Protection
After watching this video; you will be able to use media management as a resource protection technique.
-
Using Organizational Processes
After watching this video; you will be able to use organizational processes as a method to apply security governance principles.
-
Using Security Roles and Responsibilities
After watching this video; you will be able to use security roles and responsibilities as a method to apply security governance principles.
-
Utilities and HVAC Considerations
After watching this video; you will be able to identify best practices for safely and securely integrating utilities and HVAC systems in the physical environment.
-
Validating Assessment and Test Strategies
After watching this video; you will be able to identify best practices when validating assessment and test strategies.
-
Valuating Assets
After watching this video; you will be able to specify the purpose of valuating assets.
-
Vendor; Consultant; and Contractor Controls
After watching this video; you will be able to identify best security control practices when partnering with vendors; consultants; and contractors.
-
Versioning and Baselining
After watching this video; you will be able to describe the role of versioning and baselining in change management.
-
Voice
After watching this video; you will be able to describe security options for voice channel in converged and non-converged networks.
-
Vulnerability Assessment
After watching this video; you will be able to perform a vulnerability assessment.
-
Vulnerability Management Systems
After watching this video; you will be able to select appropriate vulnerability management systems.
-
Whitelisting and Blacklisting
After watching this video; you will be able to identify best practices for using whitelisting and blacklisting as a preventative measure.
-
Wireless Networks
After watching this video; you will be able to describe wireless networking and the options for securing wireless networks.
-
Active Directory
The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how the Active Directory trust model can be used to help create a secure network environment.
-
ActiveX
In this video; Dan LaChance discusses how ActiveX issues can affect network security in CompTIA CASP CAS-002.
-
Advanced Authentication
The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how advanced authentication can help in creating a secure network environment.
-
Advanced Authorization
The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how advanced authorization is used to help create a secure network environment.
-
Advanced Configuration of Network Devices
The CompTIA CASP CAS-002 exam covers common advanced security configuration settings; and security features provided by network devices. In this video; Glen Clarke provides discusses security features; such as transport security; trunk security; route protection; security features on switches and routers; and wireless access points and port forwarding.
-
Assessment; Sandboxing; and Debugging
In this video; Steven Crawford explains some testing methods that can be used to secure your network.
-
Asset Control & Data Ownership and Handling
In this video; Glen E. Clarke discusses how asset control; data ownership; and data handling contribute to incident response and recovery procedures.
-
Attestation and Identity Propagation
The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how attestation and identity propagation can help in creating a secure network environment.
-
Auditing and Continuous Monitoring
It is critical that your security policy contains additional policies related to the level of monitoring and auditing that should occur within the organization. In this video; Glen E. Clarke discusses auditing and continuous monitoring policies.
-
Baselining of Networking and Security Components
When preparing for the CompTIA CASP CAS-002 examination; you will be expected to know the importance of baselining and monitoring a system; in order to ensure high availability and redundancy. In this video; Glen Clarke demonstrates baselining of networking and security components.
-
Benchmarks and Baselines
In this video; Steven Crawford explains how to use network traffic analysis to create benchmarks to monitor and improve network security.
-
Best Practices & New Technologies for Security Systems
In this video; Steven Crawford discusses policy-based; technology-based; and research-based best practices for securing systems.
-
BIOS and Unified Extensible Firmware Interface
In this video; Glen E. Clarke introduces the Unified Extensible Firmware Interface (UEFI).
-
Black Box; White Box; and Gray Box Testing
In this video; Steven Crawford discusses the different methods of penetration testing.
-
Building Automation; Physical; and Industrial Controls
The CompTIA CASP CAS-002 exam covers physical security features; such as Building Automation System (BAS); physical access controls; and industrial controls. These are key components of a highly secure environment. In this video; Glen Clarke discusses the features of these controls; and provides examples of how they may best be used to provide additional security measures.
-
Business Continuity Planning
In preparing for the CompTIA CASP CAS-002 certification; you need to perform business continuity planning; which consists of six phases. In this video; Glen E. Clarke demonstrates the need for business continuity planning and he explains the each of the phases that are involved in the recovery of a business after a disaster.
-
Chain of Custody
After watching this video; you will be able to describe characteristics and best practices of chain of custody during forensic investigation activities.
-
Chain of Trust and Root of Trust
Root of trust and chain of trust are important concepts in the world of modern network security. In this video; Steven Crawford discusses the modern network security concepts of chain of trust and root of trust.
-
Change Management; Operations; and Maintenance
In this video; Dan LaChance discusses how change management; operations; and maintenance are used to secure network environments in CompTIA CASP CAS-002.
-
CIA Aggregate Scores
In preparing for the CompTIA CASP CAS-002 exam; you need to understand how to analyze confidentiality; integrity; and availability (CIA) aggregate scores. CIA aggregate scores help identify the value and associated type of security controls to be placed on assets. In this video; Glen E. Clarke demonstrates how to interpret CIA aggregate scores for security purposes.
-
CIA Decisions; Requirements; and Policies
The CompTIA CASP CAS-002 exam covers how to execute risk management strategies and controls. Confidentiality; integrity; and availability (CIA) decisions; requirements and policies are a key aspect of this. CIA is the foundation of security and maintaining CIA is the ultimate goal of information security. In this video; Glen E. Clarke discusses CIA implementation and the controls to facilitate CIA.
-
Clickjacking
Click jacking occurs when an attacker overlays content over a valid webpage invoking completely different code. In this video; Dan la Chance discusses how click jacking can compromise network security in CompTIA CASP CAS-002.
-
Client-Side Attacks; Vulnerabilities; and Threats
In this video; Steven Crawford explains how complex network security solutions for data flow are used to secure network environments in CompTIA CASP CAS-002.
-
Client-Side Processing vs. Server-Side Processing
In this video; Dan LaChance discusses how client-side processing affects network security in comparison to server-side processing in CompTIA CASP CAS-002.
-
Cloud and Virtualization Considerations and Options
The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how cloud and virtualized environments affect network security.
-
Cloud Managed Networks
In preparing for the CompTIA CASP CAS-002 exam; you need to know about cloud-managed networks and the benefits they have to offer. This includes low cost; high availability; scalability; and low maintenance. In this video; Glen Clarke discusses cloud managed networks and their advantages.
-
Code Signing and Digital Signatures
Cryptography is used to secure messages and hide information from those who would seek to steal it. It endorses unique concepts and techniques to manage security implications associated with enterprise storage. In this video; Steven Crawford defines code signing and digital signatures.
-
Collaboration and Guidance
In this video; Dan LaChance discusses how different business units must collaborate and use security guidance in CompTIA CASP CAS-002.
-
Collaboration Sites
In this video; Dan LaChance discusses the need for security when working with collaboration sites in CompTIA CASP CAS-002.
-
Command Shell Restrictions
A restricted shell is one in which certain commands that would otherwise be available are disabled. In this video; Glen E. Clarke explains how command shell restrictions are used to secure network environments in CompTIA CASP CAS-002.
-
Commissioning; Reuse; and Disposal
In this video; Dan LaChance discusses how commissioning; reuse; and disposal affect network security in CompTIA CASP CAS-002.
-
Complex Network Security Solutions for Data Flow
The CompTIA CASP CAS-002 exam covers complex network security solutions for data flow. This includes two common traffic analysis techniques – SSL Inspection and Network Flow Data. In this video; Glen Clarke discusses the SSL Inspection and Network Flow Data techniques.
-
Computer Emergency Response Team
In this video; Steven Crawford discusses the roles; responsibilities; and reporting requirements of Computer Emergency Response Teams (CERTs).
-
Conferencing and Messaging Solutions
In this video; Dan LaChance discusses how conferencing and messaging solutions are used to secure network environments in CompTIA CASP CAS-002.
-
Continuity of Operation Plan
The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Glen E. Clarke discusses the importance of having a Continuity of Operation Plan in place in the event that security incidents occur.
-
Continuous Improvement and Monitoring
When preparing for the CompTIA CASP CAS-002 certification; you need to be able to monitor; manage; and improve IT systems within an organization. In this video; Glen E. Clarke discusses the continuous improvement and continuous monitoring of an IT system within an organization.
-
Conventions; Threat Actors; & Threat Intelligence
In this video; Steven Crawford considers how conventions; threats actors; and threat intelligence are used to create network security in CompTIA CASP CAS-002.
-
CRM; ERP; and GRC
The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how Customer Relationship Management (CRM); Enterprise Resource Planning (ERP); and Governance; Risk Management; and Compliance (GRC) are used to aid in creating a secure network environment.
-
Cross-Site Request Forgery
In this video; Dan LaChance explains how cross-site request forgery can compromise network security in CompTIA CASP CAS-002.
-
Cross-Site Scripting
Cross-site scripting is a very common application-layer web attack. In this video; Dan LaChance explains how cross-site scripting can compromise network security in CompTIA CASP CAS-002.
-
Cryptographic Applications Implementations and Key Escrow
With Key Escrow when you encrypt something with a secret key; you will store or place another copy of that key in Escrow. In the event that you lose your secret key; the data can be encrypted with the key that you have escrowed somewhere else. In this video; Steven Crawford discusses the implementation of cryptographic applications and Key Escrow.
-
Data Aggregation and Isolation
The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how data aggregation and isolation are used to aid in securing a network environment.
-
Data Loss Prevention and Patch Management
In preparing for the CompTIA CASP CAS-002 exam; you need to implement Data Loss Prevention (DLP) solutions and patch management. DLP solutions are designed to prevent users from sending sensitive data outside an organization. Patch management ensures that systems are kept updated. In this video; Glen E. Clarke discusses the features and uses of these processes.
-
Data Recovery and Reconstitution
In this video; Glen E. Clarke discusses data recovery and reconstitution in data breach situations.
-
Data Retention; Legal Holds; and Data Recovery
It is important from both a functional and a legal perspective that organizational communications be secured and preserved. In this video; Glen E. Clarke explains how data retention; legal holds; and data recovery are used to help secure a network environment.
-
Data Warehousing and Archiving
Data warehousing is used to make large amounts of data available to users within an organization. In this video; Steven Crawford discusses data warehousing and data archiving.
-
Database Activity Monitor
The CompTIA CASP CAS-002 certification includes knowledge of the security components in a network. These include intrusion detection systems; such as the Database Activity Monitor (DAM); which is designed to monitor database activity. In this video; Glen Clarke demonstrates database activity monitors.
-
Database and Network Administrators
In this video; Dan LaChance discusses the role of database and network administrators in network security implementations in CompTIA CASP CAS-002.
-
Dedicated Interfaces and Out-of-Band NICs
In this video; Glen E. Clarke discusses how dedicated interfaces and out-of-band NICs are used to secure network environments in CompTIA CASP CAS-002.
-
Deduplication and Dynamic Disk Pools
Tiered storage is the hierarchy of storage categories for storing different types of data in different storage. In this video; Steven Crawford discusses tiered storage.
-
Desktop Sharing; Remote Assistance; and Presence
In this video; Dan LaChance discusses how desktop sharing; remote assistance; and presence affect network security in CompTIA CASP CAS-002.
-
Detection and Collection
In this video; Glen E. Clarke discusses detection and collection with e-discovery.
-
Device Tracking Technologies
In this video; Dan LaChance discusses how device tracking technologies are used when securing a network environment in CompTIA CASP CAS-002.
-
DNS; CMDB; and CMS
The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how Domain Name System (DNS); Configuration Management Database (CMDB); and Content Management System (CMS) are used to aid in creating a secure network environment.
-
DRM; Watermarking; and GPG
Digital Rights Management or DRM helps to control the illegal duplication of software and digital content. The use of watermarking involves embedding information in digital files in the form of a label. GPG enables you to sign your data transmissions. In this video; Steven Crawford discusses the cryptographic techniques of DRM; watermarking; and GPG.
-
Encryption Types
When preparing for the CompTIA CASP CAS-002 exam; you need to know about the different types of encryption methods available. In this video; Dan LeChance demonstrates Full Disk Encryption using BitLocker and how to encrypt individual files using the Encrypted File System (EFS).
-
Endpoint Security Software
The CompTIA CASP CAS-002 exam covers a range of security controls; including endpoint security software. Endpoint security software is software placed at endpoints of a communication channel to secure them; thereby increasing the security posture of the whole network. In this video; Glen E. Clarke discusses the use of endpoint security software and provides several examples.
-
End-User Cloud Storage and Business Integration
In this video; Steven Crawford discusses how end-user cloud storage and business integration can affect network security
-
Entropy; Diffusion; and Confusion
Cryptography is used to secure messages and hide information from those who would seek to steal it. It endorses unique concepts and techniques to manage security implications associated with enterprise storage. In this video; Steven Crawford defines Entropy; Diffusion; and Confusion.
-
Error & Exception Handling and Privilege Escalation
Proper error and exception handling routines are essential to organizational security. In this video; Dan LaChance explains how error and exception handling; along with privilege escalation; are issues that must be dealt with in network security in CompTIA CASP CAS-002.
-
ESB; SOA; and Directory Services
The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how enterprise application integration enablers help to secure a network environment.
-
Existing Security Controls
In this video; Steven Crawford discusses the methods to evaluate existing security controls.
-
Exploitation Tools
In this video; Steven Crawford explains how exploitation tools can be used for penetration testing.
-
Extreme Planning and Worst Case Scenarios
The CompTIA CASP CAS-002 exam covers extreme planning and worst case scenarios in risk management planning. Considering worst case scenarios are essential for disaster planning and developing associated mitigation techniques. In this video; Glen E. Clarke discusses how extreme planning should be approached.
-
Facilities and Physical Security Managers
In this video; Dan LaChance discusses the role of facilities and physical security managers in network security implementations in CompTIA CASP CAS-002.
-
Federation
The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how federation can help in creating a secure network environment.
-
Forensic Analysis of a Compromised System
In this video; Glen E. Clarke discusses forensic analysis of a compromised system.
-
Fuzzing and Fault Injection
Fuzzing is a very important part of the system development life cycle. In this video; Dan LaChance explains how fuzzing and fault injection are issues that must be dealt with in network security in CompTIA CASP CAS-002.
-
Hash Matching in Cloud Environments
In this video; Glen E. Clarke discusses the benefits of cloud-based hashing.
-
Host Based Firewalls and Log Monitoring
The CompTIA CASP CAS-002 exam covers how to select and troubleshoot security controls for hosts; including host-based firewalls and log monitoring. Host-based firewalls control communication to a specific system; while log monitoring systems collect and analyze data as well as notifying users of suspicious activity. In this video; Glen E. Clarke discusses how these can be used to improve security.
-
HTML5
In this video; Dan LaChance discusses how HTML5 issues can affect network security in CompTIA CASP CAS-002.
-
Human Resources and Emergency Response
In this video; Dan LaChance discusses the role of human resources and emergency response in network security implementations in CompTIA CASP CAS-002.
-
HVAC Controllers and Sensors
The CompTIA CASP CAS-002 certification covers the Heating; Ventilation and Air Conditioning (HVAC) system which is vital in preventing assets overheating. Proper temperature is key to maintaining the availability of information. In this video; Glen Clarke discusses the features of the HVAC system as well as how layout of server racks can influence temperature control.
-
IA; ISA; MOU; and SLA
In this video; Glen E. Clarke discusses the business documents that should be in place to support the security of your organization.
-
Impact of De-Perimeterization
The CompTIA CASP CAS-002 exam covers how constant changing network boundaries impact network security. In this video; Glen E. Clarke discusses network security considerations inherent to an environment where the network boundaries are constantly changing.
-
Implications of Cryptographic Methods and Design
Cryptography not only protects data being stolen or altered; it can also be used for user authentication. In this video; Steven Crawford explains the implications of cryptographic methods and design in CompTIA CASP CAS-002.
-
Incident Response and Forensic Tasks
In this video; Glen E. Clarke explains how to use user policies to create a secure network environment; specifically policies related to incident response and forensic tasks.
-
Industry-Accepted Application Security Frameworks
Application security frameworks alleviate the overhead associated with regular tasks performed in application security. In this video; Dan LaChance explains the benefits of accepted application security frameworks in CompTIA CASP CAS-002.
-
INE; SIEM; and HSM
When preparing for the CompTIA CASP CAS-002 exam; you need to know about security technologies that are used to create secure networks. In this video; Glen Clarke discusses the Inline Network Encryptor (INE) device; the Security Information and Event Management (SIEM) software; and the Hardware Security Modules (HSM) device.
-
Reconnaissance; Fingerprinting; and Social Engineering
In this video; Steven Crawford explains how penetration testing methods should be used to help secure network environments.
-
Strength vs. Performance vs. Feasibility to Implement vs. Interoperability
Cryptography is used to secure messages and hide information from those who would seek to steal it. It endorses unique concepts and techniques to manage security implications associated with enterprise storage. In this video; Steven Crawford defines strength vs. performance vs. feasibility to implement vs. interoperability.
-
System Specific Risk Analysis
When preparing for the CompTIA CASP CAS-002 certification; you need to understand system specific risk analysis. This involves identifying all assets; identifying the threats against those assets; prioritizing the threats; and finally developing mitigation plans for those threats. In this video; Glen E. Clarke demonstrates how to approach a system specific risk analysis.
-
System; Audit; and Review Logs
In this video; Glen E. Clarke discusses the importance of logging and auditing when performing incident response.
-
Telephony
In this video; Dan LaChance discusses how telephony must be secured in CompTIA CASP CAS-002.
-
Testing and Agile; Waterfall; and Spiral Methodologies
In this video; Dan LaChance discusses how testing and agile; waterfall; and spiral methodologies are used when securing a networked environment in CompTIA CASP CAS-002.
-
The CIA Triad and Non-Repudiation
Cryptography is used to secure messages and hide information from those who would seek to steal it. It endorses unique concepts and techniques to manage security implications associated with enterprise storage. In this video; Steven Crawford defines the CIA triad and non-repudiation.
-
The Virtual Desktop Infrastructure
In this video; Glen E. Clarke discusses the security challenges associated with Virtual Desktop Infrastructure.
-
Third Party Information Security
When preparing for the CompTIA CASP CAS-002 examination; you're expected to know about allowing third-party providers access to company data. In this video; Glen E. Clarke discusses security considerations when allowing third-party providers access to company data.
-
TPM; VTPM; and HSM
In this video; Glen E. Clarke explains how Hardware Security Modules and Trusted Platform Modules are used to secure network environments.
-
Training and Awareness and Employment Termination
The security policy should include specifications on how employees are hired and terminated and trained. In this video; Glen E. Clarke discusses training and awareness policies and employment policies.
-
Transport and Data at Rest Encryption
Cryptography is used to secure messages and hide information from those who would seek to steal it. It endorses unique concepts and techniques to manage security implications associated with enterprise storage. In this video; Steven Crawford defines how to use transport and data at rest encryption.
-
Transport Encryption
You can use transport encryption to ensure secure communication with remote systems. In this video; Glen E. Clarke discusses the concept of transport encryption and its advantages.
-
Trend Data and Cyber Defense
In this video; Steven Crawford explains how to use trend data analysis to anticipate the cyber defense aids you may need.
-
Trusted OS
In this video; Glen E. Clarke explains how and when a trusted OS configuration would be used to secure a networked environment in CompTIA CASP CAS-002.
-
Unified Threat Management
When preparing for the CompTIA CASP CAS-002 examination; you're expected to know about the security devices and technologies required for Unified Threat Management (UTM). In this video; Glen E. Clarke discusses the concept of UTM; its components; and how UTM can help to secure a network infrastructure.
-
Usability; Maintainability; Availability; and Recovery
In this video; Steven Crawford explains how the usability; maintainability; availability; and recoverability of security devices should be considered.
-
User Policies
In this video; Dan LeChance explains how to use user policies to create a secure network environment; specifically policies related to incident response and forensic tasks.
-
Virtual and Cloud Storage
In this video; Steven Crawford defines how virtual and cloud storage works in CompTIA CASP CAS-002.
-
VM Escape
In this video; Glen E. Clarke discusses virtual machine environment security requirements.
-
NAS; SAN; and vSAN
In CompTIA CASP CAS-002; you can use different storage devices like Network Attached Storage or NAS; Storage Area Network or SAN; and Virtual Storage Area Network or vSAN for various purposes. In this video; Steven Crawford discusses the NAS; SAN; and vSAN storage options.
-
Network Analysis Tools
In this video; Steven Crawford explains how network analysis tools are used to secure your environment.
-
Network Authentication Methods and 802.1x
The CompTIA CASP CAS-002 exam covers advanced levels of security. This includes network authentication and authentication protocols. In this video; Glen E. Clarke discusses the various methods of network authentication; such as passwords; PINs; and smartcards; and the types of authentication protocols which accompany these types.
-
Network Management and Monitoring Tools
The CompTIA CASP CAS-002 exam covers the use of network management and monitoring tools in securing network; as well as the types of activities you should monitor. In this video; Glen Clarke discusses the network management and monitoring tools.
-
Network Secure Segmentation and Delegation
The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how network secure segmentation and delegation can affect network security.
-
Networking and Security Components
The CompTIA CASP CAS-002 exam covers how common security components can be used in conjunction to secure a network environment. In this video; Glen E. Clarke discusses how the security features of network switches; wireless controllers; routers; and proxy servers are used collectively to add to the security of an environment.
-
NIPS and NIDS
Network Intrusion Detection Systems; or NIDS; identify suspicious activities in a network or a system; Network Intrusion Prevention Systems; or NIPS; take corrective action to block that suspicious traffic. In this video; Glen E. Clarke discusses network security with NIPS and NIDS.
-
Object Tracking and Containment Technologies
In this video; Dan LaChance discusses how object tracking and containment technologies are used when securing a network environment in CompTIA CASP CAS-002.
-
OLA; NDA; and BPA
In this video; Glen E. Clarke discusses the three business documents that should be in place to support security in an organization.
-
Order of Volatility
The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Glen E. Clarke describes how the Order of Volatility will allow you to recover from security incidents.
-
Over-the-Air Technologies
In this video; Dan LaChance discusses how over-the-air technologies can be secured in a network environment in CompTIA CASP CAS-002.
-
Passive Reconnaissance and Intelligence Gathering Tools
In this video; Steven Crawford explains how you can use passive intelligence gathering to make your system less vulnerable to attackers.
-
Performance; Latency; Scalability; and Capability
In this video; Steven Crawford explains how features of network security must meet the business needs of the enterprise.
-
Peripheral Restrictions
In this video; Dan LeChance explains how peripheral restrictions are used to secure network environments in CompTIA CASP CAS-002.
-
Policies; Processes; and Procedures for Change
In this video; Glen E. Clarke discusses the need to update policies and processes or procedures regularly.
-
Privacy Principles and PII
In this video; Glen E. Clarke discusses privacy principles and personally identifiable information.
-
Privilege Elevation and Data Remnants
In this video; Glen E. Clarke discusses privilege elevation and data remnants as challenges to network security.
-
Prototypes and Testing
In this video; Steven Crawford discusses how prototypes and testing are used to create network security in CompTIA CASP CAS-002.
-
Pseudo Number Generation and Perfect Forward Secrecy
Cryptography is used to secure messages and hide information from those who would seek to steal it. It endorses unique concepts and techniques to manage security implications associated with enterprise storage. In this video; Steven Crawford defines pseudo number generation and perfect forward secrecy.
-
RA; SOA; and BIA
In this video; Glen E. Clarke discusses the business documents that should be in place in an organization to support its security goals.
-
Race Conditions; Resource Exhaustion; and Geo-Tagging
In this video; Dan LaChance discusses how race conditions; resource exhaustion; and geo-tagging can affect network security in CompTIA CASP CAS-002.
-
RADIUS
The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes the Remote Authentication Dial In User Service (RADIUS) trust model and how it can be used to help create a secure network environment.
-
Remote Desktop Protocol and Virtual Network Computing
Remote connection software allows you to access a system from the internet and remotely administer the computer. In this video; Glen E. Clarke discusses the use of Remote Desktop Protocol or RDP and Virtual Network Computing or VNC remote connections software.
-
Remote Desktop Services and App-V
In this video; Glen E. Clarke discusses security features that address challenges associated with two Windows remote technologies: Remote Desktop Services (RDS) and App-V.
-
Resources Provisioning and De-Provisioning
The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how provisioning and de-provisioning of resources affect network security.
-
Response and Disclosure
When a data breach occurs; it is essential that the response be swift and efficient; and then the breach must be disclosed. In this video; Glen E. Clarke discusses response and disclosure in data breach situations.
-
Return on Investment and Total Cost of Ownership
The CompTIA CASP CAS-200 certification covers the use of metrics to assess organizational risk as part of assessing the advanced level security skills and knowledge of IT practitioners. In this video; Glen E. Clarke demonstrates how to use two metrics to analyze risk: Return on Investment (ROI) and Total Cost of Ownership (TCO).
-
Reverse Engineering Solutions
In this video; Steven Crawford explains how to deconstruct existing security solutions to improve enterprise security.
-
RFPs; RFQs; FRIs; and Agreements
Clear and precise documentation is crucial to secure application development. In this video; Steven Crawford; discusses the role RFPs; RFQs; FRIs; and agreements that play in network security in CompTIA CASP CAS-002.
-
Risk Appetite Strategies
In preparing for the CompTIA CASP CAS-200 certification; you need to perform a risk analysis and interpret the results successfully. In this video; Glen E. Clarke discusses how to handle potential risks to assets if risks have been identified within an organization.
-
Risk Management Processes
When preparing for the CompTIA CASP CAS-002 examination; you're expected to understand the internal and external influences that could impact the security of a business. In this video; Glen E. Clarke discusses some of the key internal and external influences that could affect an organization's security.
-
Sales Staff and Programmers
In this video; Dan LaChance discusses the role of sales staff and programmers in network security implementations in CompTIA CASP CAS-002.
-
Sandboxing and Content Filtering in Cloud Environments
In this video; Glen E. Clarke discusses some cloud-based security features.
-
SCADA and Industrial Control Systems
The CompTIA CASP CAS-002 certification covers the Supervisory Control and Data Acquisition (SCADA) system which is a system that communicates with other systems for monitoring purposes of remote equipment. SCADA is one type of Industrial Control System (ICS). In this video; Glen Clarke discusses the features of SCADA and where it's typically used.
-
Secure Boot and Measured Launch
In this video; Glen E. Clarke discusses ways of securing the boot environment.
-
Secure Coding Standards
In this video; Dan LaChance explains secure coding standards and how they can be used to increase network security in CompTIA CASP CAS-002.
-
Secure Data Flows to Meet Changing Business Needs
In this video; Dan LaChance explains how secure data flows can be used to meet changing business needs in CompTIA CASP CAS-002.
-
Secure Infrastructure Design
The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how a secure infrastructure design is used when creating network security plans.
-
Secure Use of On-demand Cloud Computing
The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes secure on-demand cloud computing.
-
Securing Virtual Environments
The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes securing virtual environments.
-
Securing Virtualized Servers
In this video; Dan LeChance discusses securing virtualized servers in network environments in CompTIA CASP CAS-002.
-
Security Concerns of Integrating Diverse Industries
When preparing for the CompTIA CASP CAS-002; you need to interpret business and industry influences and understand associated security risks; such as the security concerns of integrating industries. As different industries have different functionalities and security focuses; when integrating it is essential to ensure rules and policies are merged. In this video; Glen E. Clarke discusses the security issues around this.
-
Security Group Policy Implementations
In this video; Glen E. Clarke reviews how security group policy implementations are used to secure network environments in CompTIA CASP CAS-002.
-
Security Requirements Traceability Matrix
In this video; Dan LaChance discusses how to use the Security Requirements Traceability Matrix in CompTIA CASP CAS-002.
-
Session Management and Input Validation
In this video; Dan LaChance discusses how session management and input validation can be used to ensure network security in CompTIA CASP CAS-002.
-
Software-Defined Network
The CompTIA CASP CAS-002 certification covers software-defined networking. You need to be familiar with the Control plane and the Data plane; and how these components communicate using the OpenFlow protocol. In this video; Glen Clarke discusses software-defined networking.
-
SQL Injection
SQL injection attacks can destroy databases. In this video; Dan LaChance explains how SQL injections compromise network security in CompTIA CASP CAS-002.
-
SSL; SSH; S/MIME
Secure Socket Layer; Secure Shell; and Secure MIME are important protocols in the world of Internet security. In this video; Steven Crawford discusses SSL; SSH; and S/MIME protocols.
-
Standard Operating Environment Configuration Baselines
In this video; Glen E. Clarke explains how Standard Operating Environment configuration baselines are used to secure network environments in CompTIA CASP CAS-002.
-
Standards
After watching this video; you will be able to distinguish between testing standards for software quality assurance.
-
Steganography
Cryptography is used to secure messages and hide information from those who would seek to steal it. It endorses unique concepts and techniques to manage security implications associated with enterprise storage. In this video; Steven Crawford defines steganography.
-
Storage Integration
The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how storage integration can be used to aid in securing a network environment.
-
Storage of Sensitive Data
In this video; Dan LaChance explains the importance of proper storage of sensitive data in network environments in CompTIA CASP CAS-002.
-
Vulnerabilities Associated with Virtual Machines
The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how the vulnerabilities associated with virtual machines (VMs) will affect network security.
-
Web and NextGen Firewalls
Preparing for the CompTIA CASP CAS-002 exam; you need to know about the application and protocol-aware technologies that are leveraged in networking environments. In this video; Glen Clarke discusses the Web Application Firewall (WAF); NextGen firewall; and Passive Vulnerability Scanner technologies.
-
Web Application Security Design Considerations
In this video; Dan LaChance discusses how web application security design is used to secure network environments in CompTIA CASP CAS-002.
-
Web Services Security
In this video; Dan LaChance discusses how web services security affects network security in CompTIA CASP CAS-002.
-
Wild Cards; OCSP; and CRL
In this video; Steven Crawford discusses wild cards; OCSP; and CRL in CompTIA CASP CAS-002.
-
Zero Day Mitigation and Emergent Threats
In this video; Steven Crawford; discusses how zero-day and emergent threats can affect network security
-
Information Classification
The CompTIA CASP CAS-002 certification assesses your ability to execute risk mitigation planning; strategies and control; including information classification. Information classification is used to place value on types of information so that appropriate protection mechanisms can be assigned. The two major types of classification are governmental and commercial. In this video; Glen E. Clarke discusses information classification techniques and their uses.
-
Insecure Direct Object References
In this video; Dan LaChance explains how insecure direct object references can compromise network security in CompTIA CASP CAS-002.
-
Integrity Measurement Architecture
In this video; Glen E. Clarke discusses how IMA contributes to securing network environments.
-
Internal and External Influences
When preparing for the CompTIA CASP CAS-002 examination; you're expected to understand the internal and external influences that could impact the security of a business. In this video; Glen E. Clarke discusses some of the key internal and external influences that could affect an organization's security.
-
Internal and External Violations
When security incidents occur; part of providing an appropriate level of analysis is considering the impact of internal and external violations on network security. In this video; Glen E. Clarke discusses how internal and external violations affect network security.
-
Interoperability Issues
The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how interoperability issues affect network security.
-
IP Video and A/V Controls
When preparing for the CompTIA CASP CAS-002 examination; you're expected to know that networking environments may have IP video equipment and Audio/Visual (A/V) controls connected to them. In this video; Glen Clarke discusses the different types of video equipment available for connection to the network; and the features of each.
-
IPv6 and Associated Transitional Technologies
In preparation for the CompTIA CASP CAS-002 examination; you should understand the reasons for IPv6 replacing IPv4 and the functioning of IPv6. In this video; Glen Clarke uses discusses the reasons for the transition from IPv4 to IPv6 and highlights ways to make IPv6 addresses more efficient.
-
iSCSI and FCoE
Internet Small Computer System Interface or iSCSI is a networking standard that is used to connect remote data storage locations. In this video; Steven Crawford discusses iSCSI and Fiber Channel over Ethernet; or FCoE.
-
Issuance and Object Support
Cryptography is used to secure messages and hide information from those who would seek to steal it. It endorses unique concepts and techniques to manage security implications associated with enterprise storage. In this video; Steven Crawford defines issuance; key escrow; and object support.
-
IT Governance
When preparing for the CompTIA CASP CAS-002 certification; you need to apply IT governance as part of your advanced level security skills. In this video; Glen E. Clarke discusses the role of IT dovernance when securing information within an organization.
-
Java Applets
Although they have the ability to run cross platform; java applets have a number of security issues. In this video; Dan LaChance discusses how Java applet issues can affect network security in CompTIA CASP CAS-002.
-
JavaScript and State Management
In this video; Dan LaChance discusses how JavaScript and state management can affect network security in CompTIA CASP CAS-002.
-
Judgment Calls
In this video; Steven Crawford discusses how security professionals can improve their ability to make good judgment calls.
-
Key Stretching and Hashing
In this video; Steven Crawford discusses key stretching and hashing in CompTIA CASP CAS-002.
-
Legal Compliance and Advocacy
In this video; Glen E. Clarke discusses legal compliance when creating and managing security policies.
-
Lessons Learned and After-Action Reports
In this video; Steven Crawford discusses the value of after-action reports for enhancing enterprise security.
-
Lightweight Direct Access Protocol
The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how the Lightweight Direct Access Protocol (LDAP) trust model can be used to help create a secure network environment.
-
Likelihood of Threat
In preparing for the CompTIA CASP CAS-002 exam; you need to understand how to perform a threat assessment. In this video; Glen E. Clarke discusses the process of identifying the likelihood of a threat on the assets of an organization.
-
Live VM Migration
In this video; Glen E. Clarke discusses the security challenges presented by live VM migration.
-
Logical and Physical Deployment Diagrams
The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how logical and physical deployment diagrams are used to create secure network environments.
-
LUN Masking and HBA Allocation
RAID is a data storage concept that involves a group of disks working as one disk for fault tolerance and better performance. In this video; Steven Crawford explains how to use RAID striping and mirroring.
-
Magnitude of Impact
The CompTIA CASP CAS-002 exam covers an advanced level security skills and knowledge of IT practitioners. In this video; Glen E. Clarke discusses the process of identifying the magnitude of impact a threat can have on IT assets within an organization and explores the formulas that are used to perform a Quantitative Risk Analysis.
-
Management and Data Interfaces
In this video; Glen E. Clarke discusses the use of ACLs; VLANs; and authentication servers in providing additional security for network device management in CompTIA CASP CAS-002.
-
Management and Finance
In this video; Dan LaChance discusses the role of management and finance in network security implementations in CompTIA CASP CAS-002.
-
Memory Leaks & Buffer and Integer Overflows
In this video; Dan LaChance discusses how memory leaks; buffer overflows; and integer overflows can damage network security in CompTIA CASP CAS-002.
-
Mergers; Acquisitions; and Divestitures
The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how mergers; acquisitions; and divestitures can affect network security.
-
Mesh Networks
The CompTIA CASP CAS-002 certification covers mesh networking and 80?.1x authentication. Mesh networking includes mush and partial-mesh networks. In this video; Glen Clarke discusses the characteristics of mesh networking and the function of 802.1x authentication for a supplicant accessing a network.
-
Metrics Collection and Analysis
In this video; Steven Crawford explains how to ensure the right security metrics are collected and analyzed.
-
Mitigation
In this video; Glen E. Clarke discusses mitigation techniques used for data breaches.
-
Multipath and Offsite or Multisite Replication
In this video; Steven Crawford discusses multipath and offsite or multisite replication in CompTIA CASP CAS-002.
-
Agile
After watching this video; you will be able to identify secure software concepts in the Agile methodology.
-
Anti-tampering Techniques
After watching this video; you will be able to list the steps for code signing.
-
Applicable Methods to Address Core Security Concepts
After watching this video; you will be able to distinguish between applicable methods to address core security concepts.
-
Attack Surface Evaluation
After watching this video; you will be able to measure and minimize attack surface.
-
Attack Surface Validation
After watching this video; you will be able to recognize characteristics of attack surface validation for software testing.
-
Authentication and Authorization Part 1
After watching this video; you will be able to recognize the characteristics of authentication and authorization.
-
Authentication and Authorization Part 2
After watching this video; you will be able to recognize the characteristics of authentication and authorization.
-
Authentication and Identity Management
After watching this video; you will be able to distinguish between characteristics of authentication and identity management.
-
Availability
One of the core concepts central to IT security is data availability. In this video; Travis Welton discusses what availability means; and outlines threats to data availability; including accidental and deliberate threats.
-
Backup; Recovery; and Archiving
After watching this video; you will be able to recognize characteristics of backup; recovery; and archiving.
-
Bootstrapping
After watching this video; you will be able to identify the role of bootstrapping in deployment activities.
-
Bug Tracking
After watching this video; you will be able to distinguish between bug tracking states.
-
Build Environment
After watching this video; you will be able to identify build-environment best practices.
-
Cloud Architectures
After watching this video; you will be able to recognize best practices for securing cloud architectures.
-
Code Analysis
After watching this video; you will be able to distinguish between static and dynamic code analysis.
-
Code Escrow and Data Exports
After watching this video; you will be able to identify the purpose of code escrow during supplier transitioning.
-
Code Reuse Plan Best Practice
After watching this video; you will be able to identify best practices for creating a practical reuse plan.
-
Complete Mediation
After watching this video; you will be able to recognize the characteristics of complete mediation.
-
Completion Criteria
After watching this video; you will be able to list the six generic criteria for judging the suitability of a product.
-
Concurrency
After watching this video; you will be able to recognize examples of using concurrency as a defensive coding practice.
-
Configuration Management Process
After watching this video; you will be able to distinguish between the six configuration management process activities.
-
Configuration Management Roles and Plan
After watching this video; you will be able to recognize characteristics of configuration management roles and plan.
-
Configuration Parameter Management
After watching this video; you will be able to recognize characteristics of configuration parameter management as a defensive coding practice.
-
Continuous Testing
After watching this video; you will be able to recognize characteristics of continuous testing.
-
Contracts
After watching this video; you will be able to identify contracts best practices during supplier transitioning.
-
Contractual Integrity Controls
After watching this video; you will be able to identify best practices for contractual integrity controls.
-
Control Identification and Prioritization
After watching this video; you will be able to identify characteristics of control identification and prioritization.
-
Corrective Action
After watching this video; you will be able to recognize options for addressing bugs.
-
Credential Management
After watching this video; you will be able to recognize characteristics of credential management.
-
Cryptographic Validation
After watching this video; you will be able to recognize characteristics of cryptographic validation.
-
Code Testing and Verification
After watching this video; you will be able to identify code testing and verification options for software development and testing.
-
Cryptology
After watching this video; you will be able to recognize examples of using cryptology as a defensive coding practice.
-
CWE
After watching this video; you will be able to locate and list the CWE list of software weaknesses.
-
Data Classification (Part 1)
After watching this video; you will be able to identify data state categories.
-
Data Classification (Part 2)
After watching this video; you will be able to identify data usage categories.
-
Data Lifecycle
After watching this video; you will be able to distinguish between generation; retention; and disposal.
-
Data Loss Prevention
After watching this video; you will be able to recognize characteristics of data loss prevention.
-
Data Ownership
After watching this video; you will be able to distinguish between the data owner and data custodian roles.
-
Database Security
After watching this video; you will be able to distinguish between database security techniques.
-
Declarative Security
After watching this video; you will be able to recognize characteristics of declarative security.
-
Deployment Environment
After watching this video; you will be able to identify the role of the deployment environment within functional requirements.
-
Design and Architecture Technical Review
After watching this video; you will be able to identify characteristics of design and architecture technical review.
-
Digital Rights Management (DRM)
After watching this video; you will be able to recognize types of REL in DRM.
-
Economy of Mechanism
After watching this video; you will be able to recognize the characteristics of economy of mechanism.
-
Environment
After watching this video; you will be able to identify environment best practices for ensuring secure software testing .
-
Exception Management
After watching this video; you will be able to recognize examples of using exception management as a defensive coding practice.
-
External Requirements
After watching this video; you will be able to identify typical external security requirements.
-
Fail-Safe
After watching this video; you will be able to recognize the characteristics of fail-safe.
-
Failure Testing
After watching this video; you will be able to recognize characteristics of testing for failure.
-
Fuzzing
After watching this video; you will be able to recognize characteristics of the fuzzing method.
-
Impact Assessment
After watching this video; you will be able to recognize characteristics of impact assessment.
-
Independent Testing
After watching this video; you will be able to recognize characteristics of independent testing.
-
Integrating with Existing Architectures
After watching this video; you will be able to recognize best security practices when integrating with existing architectures.
-
Intellectual Property
After watching this video; you will be able to identify best practices for preventing intellectual property theft.
-
Interconnectivity
After watching this video; you will be able to distinguish between interconnectivity activities best practices.
-
Internal Requirements
After watching this video; you will be able to identify typical internal security requirements.
-
Labeling
After watching this video; you will be able to distinguish between the different impact level definitions.
-
Least Common Mechanism
After watching this video; you will be able to recognize the characteristics of least common mechanism.
-
Least Privilege
After watching this video; you will be able to identify the characteristics of least privilege.
-
Legal
After watching this video; you will be able to distinguish between legal issues to keep in mind during the software lifecycle.
-
Legal Compliance
After watching this video; you will be able to recognize characteristics of legal compliance.
-
Logging and Auditing
After watching this video; you will be able to recognize examples of using logging and auditing as a defensive coding practice.
-
Managed Services Controls
After watching this video; you will be able to identify best secure control practices for managed services from a supplier.
-
Management Requirements
After watching this video; you will be able to identify characteristics of management requirements.
-
Memory Management
After watching this video; you will be able to recognize characteristics of memory management as a defensive coding practice.
-
Mobile Applications
After watching this video; you will be able to recognize best practices for securing mobile applications.
-
Monitoring and Incident Management
After watching this video; you will be able to identify monitoring and incident management best practices.
-
Non-Repudiation
After watching this video; you will be able to describe characteristics and best practices for applying non-repudiation.
-
Objects; Activities; and Actions
After watching this video; you will be able to distinguish between objects; activities; and actions.
-
Open Design
After watching this video; you will be able to recognize the characteristics of open design.
-
Operating Systems
After watching this video; you will be able to recognize characteristics of operating systems.
-
Operations Requirements
After watching this video; you will be able to identify characteristics of operations requirements.
-
Output Sanitization
After watching this video; you will be able to recognize examples of using output sanitization as a defensive coding practice.
-
OWASP Top 10
After watching this video; you will be able to locate and list the OWASP "Top 10".
-
Peer-based Code Review
After watching this video; you will be able to recognize characteristics of peer-based code reviews.
-
Penetration
After watching this video; you will be able to identify the four steps in the penetration process.
-
Pervasive and Ubiquitous Computing
After watching this video; you will be able to recognize best practices for securing pervasive and ubiquitous computing.
-
Post-release Plan
After watching this video; you will be able to identify characteristics of a post-release plan.
-
Pre-release Testing Process
After watching this video; you will be able to identify the characteristics of the pre-release testing process.
-
Privacy Considerations
After watching this video; you will be able to distinguish between different privacy considerations.
-
Problem Management
After watching this video; you will be able to recognize characteristics of problem management.
-
Product Deployment and Sustainment Controls
After watching this video; you will be able to recognize best practices when integrating product deployment and sustainment controls.
-
Programmatic Security
After watching this video; you will be able to recognize characteristics of programmatic security.
-
Programming Language Environment
After watching this video; you will be able to distinguish between compilers; interpreters and hybrid source codes.
-
Psychological Acceptability
After watching this video; you will be able to recognize the characteristics of psychological acceptability.
-
Publishing and Dissemination Controls
After watching this video; you will be able to distinguish between licenses; encryption; and authentication as publishing and dissemination controls.
-
Regression Testing
After watching this video; you will be able to recognize characteristics of regression testing.
-
Regulations and Compliance
After watching this video; you will be able to recognize characteristics of regulations and compliance.
-
Release Management
After watching this video; you will be able to recognize characteristics of release management activities.
-
Rich Internet Applications
After watching this video; you will be able to recognize best practices for securing rich Internet applications.
-
Risk Acceptance
After watching this video; you will be able to identify the characteristics of risk acceptance.
-
Risk Assessment for Code Reuse
After watching this video; you will be able to identify characteristics of risk assessment for code reuse.
-
Role and User Definitions
After watching this video; you will be able to identify characteristics of role and user definitions.
-
Safe APIs
After watching this video; you will be able to distinguish between safe and unsafe API coding practices.
-
Scanning
After watching this video; you will be able to recognize characteristics of scanning.
-
Security Design Principles
After watching this video; you will be able to recognize security design principle best practices.
-
Security Testing Controls
After watching this video; you will be able to list the eight steps to create a formal set of security testing controls.
-
Sequencing and Timing Requirements
After watching this video; you will be able to identify best practices for sequencing and timing.
-
Service-level Agreements
After watching this video; you will be able to distinguish between the two rules SLAs should provide.
-
Service-Oriented Architecture
After watching this video; you will be able to recognize best practices for securing service-oriented architecture.
-
Session Management
After watching this video; you will be able to recognize examples of using session management as a defensive coding practice.
-
Simulation Testing
After watching this video; you will be able to recognize characteristics of simulation testing.
-
Software Authenticity and Integrity
After watching this video; you will be able to identify software authenticity and integrity best practices during software delivery; operations and maintenance.
-
Software Disposal Execution
After watching this video; you will be able to identify key activities during software disposal execution.
-
Software Disposal Planning
After watching this video; you will be able to identify the components of an effective software disposal plan.
-
Software Requirements Verification and Validation
After watching this video; you will be able to identify software requirements verification and validation .
-
Source Code and Versioning
After watching this video; you will be able to identify source code and versioning best practices.
-
Supplier Prequalification
After watching this video; you will be able to identify best practices for supplier prequalification activities.
-
Supplier Sourcing Challenges
After watching this video; you will be able to distinguish between different security trade-offs in supplier sourcing.
-
System-of-Systems Integration
After watching this video; you will be able to identify characteristics of system-of-systems integration.
-
Technical Controls
After watching this video; you will be able to identify technical controls for software development and testing.
-
Test Data Lifecycle Management
After watching this video; you will be able to identify best practices in test data lifecycle management.
-
Testing Artifacts
After watching this video; you will be able to recognize characteristics of testing artifacts.
-
The Privacy Principle
After watching this video; you will be able to recognize the characteristics of privacy.
-
Threat Modeling and Documentation
After watching this video; you will be able to recognize threat modeling techniques and purpose of documentation.
-
Tokenizing
After watching this video; you will be able to recognize examples of tokenizing as a defensive coding practice.
-
Trusted Computing
After watching this video; you will be able to recognize characteristics of trusted computing.
-
Type Safety
After watching this video; you will be able to distinguish between examples of static and dynamic type safety enforcement.
-
Validation and Verification
After watching this video; you will be able to recognize characteristics of validation and verification.
-
Vendor Technical Integrity Controls
After watching this video; you will be able to identify best practices for vendor technical integrity controls.
-
Vulnerability Management; Tracking; and Resolution
After watching this video; you will be able to identify best practices for vulnerability management; tracking; and resolution activities.
-
Waterfall
After watching this video; you will be able to identify secure software concepts in the Waterfall methodology.
-
Weakest Link
After watching this video; you will be able to recognize the characteristics of weakest link.
-
Active Directory Permissions
After watching this video; you will be able to identify characteristics of Active Directory permissions.
-
Advantages and Disadvantages of Security Types
It is important to be aware of security fundamentals in Microsoft Windows environment. Wireless security is a key component in data protection. In this video; Travis Welton discusses the advantages and disadvantages of various types of wireless security.
-
Antispam
After watching this video; you will be able to identify characteristics of spam filtering.
-
Anti-virus for Client Protection
After watching this video; you will be able to identify characteristics of viruses.
-
Application-level Firewalls
After watching this video; you will be able to recognize characteristics of application-level firewalls.
-
Assigning Hosts to VLANS
After watching this video; you will be able to distinguish between ways to assign hosts to VLANS.
-
Auditing Best Practices
After watching this video; you will be able to recognize auditing best practices.
-
Authentication Methods
After watching this video; you will be able to distinguish between different authentication methods.
-
Browser Settings
With Microsoft Windows; it is vitally important to be aware of security fundamentals. When browsing the Internet; adequate data and user protection should be in place. In this video; Travis Welton demonstrates how to configure Internet security settings in Internet Explorer.
-
Buffer Overflow
After watching this video; you will be able to recognize characteristics of buffer overflow.
-
Certificate Properties and Services
After watching this video; you will be able to recognize certificate properties and services policy best practices.
-
Circuit-level Firewalls
After watching this video; you will be able to recognize characteristics of circuit-level firewalls.
-
Client versus Server Protection
After watching this video; you will be able to identify the advantages and disadvantages of both client and server protection.
-
Common Attack Methods
After watching this video; you will be able to recognize common password attack methods.
-
Common Network Attack Methods Part One
After watching this video; you will be able to distinguish between common attack methods.
-
Common Network Attack Methods Part Two
After watching this video; you will be able to identify characteristics of common attack methods.
-
Computer Security
Considerations for computer security relate to safeguarding data on an organization's actual desktop computers; servers; and laptops. The devices alone can be expensive regardless of the valuable data they may additionally contain. In this video; Travis Welton discusses how to secure physical computer systems.
-
Demilitarized Zones (DMZs)
After watching this video; you will be able to identify characteristics of DMZs.
-
Disable Log On Locally
It is important to be aware of security fundamentals for Microsoft Windows environment. Administrators can prevent a user or group from accessing a local machine by using the Deny log on locally settings. In this video; Travis Welton demonstrates how to prevent a specific user from logging on to a local machine.
-
Disabling Unsecure Authentication Protocols
After watching this video; you will be able to disable unsecure authentication protocols.
-
DNS Security Extensions (DNSSec)
After watching this video; you will be able to identify characteristics of DNSSec.
-
EFS
After watching this video; you will be able to identify characteristics of EFS.
-
Enabling and Securing Audit Information
After watching this video; you will be able to enable and secure audits and audit information.
-
Encrypting Offline Files and Folders
After watching this video; you will be able to encrypt offline files and folders.
-
Encryption Methods
After watching this video; you will be able to distinguish between different encryption methods.
-
File and Registry Permissions
After watching this video; you will be able to distinguish between the types of permissions that can be applied.
-
Group Permissions
After watching this video; you will be able to set multiple groups with different permissions.
-
Honeypots
After watching this video; you will be able to identify characteristics of honeypots.
-
Inheritance
After watching this video; you will be able to enable and disable inheritance.
-
Internet Protocol Security (IPSec) in Network Isolation
After watching this video; you will be able to identify characteristics of IPSec.
-
Keeping OS and Software Current
After watching this video; you will be able to use Windows Update/Windows Server Update Service.
-
Keeping Servers Updated
After watching this video; you will be able to recognize the benefits of ensuring OS and applications are kept current.
-
Keyloggers
With Microsoft Windows; it is vitally important to be aware of security. Keyloggers pose a threat because they are devices that capture keystroke input to procure sensitive information. In this video; Travis Welton demonstrates types of keyloggers and recommends measures to defend against them.
-
Keys
It is important to be aware of security fundamentals in the Microsoft Windows environment. Using authentication and encryption is the best approach to securing a wireless local area network (WLAN). In this video; Travis Welton discusses key-based security methods; namely: Wired Equivalent Privacy (WEP); Wi-Fi Protected Access (WPA); and WPA Version 2 (WPA2).
-
Lockout and Group Policies
After watching this video; you will be able to implement password policy settings.
-
MAC Filters
In Microsoft Windows; it is vitally important to be aware of security fundamentals. A media access control (MAC) address is the unique hardware address of a network card that allows access to a wireless local area network (WLAN) through filtering. In this video; Travis Welton discusses MAC address filtering for WLAN security.
-
Microsoft Baseline Security Analyzer (MBSA)
After watching this video; you will be able to use MBSA.
-
Mobility Device Security
Mobile device security poses the most challenges of all; as they can store a lot of data and are the least secure. In this video; Travis Welton discusses how to go about securing mobile devices.
-
NAP Requirements
After watching this video; you will be able to identify NAP requirements.
-
Network Access Protection (NAP) Purpose
After watching this video; you will be able to identify the purpose of NAP.
-
Network Address Translation (NAT)
After watching this video; you will be able to identify characteristics of NAT.
-
Network Sniffing
After watching this video; you will be able to identify characteristics of utility network sniffing.
-
NTFS vs. FAT
After watching this video; you will be able to distinguish between NTFS and FAT file systems permissions characteristics.
-
Ownership and Delegation
After watching this video; you will be able to set ownership and delegation permission settings.
-
Password Complexity; Length; and History Policies
After watching this video; you will be able to recognize password policy best practices.
-
Password Reset Procedures
After watching this video; you will be able to identify best practices when establishing password reset procedures.
-
Protocol Spoofing
After watching this video; you will be able to identify characteristics of protocol spoofing.
-
RADIUS Authentication
After watching this video; you will be able to recognize characteristics of RADIUS authentication.
-
Read-Only Domain Controllers
After watching this video; you will be able to recognize characteristics and benefits of a read-only domain controller.
-
Removable Devices and Drives
In Microsoft Security Fundamentals; you may encounter removable devices and drives. These are very credible threats to a computer system. In this video; Travis Welton discusses how to secure removable devices and drives.
-
Secure Web Sites
Secure web browsing is initiated using Hypertext Transfer Protocol Secure (HTTPS) with Secure Sockets Layer (SSL) providing a 128-bit encryption. In this video; Travis Welton provides a definition of HTTPS with SSL for providing secure client/server communications through the Internet.
-
Securing Dynamic DNS Updates
After watching this video; you will be able to use secure dynamic DNS functionality.
-
Sender Policy Framework (SPF) Records
After watching this video; you will be able to describe how SPF records function.
-
Separation of Services
After watching this video; you will be able to identify separation of services best practices.
-
Server and Domain Isolation
After watching this video; you will be able to identify characteristics of server and domain isolation.
-
Server Hardening
After watching this video; you will be able to recognize importance of hardening the server.
-
Site Security
Site security is vital when keeping mobile or removable devices and phones safe against any potential threats. In this video; Travis Welton discusses physical site security.
-
Software Firewalls
After watching this video; you will be able to recognize characteristics of software firewalls.
-
Software Restriction Policies
After watching this video; you will be able to recognize benefits of software restriction policies.
-
Spoofing
After watching this video; you will be able to recognize characteristics of spoofing.
-
SSID
It is important to be aware of security fundamentals for the Microsoft Windows environment. A Service Set Identifier (SSID) is a name that identifies a specified wireless local area network (WLAN); allowing authorized users to connect to that WLAN. In this video; Travis Welton demonstrates SSID best practices.
-
Stateful Multilevel Firewalls
After watching this video; you will be able to recognize characteristics of stateful multilevel firewalls.
-
Stateful versus Stateless Inspection
After watching this video; you will be able to identify the most appropriate inspection type to use.
-
The Impact of Threat and Risk
Risk management is central to implementing effective IT security. In this video; Travis Welton discusses how to define risk; explains the purpose of a risk management plan; and describes the key steps involved in the risk management process.
-
Token Devices
After watching this video; you will be able to recognize characteristics of token devices.
-
Tunneling
After watching this video; you will be able to identify characteristics of tunneling.
-
Types of Auditing
After watching this video; you will be able to distinguish between the different auditing types.
-
Types of Inspection
After watching this video; you will be able to distinguish between stateful and stateless inspection.
-
Using Hardware versus Software Firewalls
After watching this video; you will be able to identify an appropriate firewall for network protection.
-
Using Run as administrator
After watching this video; you will be able to use "Run as" option to perform administrative tasks.
-
Utilizing User Account Control (UAC)
After watching this video; you will be able to enable and disable UAC.
-
Virtual LANs (VLANs)
After watching this video; you will be able to identify characteristics of VLANS.
-
Virtual Private Networks (VPNs)
After watching this video; you will be able to identify characteristics of VPNs.
-
VLAN Separate Management
After watching this video; you will be able to describe the concept of separate management of VLAN.
-
VPN and Encryption Algorithms
After watching this video; you will be able to identify characteristics and uses of VPN and encryption algorithms.
-
Worms; Trojans; and Spyware
After watching this video; you will be able to distinguish between characteristics of worms; trojans; and spyware.
-
(ISC)2 Code of Ethics
After watching this video; you will be able to identify characteristics of the (ISC)2 Code of Ethics and best practices for compliance.
-
Access Control and Monitoring
After watching this video; you will be able to distinguish between access control and monitoring techniques.
-
Access Control Standards and Protocols
After watching this video; you will be able to describe access control standards and protocols.
-
Administration and Validation
After watching this video; you will be able to describe administration and validation activities as part of operating and implementing cryptographic systems.
-
Application Vulnerabilities
After watching this video; you will be able to identify application vulnerabilities that apply to big data systems.
-
Application White Listing
After watching this video; you will be able to use application white-listing for endpoint device security.
-
Applying Hashing
After watching this video; you will be able to describe purpose and best practices for applying hashing.
-
Applying Salting
After watching this video; you will be able to describe purpose and best practices for applying salting.
-
Appropriate Use
After watching this video; you will be able to describe best practices for appropriate use of security protocols.
-
Architecture and Design Vulnerabilities
After watching this video; you will be able to identify architecture and design vulnerabilities that apply to big data systems.
-
Attribute-based Access Control
After watching this video; you will be able to describe best practices when implementing attribute-based access control.
-
Audit Findings
After watching this video; you will be able to identify how to use audit findings as part of the risk management process.
-
Authentication Overview
After watching this video; you will be able to identify characteristics of authentication and the role it plays in access control.
-
Cloud Security Outsourcing Requirements
After watching this video; you will be able to identify security requirements when outsourcing cloud services.
-
Cloud Virtualization
After watching this video; you will be able to describe characteristics of cloud virtualization.
-
Common Ports and Protocols
After watching this video; you will be able to describe commonly used ports and protocols and their role in network security.
-
Communicating Findings
After watching this video; you will be able to identify best practices for communicating and reporting monitoring analysis results.
-
Communications Network Attacks and Countermeasures
After watching this video; you will be able to describe common attacks and countermeasures for protecting telecommunications technologies.
-
Compensating Controls
After watching this video; you will be able to describe best practices for compensating security controls.
-
Configuration Management Plan Implementation
After watching this video; you will be able to identify activities in implementing a configuration management plan.
-
Continuity and Resilience
After watching this video; you will be able to describe continuity and resilience in secure virtual environments.
-
Converged Communications
After watching this video; you will be able to describe best practices and benefits of converged communications.
-
Corrective Controls
After watching this video; you will be able to describe best practices for corrective security controls.
-
Data Asset Management
After watching this video; you will be able to identify best practices for data asset management.
-
Data Sensitivity
After watching this video; you will be able to describe the purpose and role of data sensitivity in cryptography.
-
Data Storage and Transmission
After watching this video; you will be able to identify secure data storage and transmission options for cloud security.
-
Detective Controls
After watching this video; you will be able to describe best practices for detective security controls.
-
Determining Appropriate Access Controls
After watching this video; you will be able to identify appropriate access controls and best practices for implementation.
-
Deterrent Controls
After watching this video; you will be able to describe best practices for deterrent security controls.
-
Device Authentication
After watching this video; you will be able to identify best practices for implementing device authentication.
-
Discretionary Access Control
After watching this video; you will be able to describe best practices when implementing discretionary access control.
-
Emergency Response Plans and Procedures
After watching this video; you will be able to describe characteristics and best practices for supporting emergency response plans and procedures.
-
Endpoint Encryption
After watching this video; you will be able to use endpoint encryption for endpoint device security.
-
End-user Training
After watching this video; you will be able to identify end-user training best practices related to cryptography.
-
Entitlement
After watching this video; you will be able to describe entitlement activities during the identity management lifecycle.
-
Event Data Analysis
After watching this video; you will be able to describe characteristics and purpose of event data analysis activities.
-
Events of Interest
After watching this video; you will be able to describe characteristics of events of interest as part of continuous monitoring activities.
-
Evidence Handling
After watching this video; you will be able to identify best practices for evidence handling during forensic investigation activities.
-
Firewalls and Proxies
After watching this video; you will be able to identify best practices for using firewalls and proxies.
-
First Responder
After watching this video; you will be able to identify first responder best practices during forensic investigation activities.
-
Fundamental Key Management Concepts
After watching this video; you will be able to identify fundamental key management concepts of cryptographic systems.
-
Hardware Asset Management
After watching this video; you will be able to identify best practices for hardware asset management.
-
HIDS
After watching this video; you will be able to use HIDS for endpoint device security.
-
Identifying Malicious Activity
After watching this video; you will be able to distinguish between different types of malicious activity.
-
Implementation Variation
After watching this video; you will be able to compare differences in implementation methodologies.
-
Implementing Backup and Redundancy Options
After watching this video; you will be able to describe characteristics and best practices for implementing backup and redundancy options.
-
Implementing Countermeasures
After watching this video; you will be able to identify best practices when implementing countermeasures.
-
Implementing Cryptographic Systems
After watching this video; you will be able to identify best practices for implementing and operating cryptographic systems and controls.
-
Implementing Operational Security Controls
After watching this video; you will be able to identify appropriate best practices when implementing different types of operating security controls.
-
Implementing Secure Protocols
After watching this video; you will be able to identify best practices for implementing secure protocols.
-
Incident Discovery
After watching this video; you will be able to describe incident discovery activities.
-
Incident Escalation
After watching this video; you will be able to identify incident escalation activities.
-
Incident Response
After watching this video; you will be able to identify incident response best practices.
-
Interim Processing Strategies
After watching this video; you will be able to describe interim or alternate processing strategies as part of business continuity activities.
-
Interpreting Scanning and Testing Results
After watching this video; you will be able to describe how to interpret and report scanning and testing results.
-
Legal and Privacy Concerns
After watching this video; you will be able to identify the legal and privacy concerns associated with cloud security.
-
Lifecycle Asset Management
After watching this video; you will be able to identify best practices for lifecycle asset management.
-
Maintenance
After watching this video; you will be able to identify maintenance best practices during the identity management lifecycle.
-
Malicious Activity Countermeasures
After watching this video; you will be able to identify countermeasure for mitigating risk and damage from malicious activity.
-
Malicious Code
After watching this video; you will be able to describe characteristics of malicious code.
-
Malicious Code Countermeasures
After watching this video; you will be able to identify countermeasures for mitigating risk and damage from malicious code.
-
Managerial Controls
After watching this video; you will be able to describe how to use managerial controls to implement and assess compliance.
-
Mandatory Access Control
After watching this video; you will be able to describe best practices when implementing mandatory access control.
-
Monitoring and Analyzing Risk
After watching this video; you will be able to identify best practices for identifying; monitoring; and analyzing risk.
-
Network Access Attacks and Countermeasures
After watching this video; you will be able to describe common network access attacks and appropriate countermeasures.
-
Network Intrusion Detection and Prevention Systems
After watching this video; you will be able to identify best practices for using network intrusion detection and prevention systems.
-
Network Topographies and Relationships
After watching this video; you will be able to identify the different types of network topographies and their role in network security.
-
Non-discretionary Access Control
After watching this video; you will be able to describe best practices when implementing non-discretionary access control.
-
One-way Trust Relationships
After watching this video; you will be able to describe characteristics of one-way trust relationships in internetwork trust architectures.
-
Operation Models
After watching this video; you will be able to distinguish between cloud security operation models.
-
Operational Controls
After watching this video; you will be able to describe how to use operational controls to implement and assess compliance.
-
OSI and TCP/IP Models
After watching this video; you will be able to distinguish between OSI and TCP/IP models and their role in network security issues.
-
Participating in Physical Security Operations
After watching this video; you will be able to identify physical security operations activities.
-
Participating in Security Administration
After watching this video; you will be able to identify appropriate activities for participating in change management; security operations and security administration processes.
-
Participating in Security Awareness and Training
After watching this video; you will be able to identify security awareness and training activities.
-
Participating in Security Testing and Evaluation
After watching this video; you will be able to describe security testing and evaluation activities.
-
Patch Management
After watching this video; you will be able to describe activities for implementing and testing patches; fixes; and updates.
-
Plane Separation
After watching this video; you will be able to describe data plane and control plane separation for managing LAN-based security.
-
Preservation of Scene
After watching this video; you will be able to identify best practices for preservation of scene during forensic investigation activities.
-
Preventative Controls
After watching this video; you will be able to describe best practices for preventative security controls.
-
Proofing
After watching this video; you will be able to identify proofing best practices during the identity management lifecycle.
-
Provisioning
After watching this video; you will be able to describe provisioning activities as part of the identity management lifecycle.
-
Regulatory Requirements
After watching this video; you will be able to identify regulatory requirements for cryptography.
-
Remote Access Operation and Configuration
After watching this video; you will be able to describe best practices for remote access operation and configuration.
-
Reporting and Feedback Loops
After watching this video; you will be able to identify lessons learned activities.
-
Responding to Incidents
After watching this video; you will be able to identify best practices for handling incidents; supporting forensic investigations; and supporting business continuity activities.
-
Restoration Planning
After watching this video; you will be able to identify best practices for restoration planning as part of business continuity activities.
-
Risk Assessment
After watching this video; you will be able to identify risk assessment characteristics and options.
-
Risk Management Concepts
After watching this video; you will be able to describe characteristics of risk management concepts.
-
Risk Treatment
After watching this video; you will be able to describe options for risk treatment.
-
Risk Visibility and Reporting
After watching this video; you will be able to describe characteristics of risk visibility and reporting activities.
-
Routers and Switches
After watching this video; you will be able to identify best practices for using routers and switches securely on networks.
-
Secure Browsing
After watching this video; you will be able to identify secure browsing best practices for endpoint device security.
-
Secure Device Management
After watching this video; you will be able to identify best practices for secure device management.
-
Securing Networks and Communications
After watching this video; you will be able to identify best practices for securing networks; protecting telecommunications technologies; and implementing and operating secure wireless technologies.
-
Securing Systems and Applications
After watching this video; you will be able to describe best practices for implementing and operating systems and applications security.
-
Security Analytics; Metrics and Trends
After watching this video; you will be able to use security analytics metrics and trends for analyzing monitoring results.
-
Security Impact Assessment
After watching this video; you will be able to identify activities in performing a security impact assessment.
-
Segmentation
After watching this video; you will be able to use segmentation for managing LAN-based security.
-
Shared Storage
After watching this video; you will be able to describe best practices for shared storage in virtual environments.
-
Single Sign-on
After watching this video; you will be able to describe best practices for implementing single sign-on authentication.
-
Single/Multifactor Authentication
After watching this video; you will be able to describe best practices for implementing single/multifactor authentication.
-
Software Asset Management
After watching this video; you will be able to identify best practices for software asset management.
-
Software-defined Networking
After watching this video; you will be able to describe best practices for secure software-defined networking in virtual environments.
-
Source Systems
After watching this video; you will be able to describe characteristics and purpose of source systems used in continuous monitoring activities.
-
Symmetric and Asymmetric Encryption
After watching this video; you will be able to distinguish between symmetric and asymmetric encryption application.
-
System Architecture and Interoperability
After watching this video; you will be able to identify system architecture and interoperability of systems activities in change management processes.
-
Testing and Drills
After watching this video; you will be able to describe characteristics and best practices for testing and drills for supporting emergency response plans and procedures.
-
Transitive Trust
After watching this video; you will be able to identify characteristics of transitive trust in internetwork trust architectures.
-
Trusted Platform Module
After watching this video; you will be able to use trusted platform module for endpoint device security.
-
Two-way Trust Relationships
After watching this video; you will be able to describe characteristics of two-way trust relationships in internetwork trust architectures.
-
Understanding Accountability
After watching this video; you will be able to identify characteristics of the concept of accountability.
-
Understanding Availability
After watching this video; you will be able to identify characteristics of the concept of availability.
-
Understanding Confidentiality
After watching this video; you will be able to describe characteristics of the concept of confidentiality.
-
Understanding Integrity
After watching this video; you will be able to identify characteristics of the concept of integrity.
-
Understanding Least Privilege
After watching this video; you will be able to identify characteristics of the concept of least privilege.
-
Understanding Privacy
After watching this video; you will be able to identify characteristics of the concept of privacy.
-
Understanding Separation of Duties
After watching this video; you will be able to identify characteristics of the concept of separation of duties.
-
Virtual Environment Attacks and Countermeasures
After watching this video; you will be able to identify the most common attacks on virtual environments and countermeasures for mitigating risk and damage.
-
Visualization
After watching this video; you will be able to use visualization to analyze monitoring results.
-
Web of Trust
After watching this video; you will be able to describe characteristics of Web of Trust.
-
Wireless Security Devices
After watching this video; you will be able to describe characteristics of wireless security devices.
-
Wireless Technologies Attacks and Countermeasures
After watching this video; you will be able to identify common attacks methods and countermeasures for wireless technologies.
-
Wireless Transmission Security
After watching this video; you will be able to identify best practices for secure wireless transmission.
-
Exam Update Overview
After watching this video; you will be able to describe the high-level changes in ISC2 CISSP 2015 with respect to CISSP 2012.
-
New Testing Domains
After watching this video; you will be able to list the testing domains in ISC2 CISSP 2015.
-
New Testing Topics
After watching this video; you will be able to recognize the new testing topics for ISC2 CISSP 2015.
-
Previous Testing Domains
After watching this video; you will be able to list the testing domains in ISC2 CISSP 2012.
-
Understanding Non-repudiation
After watching this video; you will be able to identify characteristics of the concept of non-repudiation.
-
Business Impact Analysis
After watching this video; you will be able to conduct a business impact analysis.
-
Chain of Custody
In this video; Glen E. Clarke discusses the use of the chain of custody during incident response.
-
Defense in Depth
After watching this video; you will be able to recognize the characteristics of defense in depth.
-
Distributed Computing
After watching this video; you will be able to distinguish between the different architectural forms and supporting elements of secured distributed computing.
-
Principle of Least Privilege
The principle of least privilege is an important concept in IT security. In this video; Travis Welton discusses legislation that has led to an increased focus on the principle; explains the challenges involved in applying the principle; and outlines some of the methods for implementing it.
-
Authorization
After watching this video; you will be able to describe characteristics of authorization as part of the identify management lifecycle.
-
Anti-Malware
After watching this video; you will be able to identify best practices for using anti-malware as a preventative measure.
-
Access Control Lists
When preparing for the CompTIA CASP CAS-002 examination; you're expected to know about Access Control Lists (ACLs); which form a part of network security. An ACL can exist within a file system and network devices such as routers; switches; and wireless access points. In this video; Glen Clarke discusses ACLs and how they determine what traffic passes through a router.
-
Accounting
After watching this video; you will be able to identify the role of accounting in assuring security .
-
Attack Surface
Attackers can gain access to your system; network; or application through various methods. In this video; Travis Welton discusses various attack surfaces that need to be considered when dealing with system security.
-
AJAX
AJAX is a new way to use existing programming standards. In this video; Dan LaChance reviews how Ajax issues can affect network security in CompTIA CASP CAS-002.
-
Availability
After watching this video; you will be able to identify the characteristics of availability.
-
Public Key Infrastructure (PKI)
After watching this video; you will be able to identify characteristics of PKI.
-
Security Testing
After watching this video; you will be able to distinguish between white; gray; and black-box testing.
-
Leveraging Existing Components
After watching this video; you will be able to recognize the characteristics of leveraging existing components.
-
Virtual Private Networks
The CompTIA CASP CAS-200 certification covers how you apply advanced level security skills; including the implementation of various network types. In this video; Glen E. Clarke demonstrates how Virtual Private Networks (VPNs) are used to secure an environment.
-
Flash
In this video; Dan LaChance explains how Flash issues can affect network security in CompTIA CASP CAS-002.
-
Technical Controls
After watching this video; you will be able to describe how to use technical controls to implement and assess compliance.
-
Cryptography
After watching this video; you will be able to use cryptography for determining appropriate security controls.
-
Monitoring
After watching this video; you will be able to recognize characteristics of monitoring during operations and maintenance.
-
Penetration Testing
In this video; Steven Crawford explains how to use penetration testing to enhance network security.
-
Public Key Infrastructure (PKI)
After watching this video; you will be able to identify characteristics of PKI.
-
Malware
After watching this video; you will be able to distinguish between types of malware.
-
Privacy
After watching this video; you will be able to identify characteristics of privacy issues that pertain to information security.
-
Risk Management
When preparing for the CompTIA CASP CAS-002 certification; you need to know about risk management. In this video; Glen E. Clarke discusses the risk management process; how to identify threats; and how to ensure improved asset protection.
-
Input Validation
After watching this video; you will be able to recognize examples of using input validation as a defensive coding practice.
-
Role-based Access Control
After watching this video; you will be able to describe the functioning of role-based access control systems.
-
Service Models
After watching this video; you will be able to distinguish between cloud security service models.
-
SOAP
In this video; Dan LaChance discusses how SOAP issues can affect network security in CompTIA CASP CAS-002.
-
Denial of Service Attacks
After watching this video; you will be able to describe distributed denial of service attacks and identify mitigation strategies.
-
Fault Tolerance
After watching this video; you will be able to identify characteristics of fault tolerance as a security capability within information systems.
-
Public Key Infrastructure
After watching this video; you will be able to describe how to use PKI as part of implementing and operating cryptographic systems.
-
Risk Assessment for Code Reuse
After watching this video; you will be able to recognize characteristics of risk assessment for code reuse.
-
Standards
After watching this video; you will be able to recognize characteristics of standards.
-
Confidentiality
After watching this video; you will be able to recognize the characteristics of confidentiality.
-
Functional Testing
After watching this video; you will be able to identify characteristics of functional testing.
-
Integrity
After watching this video; you will be able to identify the characteristics of integrity.
-
Logging
After watching this video; you will be able to describe logging activities as part of operating and maintaining monitoring systems.
-
Nonfunctional Testing
After watching this video; you will be able to distinguish between nonfunctional testing methods.
-
Non-Repudiation
After watching this video; you will be able to recognize the characteristics of non-repudiation.
-
Mobile Device Management
After watching this video; you will be able to use mobile device management for endpoint device security.
-
NFS and CIFS
NAS devices use standard file sharing protocols like network file system and common Internet file system in a file sharing environment. In this video; Steven Crawford explains NFS and CIFS.
-
Role-based Access Control
After watching this video; you will be able to describe best practices when implementing role-based access control.
-
Chain of Custody
After watching this video; you will be able to identify chain of custody best practices.
-
Intrusion Detection and Prevention
After watching this video; you will be able to describe intrusion detection and prevention best practices.
-
Logging
After watching this video; you will be able to recognize characteristics of logging.
-
Standards
In this video; Dan LaChance discusses how standards are used to secure a network environment in CompTIA CASP CAS-002.
-
Configuration
After watching this video; you will be able to recognize examples of using configuration as a defensive coding practice.
-
Data Types
After watching this video; you will be able to distinguish between structured and unstructured data.
-
Firewall Overview
After watching this video; you will be able to identify the purpose of firewalls.
-
Host-based Firewalls
After watching this video; you will be able to use host-based firewalls for endpoint device security.
-
Risk Frameworks
After watching this video; you will be able to identify appropriate risk frameworks.
-
Virtualization
After watching this video; you will be able to identify benefits of virtualization in secure software design.
-
Incident Management
After watching this video; you will be able to distinguish between the different activities of incident management.
-
Interfaces
After watching this video; you will be able to identify interfaces best practices.
-
Multifactor Authentication
After watching this video; you will be able to describe authentication factors and the use of multifactor authentication in authentication systems.
-
Reporting
After watching this video; you will be able to identify best practices for reporting risk management activities and findings.
-
Risk Management
After watching this video; you will be able to distinguish between the steps of the general risk management model.
-
Digital Signatures
After watching this video; you will be able to use digital signatures for sending and receiving data.
-
Organizational Code of Ethics
After watching this video; you will be able to support an organization's code of ethics.
-
Social Engineering
With the advancements in technology and services available online one must ensure to protect personal information. In this video; Travis Welton discusses social engineering as a security concern.
-
Error Handling
After watching this video; you will be able to recognize examples of using error handling as a defensive coding practice.
-
Integrity
One of the core concepts central to IT security is integrity. In this video; Travis Welton discusses what integrity means in relation to information security and outlines the ways that data integrity can be protected.
-
Multifactor Authentication
After watching this video; you will be able to recognize characteristics of authentication.
-
Sandboxing
After watching this video; you will be able to recognize characteristics of sandboxing as a defensive coding practice.
-
CompTIA CASP CS0-003: Governance, Risk, and Compliance Committee
After watching this video, you will be able to describe the importance of the governance, risk, and compliance committee.
-
CompTIA CASP CS0-003: Interact across Business Units
After watching this video, you will be able to interact professionally with various business units.
-
CompTIA CASP CS0-003: Providing Objective Guidance and Recommendations
After watching this video, you will be able to provide objective guidance and recommendations.
-
CompTIA CASP CS0-003: Establishing Effective Collaboration
After watching this video, you will be able to establish effective collaboration.
-
CompTIA CASP CS0-003: Public Key Infrastructure (PKI)
After watching this video, you will be able to implement key components of PKI.
-
CompTIA CASP CS0-003: Blockchain and Mobility
After watching this video, you will be able to describe blockchain and mobile cryptography.
-
CompTIA CASP CS0-003: SSH, S/MIME, and SSL/TLS
After watching this video, you will be able to implement SSH, S/MIME, and SSL/TLS.
-
CompTIA CASP CS0-003: Cryptographic Applications
After watching this video, you will be able to implement cryptographic applications.
-
CompTIA CASP CS0-003: Desktop and Application Sharing
After watching this video, you will be able to describe desktop and application sharing.
-
CompTIA CASP CS0-003: Remote Assistance
After watching this video, you will be able to describe remote assistance.
-
CompTIA CASP CS0-003: Describe Cryptographic Techniques
After watching this video, you will be able to select cryptographic techniques based on requirements.
-
CompTIA CASP CS0-003: Remote Access Resources and Services
After watching this video, you will be able to specify remote access resources and services.
-
CompTIA CASP CS0-003: Conferencing and Web Services
After watching this video, you will be able to specify conferencing and web services.
-
CompTIA CASP CS0-003: Video and Audio Services
After watching this video, you will be able to specify video and audio services.
-
CompTIA CASP CS0-003: Storage and Document Collaboration
After watching this video, you will be able to specify storage and document collaboration tools.
-
CompTIA CASP CS0-003: Social Media and Cloud Services
After watching this video, you will be able to specify social media and cloud services.
-
CompTIA CASP CS0-003: Describe Secure Collaboration
After watching this video, you will be able to describe secure collaboration.
-
CompTIA CASP CS0-003: IM and Presence
After watching this video, you will be able to specify IM and presence.
-
CompTIA CASP CS0-003: E-mail and Telephony
After watching this video, you will be able to specify e-mail and telephony.
-
CompTIA CASP CS0-003: Threats and Attacks
After watching this video, you will be able to avoid threats and attacks.
-
CompTIA CASP CS0-003: Zero-day Mitigation Controls
After watching this video, you will be able to describe the features and benefits of zero-day mitigation controls.
-
CompTIA CASP CS0-003: Best Practices for Ongoing Research
After watching this video, you will be able to recall best practices for ongoing research.
-
CompTIA CASP CS0-003: Researching New Technologies
After watching this video, you will be able to research new technologies, security systems, and services in order to stay up to date.
-
CompTIA CASP CS0-003: Researching Social Media and Integration
After watching this video, you will be able to recognize the important of researching social media and methods of integration.
-
CompTIA CASP CS0-003: Big Data, Machine Learning & Artificial Intelligence
After watching this video, you will be able to list the features and benefits of big data, machine-learning, and artificial intelligence.
-
CompTIA CASP CS0-003: Global Information Assurance (IA) Industry
After watching this video, you will be able to define the global IA industry and who is involved.
-
CompTIA CASP CS0-003: Systems DLC Requirements and Acquisition
After watching this video, you will be able to describe the system DLC requirements, acquisition, testing, and evaluation.
-
CompTIA CASP CS0-003: Systems DLC Operations, Monitoring, and Maintenance
After watching this video, you will be able to describe the system DLC operations, monitoring, and maintenance.
-
CompTIA CASP CS0-003: Global Information Assurance (IA) Community
After watching this video, you will be able to list typical groups included in the global IA community.
-
CompTIA CASP CS0-003: Determine Trends and Their Impact
After watching this video, you will be able to apply research methods to determine industry trends and their impact on the enterprise.
-
CompTIA CASP CS0-003: Software DLC NX/XN Bit, ASLR, and Code Quality
After watching this video, you will be able to define the software DLC NX/XN bit, ASLR, and code quality.
-
CompTIA CASP CS0-003: Software DLC Testing and DevOps
After watching this video, you will be able to define the software DLC testing and DevOps.
-
CompTIA CASP CS0-003: Systems DLC Configuration and Change Management
After watching this video, you will be able to describe the system DLC configuration and change management.
-
CompTIA CASP CS0-003: Software DLC Applications and Software Assurance
After watching this video, you will be able to define the software DLC applications and software assurance.
-
CompTIA CASP CS0-003: Security Requirements Traceability Matrix (SRTM)
After watching this video, you will be able to define the security requirements traceability matrix.
-
CompTIA CASP CS0-003: Testing and Validation in the Software DLC
After watching this video, you will be able to define testing and validation in the software DLC.
-
CompTIA CASP CS0-003: Agile, Waterfall, and Spiral Software Development
After watching this video, you will be able to define agile, waterfall, and spiral software development.
-
CompTIA CASP CS0-003: Describe Life Cycle Activities
After watching this video, you will be able to describe life cycle activities.
-
CompTIA CASP CS0-003: Interacting with Sales and HR Staff
After watching this video, you will be able to interact with Sales and HR stakeholders.
-
CompTIA CASP CS0-003: Adapting Adequate Solutions
After watching this video, you will be able to adapt adequate solutions.
-
CompTIA CASP CS0-003: Asset Management and Inventory Control
After watching this video, you will be able to describe asset management and inventory control.
-
CompTIA CASP CS0-003: Expressing Goals with DR Stakeholders
After watching this video, you will be able to express goals with disaster recovery stakeholders.
-
CompTIA CASP CS0-003: Interpreting Goals with Programmers and Admins
After watching this video, you will be able to interpret goals with programmers and administrators.
-
CompTIA CASP CS0-003: Communicating Security Requirements with the C-Suite
After watching this video, you will be able to communicate goals with stakeholders.
-
CompTIA CASP CS0-003: Cloud Augmented Security Services
After watching this video, you will be able to specify cloud augmented security services.
-
CompTIA CASP CS0-003: CASB and Sec-as-a-Service
After watching this video, you will be able to specify CASB and sec-as-a-service offerings.
-
CompTIA CASP CS0-003: Resource Provisioning and De-provisioning
After watching this video, you will be able to define resource provisioning and de-provisioning.
-
CompTIA CASP CS0-003: Describe Cloud and Virtualization
After watching this video, you will be able to describe enterprise cloud and virtualization technologies.
-
CompTIA CASP CS0-003: Host Comingling Vulnerabilities
After watching this video, you will be able to define host comingling vulnerabilities.
-
CompTIA CASP CS0-003: Data Security Considerations
After watching this video, you will be able to describe host comingling vulnerabilities.
-
CompTIA CASP CS0-003: Authorization
After watching this video, you will be able to identify the different types of advanced authorization.
-
CompTIA CASP CS0-003: Attestation, Proofing, and Propagation
After watching this video, you will be able to compare attestation, proofing, and propagation.
-
CompTIA CASP CS0-003: Advanced Authentication
After watching this video, you will be able to recognize the different components of advanced authentication.
-
CompTIA CASP CS0-003: Access Management
After watching this video, you will be able to specify various types of access management.
-
CompTIA CASP CS0-003: Shibboleth and WAYF Federation Services
After watching this video, you will be able to describe Shibboleth and WAYF and how they work.
-
CompTIA CASP CS0-003: Trust Models
After watching this video, you will be able to list the features of several types of trust models.
-
CompTIA CASP CS0-003: SAML and OpenID Federation
After watching this video, you will be able to list characteristics of SAML and OpenID federation.
-
CompTIA CASP CS0-003: Cryptographic Mechanisms
After watching this video, you will be able to implement cryptographic mechanisms.
-
CompTIA CASP CS0-003: Cryptographic Data Processing
After watching this video, you will be able to describe cryptographic data processing.
-
CompTIA CASP CS0-003: Integrate Advanced AAA Technologies
After watching this video, you will be able to integrate advanced AAA technologies.
-
CompTIA CASP CS0-003: Cryptographic Techniques
After watching this video, you will be able to implement cryptographic techniques.
-
CompTIA CASP CS0-003: Cryptographic Implementations
After watching this video, you will be able to recognize various types of cryptographic implementations.
-
CompTIA CASP CS0-003: Cryptographic Encryption - Steganography
After watching this video, you will be able to use the OpenPuff steganography tool.
-
CompTIA CASP CS0-003: Cryptographic Modules and Processors
After watching this video, you will be able to implement cryptographic modules and processors.
-
CompTIA CASP CAS-002: Cost Benefit Analysis
It's impossible to create secure plans without analyzing the costs. In this video, Steven Crawford discusses how cost benefit analysis is used when creating network security plans in CompTIA CASP CAS-002.
-
CompTIA CASP CAS-002: Security System Development Life Cycle
In this video, Dan LaChance discusses the importance of the Security System Development Life Cycle when developing network security in CompTIA CASP CAS-002.
-
CompTIA CASP CAS-002: New or Changing Models and Strategies
The CompTIA CASP CAS-002 exam requires you to have an understanding of the security risks associated with changes to your business model. In this video, Glen E. Clarke discusses the possible security risks presented by changes such as business partnerships, company mergers, and a shift toward cloud computing.
-
CompTIA CASP CAS-002: Enterprise Security Architecture Frameworks
The CompTIA CASP CAS-002 certification assesses your ability to understand and implement security architectures. In this video, Glen E. Clarke discusses the Enterprise Security Architecture, or ESA, frameworks that are available to organizations as well as the functions of ESA, and Sherwood Applied Business Security Architecture, or SABSA.
-
CompTIA CASP CS0-003: Type 1 vs. Type 2 Hypervisors
After watching this video, you will be able to compare the pros and cons of hypervisors.
-
CompTIA CASP CS0-003: Pros and Cons of Virtualization
After watching this video, you will be able to compare the pros and cons of virtualization.
-
CompTIA CASP CS0-003: Technical Deployment Models
After watching this video, you will be able to describe technical models for cloud and virtualization.
-
CompTIA CASP CS0-003: Cloud Service Models
After watching this video, you will be able to describe cloud service models.
-
CompTIA CASP CS0-003: CIA-based Decisions for the Organization
After watching this video, you will be able to describe confidentiality, integrity, and availability decisions.
-
CompTIA CASP CS0-003: Risk Determination
After watching this video, you will be able to determine risk.
-
CompTIA CASP CS0-003: Translating Risk into Business Terms
After watching this video, you will be able to translate risk into business terms.
-
CompTIA CASP CS0-003: Determining Minimum Required Security Controls
After watching this video, you will be able to determine minimum required security controls.
-
CompTIA CASP CS0-003: System-specific Worst-case Analysis
After watching this video, you will be able to define system-specific worst-case analysis.
-
CompTIA CASP CS0-003: Business Continuity Planning
After watching this video, you will be able to define business continuity planning.
-
CompTIA CASP CS0-003: IT Governance and Frameworks
After watching this video, you will be able to describe IT governance and frameworks.
-
CompTIA CASP CS0-003: Risk Treatment
After watching this video, you will be able to treating risk.
-
CompTIA CASP CS0-003: Risk Management Processes
After watching this video, you will be able to describe risk management processes.
-
CompTIA CASP CS0-003: Enterprise Resilience and Continual Improvement
After watching this video, you will be able to specify enterprise resilience and continual improvement.
-
CompTIA CASP CS0-003: Application Security Design Considerations
After watching this video, you will be able to describe application security design considerations.
-
CompTIA CASP CS0-003: Specific Application Attacks
After watching this video, you will be able to define specific application attacks.
-
CompTIA CASP CS0-003: Wearable Technology
After watching this video, you will be able to list types and characteristics of wearable technology.
-
CompTIA CASP CS0-003: Integrate Controls for Mobile Devices
After watching this video, you will be able to integrate controls for mobile devices.
-
CompTIA CASP CS0-003: Application Data Issues
After watching this video, you will be able to describe application data issues.
-
CompTIA CASP CS0-003: Sandboxing and Enclaves
After watching this video, you will be able to define sandboxing and enclaves.
-
CompTIA CASP CS0-003: Application Vulnerabilities and Issues
After watching this video, you will be able to describe application vulnerabilities and issues.
-
CompTIA CASP CS0-003: Additional Application Security Concerns
After watching this video, you will be able to define additional application security concerns.
-
CompTIA CASP CS0-003: Server-side Processing
After watching this video, you will be able to compare server-side processing to client-side processing.
-
CompTIA CASP CS0-003: OS and Firmware Vulnerabilities
After watching this video, you will be able to describe OS and firmware vulnerabilities.
-
CompTIA CASP CS0-003: Client-side Processing
After watching this video, you will be able to compare client-side processing to server-side processing.
-
CompTIA CASP CS0-003: Reconnaissance, Fingerprinting, & Social Engineering
After watching this video, you will be able to describe reconnaissance, fingerprinting, and social engineering.
-
CompTIA CASP CS0-003: Open-source Intelligence (OSINT)
After watching this video, you will be able to describe open-source intelligence.
-
CompTIA CASP CS0-003: Select Software Controls
After watching this video, you will be able to select software security controls.
-
CompTIA CASP CS0-003: Methods to Assess Security
After watching this video, you will be able to describe security assessment methods.
-
CompTIA CASP CS0-003: Penetration Testing and Assessment
After watching this video, you will be able to describe penetration testing and assessments.
-
CompTIA CASP CS0-003: Routing Tables, DNS Records, and Search Engines
After watching this video, you will be able to describe routing tables, DNS records, and search engines.
-
CompTIA CASP CS0-003: Security Assessment Types
After watching this video, you will be able to describe security assessment types.
-
CompTIA CASP CS0-003: Additional Security Assessment Tools
After watching this video, you will be able to define additional security assessment tools.
-
CompTIA CASP CS0-003: Types of Host Tools
After watching this video, you will be able to describe types of host tools.
-
CompTIA CASP CS0-003: Exercises and Audits
After watching this video, you will be able to define exercises and audits.
-
CompTIA CASP CS0-003: Scanners
After watching this video, you will be able to describe scanners.
-
CompTIA CASP CS0-003: E-discovery
After watching this video, you will be able to describe e-discovery.
-
CompTIA CASP CS0-003: Data Breach Detection, Collection, and Analytics
After watching this video, you will be able to specify data breach detection, collection, and analytics.
-
CompTIA CASP CS0-003: Physical Security Tools
After watching this video, you will be able to specify physical security tools.
-
CompTIA CASP CS0-003: Conduct a Security Assessment
After watching this video, you will be able to describe how to conduct security assessments.
-
CompTIA CASP CS0-003: Data Breach Isolation, Recovery, and Response
After watching this video, you will be able to specify data breach isolation, recovery, and response.
-
CompTIA CASP CS0-003: Facilitating Incident Detection and Response
After watching this video, you will be able to facilitate incident detection and response.
-
CompTIA CASP CS0-003: Incident and Emergency Response
After watching this video, you will be able to describe incident and emergency response.
-
CompTIA CASP CS0-003: Incident or Breach Severity
After watching this video, you will be able to specify incident or breach severity.
-
CompTIA CASP CS0-003: Post-incident Response
After watching this video, you will be able to describe post-incident response.
-
CompTIA CASP CS0-003: Disaster Recovery and Order of Volatility
After watching this video, you will be able to describe disaster recovery and order of volatility.
-
CompTIA CASP CS0-003: Incident Response Support Tools
After watching this video, you will be able to define incident response support tools.
-
CompTIA CASP CS0-003: Data Flow Security Standards
After watching this video, you will be able to describe data flow security standards.
-
CompTIA CASP CS0-003: Interoperability Issues
After watching this video, you will be able to define interoperability issues.
-
CompTIA CASP CS0-003: Describe Incident Response and Recovery
After watching this video, you will be able to describe incident response and recovery.
-
CompTIA CASP CS0-003: Adapting Data Flow Security
After watching this video, you will be able to adapt data flow security.
-
CompTIA CASP CS0-003: Resilience Issues
After watching this video, you will be able to specify resilience issues.
-
CompTIA CASP CS0-003: Data Security Considerations
After watching this video, you will be able to describe data security considerations.
-
CompTIA CASP CS0-003: Resource Provisioning and De-provisioning
After watching this video, you will be able to define resource provisioning and de-provisioning.
-
CompTIA CASP CS0-003: Security Issues with Application Integration
After watching this video, you will be able to describe security issues with application integration.
-
CompTIA CASP CS0-003: Describe Enterprise Integration
After watching this video, you will be able to describe enterprise integration.
-
CompTIA CASP CS0-003: Merger and Acquisition Design Considerations
After watching this video, you will be able to consider merger and acquisition design.
-
CompTIA CASP CS0-003: Logical Network Segmentation and Diagramming
After watching this video, you will be able to diagram and segment the logical network.
-
CompTIA CASP CS0-003: Describe Risk Mitigation Strategies
After watching this video, you will be able to describe risk mitigation strategies and controls.
-
CompTIA CASP CS0-003: Reviewing Control Effectiveness
After watching this video, you will be able to review control effectiveness.
-
CompTIA CASP CS0-003: Prototyping and Testing Multiple Solutions
After watching this video, you will be able to prototype and test multiple solutions.
-
CompTIA CASP CS0-003: Creating Benchmarks and Compare to Baselines
After watching this video, you will be able to create benchmarks and compare to baselines.
-
CompTIA CASP CS0-003: Reverse Engineering and Deconstruction
After watching this video, you will be able to reverse engineer and deconstruct.
-
CompTIA CASP CS0-003: Collecting and Analyzing Metrics
After watching this video, you will be able to collect and analyze metrics.
-
CompTIA CASP CS0-003: Analyzing Metrics for Business Needs (Part 2)
After watching this video, you will be able to analyze solution metrics for business needs.
-
CompTIA CASP CS0-003: Using Judgment to Solve Problems
After watching this video, you will be able to use judgment to solve problems.
-
CompTIA CASP CS0-003: Analyzing Cyber Defense Trends
After watching this video, you will be able to analyze cyber defense trends.
-
CompTIA CASP CS0-003: Analyzing Metrics for Business Needs (Part 1)
After watching this video, you will be able to analyze solution metrics for business needs.
-
CompTIA CASP CS0-003: Physical and Virtual Devices (Part 1)
After watching this video, you will be able to describe physical and virtual network and security devices including security switches, routers, and firewalls.
-
CompTIA CASP CS0-003: Physical and Virtual Devices (Part 2)
After watching this video, you will be able to describe physical and virtual network and security devices including WAPs, WLCs, NIDS, NIPS, and NAC.
-
CompTIA CASP CS0-003: Describe Metrics for Enterprise Security
After watching this video, you will be able to describe risk metrics for enterprise security.
-
CompTIA CASP CS0-003: Advanced Network Design (Part 2)
After watching this video, you will be able to design additional advanced networking.
-
CompTIA CASP CS0-003: Complex Solutions for Data Flow
After watching this video, you will be able to specify complex solutions for data flow.
-
CompTIA CASP CS0-003: Application and Protocol-aware Technologies
After watching this video, you will be able to define application and protocol-aware technologies.
-
CompTIA CASP CS0-003: Advanced Network Design (Part 1)
After watching this video, you will be able to design advanced networking.
-
CompTIA CASP CS0-003: Advanced Configuration of Devices (Part 1)
After watching this video, you will be able to define advanced device configuration.
-
CompTIA CASP CS0-003: Secure Configuration and SDN
After watching this video, you will be able to describe secure configuration and software-defined networking.
-
CompTIA CASP CS0-003: Network Management and Monitoring Tools
After watching this video, you will be able to compare network management and monitoring tools.
-
CompTIA CASP CS0-003: Describe Security Architectures
After watching this video, you will be able to describe network and security architectures.
-
CompTIA CASP CS0-003: Implementing Trusted OSs
After watching this video, you will be able to implement trusted operating systems.
-
CompTIA CASP CS0-003: Advanced Configuration of Devices (Part 2)
After watching this video, you will be able to define additional advanced device configuration.
-
CompTIA CASP CS0-003: Advanced Configuration of Devices (Part 3)
After watching this video, you will be able to describe advanced device configurations, port filtering with CEF, and IoT/IoE security.
-
CompTIA CASP CS0-003: Host-based IDS and IPS
After watching this video, you will be able to describe host-based IDS and IPS.
-
CompTIA CASP CS0-003: Hardening Hosts
After watching this video, you will be able to harden host systems.
-
CompTIA CASP CS0-003: Least Functionality
After watching this video, you will be able to define least functionality.
-
CompTIA CASP CS0-003: Endpoint Security Software
After watching this video, you will be able to describe endpoint security software.
-
CompTIA CASP CS0-003: Scripting and Replication
After watching this video, you will be able to define scripting and replication.
-
CompTIA CASP CS0-003: Hardening Wireless Host Peripherals
After watching this video, you will be able to harden wireless peripherals.
-
CompTIA CASP CS0-003: Securing Physical Host Peripherals
After watching this video, you will be able to secure physical host peripherals.
-
CompTIA CASP CS0-003: Describe Integrating Controls for Devices
After watching this video, you will be able to describe integrating controls for host devices.
-
CompTIA CASP CS0-003: Enterprise Mobility Management
After watching this video, you will be able to manage enterprise mobility.
-
CompTIA CASP CS0-003: Boot Loader Protections
After watching this video, you will be able to protect the boot loader programs.
-
CompTIA CASP CS0-003: Terminal Services and Application Delivery Services
After watching this video, you will be able to describe terminal services and application delivery services.
-
CompTIA CASP CS0-003: Mobility Security and Privacy Concerns
After watching this video, you will be able to describe mobility security and privacy concerns.
-
CompTIA CASP CS0-003: Rooting, Jailbreaking, and Sideloading
After watching this video, you will be able to describe rooting, jailbreaking, and sideloading.
-
CompTIA CASP CS0-003: Application, Content, and Data Management
After watching this video, you will be able to describe application, content, and data management.
-
CompTIA CASP CS0-003: Enterprise Mobility Issues
After watching this video, you will be able to describe mobility security and privacy issues.
-
CompTIA CASP CS0-003: Tokenization and TPM
After watching this video, you will be able to describe tokenization and TPM.
-
CompTIA CASP CS0-003: Tethering, Bluetooth, and Gestures
After watching this video, you will be able to describe tethering, Bluetooth, and gestures.
-
CompTIA CASP CS0-003: Mobility Biometrics
After watching this video, you will be able to describe mobility biometrics.
-
CompTIA CASP CS0-003: Risk Management of New Initiatives
After watching this video, you will be able to manage risks of new initiatives.
-
CompTIA CASP CS0-003: New or Changing Business Models and Strategies
After watching this video, you will be able to describe new or changing business models and strategies.
-
CompTIA CASP CS0-003: Business and Industry Policies (Part 2)
After watching this video, you will be able to recognize and apply business and industry policies.
-
CompTIA CASP CS0-003: Internal Influences
After watching this video, you will be able to describe process and policy lifecycle management.
-
CompTIA CASP CS0-003: Security Concerns of Integrating Diverse Industries
After watching this video, you will be able to define security concerns of diverse industries.
-
CompTIA CASP CS0-003: Business and Industry Policies (Part 1)
After watching this video, you will be able to recognize and apply business and industry policies.
-
CompTIA CASP CS0-003: Impacts of Deperimeterization (Part 2)
After watching this video, you will be able to describe security requirements for contracts.
-
CompTIA CASP CS0-003: Describe Industry Influences and Risks
After watching this video, you will be able to specify general principles for sensitive information.
-
CompTIA CASP CS0-003: External Influences
After watching this video, you will be able to partner with human resources, legal , and executives.
-
CompTIA CASP CS0-003: Impacts of Deperimeterization (Part 1)
After watching this video, you will be able to define common business documentation.
-
CompTIA CASP CS0-003: Process and Policy Life Cycle Management (Part 2)
After watching this video, you will be able to describe security and privacy policies.
-
CompTIA CASP CS0-003: Partnering with HR, Legal, and Executives
After watching this video, you will be able to describe confidentiality, integrity, and availability decisions.
-
CompTIA CASP CS0-003: Process and Policy Life Cycle Management (Part 1)
After watching this video, you will be able to develop standard policies and procedures.
-
CompTIA CASP CS0-003: Security Requirements for Contracts
After watching this video, you will be able to translate risk into business terms.
-
CompTIA CASP CS0-003: General Principles for Sensitive Information
After watching this video, you will be able to treating risk.
-
CompTIA CASP CS0-003: Common Business Documentation (Part 1)
After watching this video, you will be able to define system-specific worst-case analysis.
-
CompTIA CASP CS0-003: Common Business Documentation (Part 2)
After watching this video, you will be able to determine risk.
-
CompTIA CASP CS0-003: Security and Privacy Policies
After watching this video, you will be able to describe IT governance and frameworks.
-
CompTIA CASP CS0-003: Developing Standard Policies and Practices (part 1)
After watching this video, you will be able to describe the risk management processes.
-
CompTIA CASP CS0-003: Developing Standard Policies and Practices (part 2)
After watching this video, you will be able to define business continuity planning.
-
Security+: Apply Account Management Practices
After watching this video, you will be able to describe various account management best practices.
-
Security+: Auditing and Review
After watching this video, you will be able to describe auditing and review.
-
Security+: Account Maintenance
After watching this video, you will be able to define account maintenance.
-
Security+: Recertification
After watching this video, you will be able to describe recertification.
-
Security+: Password Best Practices
After watching this video, you will be able to recognize password best practices.
-
Security+: Service Accounts
After watching this video, you will be able to specify service accounts.
-
Security+: Privileged Accounts
After watching this video, you will be able to describe privileged accounts.
-
Security+: Shared, Guest, and Generic Accounts
After watching this video, you will be able to compare shared, guest, and generic accounts.
-
Security+: User Accounts
After watching this video, you will be able to define user accounts.
-
Security+: Onboarding and Offboarding
After watching this video, you will be able to compare onboarding and offboarding.
-
Security+: Least Privilege and Time-of-day Restrictions
After watching this video, you will be able to define least privilege and time-of-day restrictions.
-
Security+: Location-based Policies
After watching this video, you will be able to describe location-based policies.
-
Security+: Group-based Access Control and Group Policy
After watching this video, you will be able to recognize group-based access control and Group Policy.
-
Security+: Credential Management and Naming Conventions
After watching this video, you will be able to define credential management and naming conventions.
-
Security+: Facial Recognition
After watching this video, you will be able to describe facial recognition.
-
Security+: Voice Recognition
After watching this video, you will be able to use voice recognition.
-
Security+: Retinal and Iris Scanner
After watching this video, you will be able to work with a retinal and iris scanner.
-
Security+: Fingerprint Scanner
After watching this video, you will be able to use a fingerprint scanner.
-
Security+: Work with Access Controls and Biometrics
After watching this video, you will be able to compare access controls and biometrics.
-
Security+: Database Security
After watching this video, you will be able to define database security.
-
Security+: File System Security
After watching this video, you will be able to define file system security.
-
Security+: Certificate-based Authentication
After watching this video, you will be able to describe certificate-based authentication.
-
Security+: Tokens
After watching this video, you will be able to define tokens.
-
Security+: False Acceptance Rate and False Recognition Rate
After watching this video, you will be able to compare FAR, FRR, and CER.
-
Security+: Open Authorization (OAuth)
After watching this video, you will be able to define OAuth.
-
Security+: Rule-based Access Control
After watching this video, you will be able to describe rule-based access control.
-
Security+: Role-based Access Control
After watching this video, you will be able to describe role-based access control.
-
Security+: Attribute-based Access Control (ABAC)
After watching this video, you will be able to define ABAC.
-
Security+: Discretionary Access Control (DAC)
After watching this video, you will be able to define DAC.
-
Security+: Mandatory Access Control (MAC)
After watching this video, you will be able to define MAC.
-
Security+: Review Identity and Access Services
After watching this video, you will be able to describe identity concepts and various access services.
-
Security+: Shibboleth
After watching this video, you will be able to describe Shibboleth.
-
Risk Management: Exercise: Describing Controls for IT Security
After watching this video, you will be able to describe various IT security controls.
-
Risk Management: Security Awareness
After watching this video, you will be able to establish and maintain a security awareness and training program.
-
Monitoring & Reporting: Security Information and Event Management (SIEM)
After watching this video, you will be able to recognize SIEM systems.
-
Monitoring & Reporting: Egress Monitoring
After watching this video, you will be able to define egress monitoring.
-
Monitoring & Reporting: Continuous Monitoring
After watching this video, you will be able to describe continuous monitoring.
-
Monitoring & Reporting: Digital Forensics Tools, Tactics, and Procedures
After watching this video, you will be able to describe digital forensics tools, tactics, and procedures.
-
Monitoring & Reporting: Evidence Collection and Handling
After watching this video, you will be able to collect and handle evidence.
-
Monitoring & Reporting: Exercise: Describe Security Management of Operations
After watching this video, you will be able to describe security management of operations.
-
Monitoring & Reporting: Reporting and Documentation
After watching this video, you will be able to report and document thoroughly.
-
Monitoring & Reporting: Investigative Techniques
After watching this video, you will be able to compare investigative techniques.
-
Monitoring & Reporting: Intrusion Detection and Prevention
After watching this video, you will be able to describe IDS and IPS.
-
Security: Contractual, Legal, and Regulatory Requirements
determine contractual, legal, industry standard, and regulatory requirements
-
Security: Security Governance Principles
evaluate and apply security governance principles
-
Security: Legal and Regulatory Issues
recall legal and regulatory considerations
-
Security: Privacy Requirements
describe principles and requirements for privacy
-
Security: Scope, Plan, and BIA Development
develop and document scope, plan, and business impact analysis
-
Security: Policies, Standards, Procedures, and Guidelines
develop, document, and implement security policies, standards, procedures, and guidelines
-
Security: Security and Business Strategy Alignment
align security functions with business strategies and objectives
-
Security: Exercise: Describing Governance, Compliance, and BCP
describe aspects of governance, compliance, and business continuity planning
-
Security: Licensing, IP Requirements, and Privacy
describe licensing, intellectual property, and privacy requirements
-
Risk Management: Risk Assessment and Analysis
After watching this video, you will be able to apply risk assessment and analysis techniques.
-
Risk Management: Personnel Security Policies
After watching this video, you will be able to enforce personnel security policies and procedures.
-
Security: Due Care and Due Diligence
ensure compliance with due care and due diligence
-
Security: Security Control Frameworks
identify common security control frameworks
-
Security: Import/Export and Transborder Data Controls
compare import/export and transborder data controls
-
Security: Cybercrimes and Data Breaches
identify and analyze cybercrimes and data breaches
-
Risk Management: Risk Response, Measurement, and Monitoring
After watching this video, you will be able to respond to risks, including measurement and monitoring.
-
Risk Management: Risk-based Supply Chain Management
After watching this video, you will be able to apply risk-based management concepts to the supply chain.
-
Risk Management: Threat Modeling
After watching this video, you will be able to implement threat modeling concepts and methodologies.
-
Conducting Incident Management: Implementing Patch and Vulnerability Management
After watching this video, you will be able to implement patch and vulnerability management.
-
Conducting Incident Management: Operating Detective and Preventative Measures
After watching this video, you will be able to conduct detective and preventative measures.
-
Conducting Incident Management: Implementing Recovery Strategies
After watching this video, you will be able to implement recovery strategies.
-
Conducting Incident Management: Exploring Change Management Processes
After watching this video, you will be able to participate in change management processes.
-
Conducting Incident Management: Implementing Enterprise Physical Security
After watching this video, you will be able to describe enterprise physical security.
-
Conducting Incident Management: Implementing Perimeter Physical Security
After watching this video, you will be able to describe perimeter physical security.
-
Conducting Incident Management: Exercise: Describe Incident Management
After watching this video, you will be able to describe incident handling and management.
-
Conducting Incident Management: Personnel Safety and Security Concerns
After watching this video, you will be able to address personnel safety and security concerns.
-
Conducting Incident Management: Implementing Disaster Recovery (DR)
After watching this video, you will be able to implement disaster recovery processes.
-
Conducting Incident Management: Participating in Business Continuity Planning (BCP)
After watching this video, you will be able to describe business continuity planning.
-
Conducting Incident Management: Testing Disaster Recovery Plans
After watching this video, you will be able to test disaster recovery plans.
-
Software Development Security: Identifying Security Controls for Development
After watching this video, you will be able to identify security controls for development.
-
Software Development Security: Integrating Security in the SDLC
After watching this video, you will be able to integrate security in the SDLC.
-
Software Development Security: Assessing the Effectiveness of Software Security
After watching this video, you will be able to assess the effectiveness of software security.
-
Software Development Security: Identifying Software Development Phases
After watching this video, you will be able to identify software development phases.
-
Conducting Incident Management: Utilizing Additional Physical Controls
After watching this video, you will be able to utilize additional physical controls.
-
Software Development Security: Applying Secure Coding Standards
After watching this video, you will be able to apply secure coding techniques.
-
Software Development Security: Assessing the Security Impact of Acquired Software
After watching this video, you will be able to assess the security impact of acquired software.
-
Software Development Security: Exercise: Securing the Development Environment
After watching this video, you will be able to secure the development environment.
-
Software Development Security: Applying Secure Coding Best Practices
After watching this video, you will be able to describe secure coding best practices.
-
(ISC)² & Security Fundamentals: The (ISC)² Organization
After watching this video, you will be able to describe the (ISC)² organization.
-
(ISC)² & Security Fundamentals: The CISSP Exam
After watching this video, you will be able to recall the CISSP exam contents, format, and scoring.
-
(ISC)² & Security Fundamentals: The (ISC)² Code of Professional Ethics
After watching this video, you will be able to define the (ISC)² Code of Professional Ethics.
-
(ISC)² & Security Fundamentals: Identify and Classify Information and Assets
After watching this video, you will be able to recall how information and assets are identified and classified.
-
(ISC)² & Security Fundamentals: Confidentiality, Integrity, and Availability
After watching this video, you will be able to define the CIA triad.
-
(ISC)² & Security Fundamentals: Protect Privacy
After watching this video, you will be able to describe how to protect data privacy.
-
(ISC)² & Security Fundamentals: Determine Information and Asset Ownership
After watching this video, you will be able to determine ownership of information and assets.
-
(ISC)² & Security Fundamentals: Exercise: Describing (ISC)² CISSP Fundamentals
After watching this video, you will be able to explain and describe (ISC)² CISSP fundamentals.
-
(ISC)² & Security Fundamentals: Asset Retention
After watching this video, you will be able to ensure appropriate retention of assets.
-
(ISC)² & Security Fundamentals: Requirements for Information and Asset Handling
After watching this video, you will be able to establish information-handling and asset-handling requirements.
-
(ISC)² & Security Fundamentals: Data Security Controls
After watching this video, you will be able to determine appropriate data security controls.
-
CISM: Aligning Security Programs with Business Functions
After watching this video, you will be able to align security programs with business functions.
-
CISM: Compliance Reporting Requirements and Processes
After watching this video, you will be able to specify compliance reporting requirements and processes.
-
CISM: Risk Management for Business and IT Processes
After watching this video, you will be able to define risk management for business and IT processes.
-
CISM: Information Security Gap Analysis Techniques
After watching this video, you will be able to describe information security gap analysis techniques.
-
CISM: Analyzing Information Security Controls and Methods
After watching this video, you will be able to analyze information security controls and methods.
-
CISM: Comparing Control Baselines and Standards
After watching this video, you will be able to compare control baselines and standards.
-
CISM: Risk Treatment and Response Methodologies
After watching this video, you will be able to apply risk treatment and response methodologies.
-
CISM: Realizing Risk Reporting Requirements
After watching this video, you will be able to realizing risk reporting requirements.
-
CISM: Prioritizing Risk Scenarios and Treatment
After watching this video, you will be able to prioritize risk scenarios and treatment.
-
CISM: Describe Information Risk Management
After watching this video, you will be able to describe information risk management.
-
CISM: Performing Cost-benefit Analysis for Risk Assessment
After watching this video, you will be able to perform cost benefit analysis for risk assessment.
-
CISM: Identifying Events Needing Risk Reassessment
After watching this video, you will be able to identify events needing risk reassessment.
-
CISM: Recognizing Information Security Threat Sources
After watching this video, you will be able to specify information security threat sources.
-
CISM: Legal, Regulatory, and Organizational Requirements
After watching this video, you will be able to know legal, regulatory, and organizational requirements.
-
CISM: Recognizing Information Asset Valuation Methods
After watching this video, you will be able to recognize information asset valuation methods.
-
CISM: Monitoring Internal and External Risk Factors
After watching this video, you will be able to monitor internal and external risk factors.
-
CISM: Evaluating Impacts of Events on Information Assets
After watching this video, you will be able to evaluate impacts of events on information assets.
-
CISM: Assigning Ownership of Information Assets and Risk
After watching this video, you will be able to assign ownership of assets and risk.
-
CISM: Risk Assessment and Analysis Methodologies
After watching this video, you will be able to know risk assessment and analysis methodologies.
-
CISM: Define Information Risk Management
After watching this video, you will be able to define information risk management.
-
CISM: Information Threats, Vulnerabilities and Exposures
After watching this video, you will be able to define information threats, vulnerabilities and exposures.
-
CISM: Monitoring Performance of InfoSec Responsibilities
After watching this video, you will be able to recognize processes to monitor performance of InfoSec responsibilities.
-
CISM: Security Responsibilities of Organizational Staff
After watching this video, you will be able to recognize information security responsibilities of staff across the organization.
-
CISM: Structures, Lines of Authority, and Escalation
After watching this video, you will be able to describe the types of organizational structures, lines of authority, and escalation points.
-
CISM: Responsibilities of the InfoSec Manager
After watching this video, you will be able to define the responsibilities of the InfoSec manager.
-
CISM: Senior Leadership and Stakeholder Communication
After watching this video, you will be able to specify the methods and considerations of senior leadership and stakeholder communication.
-
CISM: Commitment from Senior Leadership and Stakeholders
After watching this video, you will be able to obtain commitment from senior leadership and stakeholders by using key information.
-
CISM: The Information Asset Classification Model
After watching this video, you will be able to recognize information asset classification.
-
CISM: Define InfoSec Governance
After watching this video, you will be able to define InfoSec governance.
-
CISM: Working with Key Information Security Metrics
After watching this video, you will be able to work with key information security metrics.
-
CISM: Establishing Reporting and Communication Channels
After watching this video, you will be able to describe reporting and communication channels.
-
CISM: Define InfoSec Security Management
After watching this video, you will be able to define InfoSec security management.
-
CISM: KPIs and Metrics to Evaluate the Response Plan
After watching this video, you will be able to define KPIs and metrics to evaluate the response plan.
-
CISM: Regulatory, Legal and Organization Requirements
After watching this video, you will be able to specify regulatory, legal and organization requirements.
-
CISM: Techniques to Test the Incident Response Plan
After watching this video, you will be able to know techniques to test the incident response plan.
-
CISM: Identifying Impact of Changes to the Environment
After watching this video, you will be able to identify impact of changes to the environment.
-
CISM: Classifying Resources for Investigation of Incidents
After watching this video, you will be able to classify resources for investigation of incidents.
-
CISM: Detecting, Logging, Analyzing and Documenting Events
After watching this video, you will be able to detect, log, analyze and document events.
-
CISM: Quantifying Damages, Costs and Business Impacts
After watching this video, you will be able to quantify damages, costs and business impacts.
-
CISM: Post-incident Review Practices and Investigations
After watching this video, you will be able to define post-incident review practices and investigations.
-
CISM: Incident Reporting Requirements and Procedures
After watching this video, you will be able to describe incident reporting requirements and procedures.
-
CISM: Describe Security Incident Management
After watching this video, you will be able to describe security incident management.
-
CISM: Forensic Requirements for Handling Evidence
After watching this video, you will be able to classify forensic requirements for handling evidence.
-
CISM: Incident Response Training, Tools, and Equipment
After watching this video, you will be able to know IRT training, tools, and equipment.
-
CISM: Roles and Responsibilities in Security Incidents
After watching this video, you will be able to define roles and responsibilities in security Incidents.
-
CISM: Notification and Escalation Processes
After watching this video, you will be able to describe notification and escalation processes.
-
CISM: Defining Incident Containment Methods
After watching this video, you will be able to define incident containment methods.
-
CISM: Incident Classification and Categorization Methods
After watching this video, you will be able to specify methods for incident classification and categorization.
-
CISM: Mapping the BCP and DRP to the IRP
After watching this video, you will be able to map the BCP and DRP to the IRP.
-
CISM: Components of an Incident Response Plan
After watching this video, you will be able to define components of an incident response plan (IRP).
-
CISM: Incident Management Concepts and Practices
After watching this video, you will be able to describe incident management concepts.
-
CISM: Describe Program Development & Management
After watching this video, you will be able to describe program development and management.
-
CISM: Communicating Program Status to Key Stakeholders
After watching this video, you will be able to communicate program status to key stakeholders.
-
CISM: Testing the Effectiveness of Security Controls
After watching this video, you will be able to testing the effectiveness of security controls.
-
CISM: Implementing Operational Security Metrics
After watching this video, you will be able to implement operational security metrics.
-
CISM: Reviewing Third-party Contracts and Agreements
After watching this video, you will be able to review third-party contracts and agreements.
-
CISM: Contracts, Agreements, and Third-party Management
After watching this video, you will be able to define contracts, agreements, and third-parties.
-
CISM: Integrating Mandates into Organizational Processes
After watching this video, you will be able to integrate mandates into organizational processes.
-
CISM: Developing Security Awareness and Training Programs
After watching this video, you will be able to develop security awareness and training programs.
-
CISM: Define Program Development and Control
After watching this video, you will be able to describe program development and control.
-
CISM: Implementing Information Security Standards
After watching this video, you will be able to implement information security standards.
-
CISM: Regulations, Standards, Frameworks, and Practices
After watching this video, you will be able to describe regulations, standards, frameworks and practices.
-
CISM: Security Standards, Procedures, and Guidelines
After watching this video, you will be able to define security standards, procedures and guidelines.
-
CISM: Applying Information Security Controls and Resources
After watching this video, you will be able to apply information security controls and resources.
-
CISM: Designing and Implementing Security Controls
After watching this video, you will be able to design and implement security controls.
-
CISM: Survey of Current and Emerging Security Technologies
After watching this video, you will be able to know current and emerging security technologies.
-
CISM: Acquiring and Managing Resource Requirements
After watching this video, you will be able to acquire and manage resource requirements.
-
CISM: Skills Training for Information Security Personnel
After watching this video, you will be able to describe skills training for information security personnel.
-
Security+: Common Vulnerabilities
After watching this video, you will be able to identify different vulnerabilities.
-
Security+: Malware Threats
After watching this video, you will be able to identify different malware threats
-
CISM: Strategic Budgetary Planning and Reporting
After watching this video, you will be able to describe strategic budgetary planning and reporting.
-
CISM: Developing Business Cases
After watching this video, you will be able to recognize developing business cases.
-
CISM: Contributing Factors for InfoSec Development
After watching this video, you will be able to specify the contributing factors for InfoSec development.
-
CISM: Integrating into Corporate Governance
After watching this video, you will be able to work with integrating into corporate governance.
-
CISM: Governance Planning, Design, and Implementation
After watching this video, you will be able to define governance planning, design, and implementation.
-
CISM: Standards, Frameworks, and Best Practices
After watching this video, you will be able to recall standards, frameworks, and best practices.
-
CISM: Fundamental Concepts of Governance
After watching this video, you will be able to recognize concepts of governance.
-
CISM: Available InfoSec Governance Frameworks
After watching this video, you will be able to describe InfoSec governance frameworks.
-
CISM: Information Security Relationship to Key Factors
After watching this video, you will be able to compare InfoSec relationships to key factors.
-
CISM: Information Security Strategy Techniques
After watching this video, you will be able to identify InfoSec strategy techniques.
-
CISM: Impact of Internal and External Influences
After watching this video, you will be able to recognize the impact of internal and external influences.
-
CISM: Describe InfoSec Governance
After watching this video, you will be able to describe InfoSec governance.
-
Security Trends: Mobile Devices and Malware
After watching this video, you will be able to describe how the prevalence of mobile devices has created a whole new platform for vulnerabilities.
-
Security Trends: Wearables and Vulnerabilities
After watching this video, you will be able to describe how wearables and other nontraditional platforms being connected can raise security concerns.
-
Security Trends: Smart Appliances and IoT devices
After watching this video, you will be able to specify how more and more everyday devices becoming Internet connected can have negative effects on security.
-
Security Trends: Outsourced IT
After watching this video, you will be able to specify how outsourcing IT can affect the overall security of a business.
-
Security Trends: BYOD And Business
After watching this video, you will be able to list the pros and cons that can arise from a BYOD environment in a workplace.
-
Security Trends: Securing Data in the Cloud
After watching this video, you will be able to describe why putting data in the cloud can be useful and some ways to secure it.
-
Security Trends: Data at Rest
After watching this video, you will be able to specify how insecure databases can lead to large data leaks.
-
Security Trends: Use BitLocker to Protect Data at Rest
After watching this video, you will be able to protect stored data with encryption.
-
Security Trends: TLS
After watching this video, you will be able to recognize why TLS is becoming more prevalent and why its use is recommended.
-
Security Trends: Enable Cloud Multi-factor Authentication
After watching this video, you will be able to secure cloud user accounts with MFA.
-
Security Trends: Multi-factor Authentication (MFA)
After watching this video, you will be able to identify why multi-factor authentication has come into common use and its benefits.
-
Security Trends: Encrypting Cloud Data
After watching this video, you will be able to enable encryption to protect cloud data at rest.
-
Security Trends: White Hat Hacking
After watching this video, you will be able to describe what white hat hackers are and how they can help ameliorate the security of a business or product.
-
Security Trends: Threat Identification
After watching this video, you will be able to list common sources of security breaches and how to protect against them.
-
Security Trends: Cyber Insurance
After watching this video, you will be able to recognize how organizations are beginning to protect themselves from IT attacks.
-
Security Trends: Single Sign-On and Identity Federation
After watching this video, you will be able to describe how Single Sign-On can be used to improve security.
-
Security Trends: Exploit Kits
After watching this video, you will be able to describe how exploit kits can be used to take advantage of vulnerabilities in operating systems and applications.
-
Security Trends: Phishing
After watching this video, you will be able to specify how phishing can affect the security of a business.
-
Security Trends: Social Engineering
After watching this video, you will be able to describe what social engineering is and why it can be so dangerous.
-
Security Trends: Web-based Applications
After watching this video, you will be able to describe how web-based applications have gained more popularity and what implications for data security they have.
-
Security Trends: Bug Bounties
After watching this video, you will be able to specify how bug bounties can help result in more exploits being found and fixed.
-
Security Trends: State Sponsored Hacking
After watching this video, you will be able to describe how the influence of governments in hacking incidents has become a large issue for IT security.
-
Security Trends: Ransomware
After watching this video, you will be able to define ransomware attacks and how they can affect sensitive data.
-
Security Trends: Web Application Firewalls (WAFs)
After watching this video, you will be able to describe how WAFs can protect web applications.
-
Security Trends: Data Loss Prevention (DLP)
After watching this video, you will be able to determine how DLP can secure digital assets.
-
Security Trends: List Hacker Tools and Methods
After watching this video, you will be able to dsecribe how malicious users use tools to exploit vulnerabilities.
-
Security Trends: Disaster Recovery
After watching this video, you will be able to list and define disaster recovery terms such as BCP, DRP, RTO, and RPO.
-
Security Trends: Identifying Social Engineering Attempts
After watching this video, you will be able to recognize deceptive e-mail messages.
-
Security+: Brute-force Tools
After watching this video, you will be able to demonstrate brute-force tools.
-
Security+: Additional Security Considerations
After watching this video, you will be able to describe the purpose of various security controls such as faraday cages, cable locks, screen filters, cameras, and sign-in and sign-out logs.
-
Security+: Environmental Controls
After watching this video, you will be able to define the importance of HVAC systems and fire suppression systems.
-
Security+: Authentication
After watching this video, you will be able to describe various authentication options.
-
Security+: Protected Systems
After watching this video, you will be able to define the concept of a protected system and air gaps.
-
Security+: Motion Detection
After watching this video, you will be able to describe various types of motion detection systems.
-
Security+: Alarms
After watching this video, you will be able to describe the importance of alarms and the difference between false alarms and true alarms.
-
Security+: Controlling Access
After watching this video, you will be able to identify the various methods that can be used to control or deter physical access.
-
Security+: Locks
After watching this video, you will be able to identify different types of locks and describe the importance of key management.
-
Security+: Secure Enclosures
After watching this video, you will be able to identify the benefits of using safes and secure cabinets.
-
Security+: Lighting
After watching this video, you will be able to identify the importance of lighting in relation to security.
-
Security+: Introduction to Physical Security
After watching this video, you will be able to describe the importance of physical security in relation to the success of your organization.
-
Security+: Defense in Depth
After watching this video, you will be able to describe the benefits of implementing a layered security approach and the importance of diversity and user training.
-
Security+: Recall Wireless Security Concepts
After watching this video, you will be able to to recall various wireless security topics and concepts.
-
Security+: Captive Portals
After watching this video, you will be able to describe and use a captive portal.
-
Security+: Secure Configuration Guidelines
After watching this video, you will be able to specify the reasoning behind following secure configuration guidelines.
-
Security+: Frameworks and Architectures
After watching this video, you will be able to identify the purpose of various frameworks and architectures.
-
Security+: Configuring a WPA2 PSK Wireless Network
After watching this video, you will be able to configure a WPA2 PSK wireless network.
-
Security+: Configuring a WPA Enterprise Wireless Network
After watching this video, you will be able to configure a WPA enterprise wireless network.
-
Security+: Wi-Fi Protected Setup
After watching this video, you will be able to describe and use Wi-Fi Protected Setup.
-
Security+: Configuring a WPA2 Enterprise Wireless Network
After watching this video, you will be able to configure a WPA2 enterprise wireless network.
-
Security+: Configuring an Open Wireless Network
After watching this video, you will be able to configure an open wireless network.
-
Security+: Wireless Encryption
After watching this video, you will be able to identify the common methods of encrypting communications on wireless networks.
-
Security+: Configuring a WPA PSK Wireless Network
After watching this video, you will be able to configure a WPA PSK wireless network
-
Security+: Types of Wireless Networks
After watching this video, you will be able to identify the differences between the three different types of wireless networks.
-
Security+: Introducing Wireless Security
After watching this video, you will be able to describe the importance of authentication and encryption for wireless networks.
-
Security+: Wireless Authentication
After watching this video, you will be able to distinguish between PSK and enterprise authentication for wireless networks.
-
Security+: WPA and WPA2
After watching this video, you will be able to choose the most appropriate wireless standard and mode to secure your wireless communications.
-
Security+: Unauthorized Software
After watching this video, you will be able to define unauthorized software.
-
Security+: Personnel Issues
After watching this video, you will be able to classify personnel issues.
-
Security+: License Compliance Violation
After watching this video, you will be able to recognize license compliance violation.
-
Security+: Baseline Deviation
After watching this video, you will be able to define baseline deviation.
-
Security+: Weak Security Configurations
After watching this video, you will be able to recognize weak security configurations.
-
Security+: Misconfigured Devices
After watching this video, you will be able to describe misconfigured devices.
-
Security+: Authentication Issues
After watching this video, you will be able to specify authentication issues.
-
Security+: Asset Management
After watching this video, you will be able to describe asset management.
-
Security+: Identity and Access Management Part 1
After watching this video, you will be able to compare identity and access management concepts.
-
Security+: Troubleshoot Security Issues
After watching this video, you will be able to specify various security troubleshooting issues.
-
Security+: Routing Protocol Authentication
After watching this video, you will be able to work with routing protocol authentication.
-
Security+: Secure MIME (S/MIME)
After watching this video, you will be able to describe S/MIME.
-
Security+: Unencrypted Credentials
After watching this video, you will be able to define unencrypted credentials.
-
Security+: Recognize Secure Versions of Protocols
After watching this video, you will be able to recognize various secure versions of common protocols.
-
Security+: Post Office/Internet Message Access Protocols
After watching this video, you will be able to describe Secure POP/IMAP.
-
Security+: Data Exfiltration
After watching this video, you will be able to describe data exfiltration.
-
Security+: Permission Issues
After watching this video, you will be able to specify permission issues.
-
Security+: Logs and Events Anomalies
After watching this video, you will be able to describe logs and events anomalies.
-
Security+: Certificate Issues
After watching this video, you will be able to specify certificate issues.
-
Security+: Access Violations
After watching this video, you will be able to define access violations.
-
Security+: Secure Sockets Layer/Transport Layer Security
After watching this video, you will be able to describe Secure Sockets Layer and Transport Layer Security (SSL/TLS).
-
Security+: Secure Shell (SSH)
After watching this video, you will be able to work with SSH.
-
Security+: Domain Naming System/Secure (DNSSEC)
After watching this video, you will be able to describe DNSSEC.
-
Security+: Hypertext Transfer Protocol/Secure (HTTPS)
After watching this video, you will be able to describe HTTPS.
-
Security+: Network Time Protocol (NTPv3)
After watching this video, you will be able to describe NTPv3.
-
Security+: Simple Network Management Protocol (SNMPv3)
After watching this video, you will be able to describe work with SNMPv3.
-
Security+: File Transfer Protocol/Secure (FTPS)
After watching this video, you will be able to describe FTPS.
-
Security+: Secure Real-time Transport Protocol (SRTP)
After watching this video, you will be able to describe SRTP.
-
Security+: Lightweight Directory Access Protocol/Secure (LDAPS)
After watching this video, you will be able to describe LDAPS.
-
Security+: Secure File Transfer Protocol (SFTP)
After watching this video, you will be able to describe SFTP.
-
Security+: X.509 Certificates
After watching this video, you will be able to recognize the X.509 certificate format and file extensions.
-
Security+: Recall PKI Concepts
After watching this video, you will be able to recall various PKI concepts.
-
Security+: Types of Certificates
After watching this video, you will be able to describe various types certificates and their uses.
-
Security+: Pinning
After watching this video, you will be able to identify the purpose and types of pinning.
-
Security+: Certificate Chaining
After watching this video, you will be able to describe the concept of certificate chaining.
-
Security+: Key Escrow
After watching this video, you will be able to describe the benefits of key escrow and when you might consider using it.
-
Security+: Expiration, Revocation, Suspension
After watching this video, you will be able to describe the benefits of certificate expiration, revocation, and suspension, and distinguish between a CRL and OCSP.
-
Security+: PKI Overview
After watching this video, you will be able to recall the purpose of a PKI and a trusted introducer.
-
Security+: Identify Features/Services of Cryptography
After watching this video, you will be able to identify various cryptographic features and services.
-
Security+: CA Trust Models
After watching this video, you will be able to recognize the various CA trust models that can be implemented, such as single CA, hierarchical, bridge, peer-to-peer, and mesh.
-
Security+: Public Key Infrastructure
After watching this video, you will be able to describe the benefits and uses of the public key infrastructure for an organization.
-
Security+: Additional Security Considerations
After watching this video, you will be able to identify additional security considerations such as steganography, obscurity, and weak algorithms.
-
Security+: Key Stretching
After watching this video, you will be able to describe the purpose of key stretching.
-
Security+: Hashing Functions
After watching this video, you will be able to identify various hashing functions.
-
Security+: Hashing
After watching this video, you will be able to describe hashing.
-
Security+: Authentication
After watching this video, you will be able to describe authentication.
-
Security+: Data Integrity
After watching this video, you will be able to describe data integrity.
-
Security+: Symmetric Algorithms
After watching this video, you will be able to identify various symmetric algorithms.
-
Security+: Introducing Symmetric Algorithms
After watching this video, you will be able to describe symmetric algorithms.
-
Security+: Asymmetric Algorithms
After watching this video, you will be able to identify various asymmetric algorithms.
-
Security+: Introducing Asymmetric Algorithms
After watching this video, you will be able to describe asymmetric algorithms.
-
Security+: Digital Signatures
After watching this video, you will be able to describe the purpose of digital signatures.
-
Security+: Encryption
After watching this video, you will be able to describe the purpose of encryption.
-
Security+: Properties of Secure Ciphers
After watching this video, you will be able to identify the properties of a secure cipher.
-
Security+: Ciphers
After watching this video, you will be able to identify the purpose of a cipher.
-
Security+: Stream Cipher
After watching this video, you will be able to describe the function of stream ciphers.
-
Security+: Block Cipher
After watching this video, you will be able to describe the function of block ciphers.
-
Security+: Introduction to Cryptography
After watching this video, you will be able to identify the role cryptography plays in maintaining CIA.
-
Security+: Key Exchange
After watching this video, you will be able to recognize the various ways to exchange cryptographic keys.
-
Security+: Keys
After watching this video, you will be able to describe the purpose of a cryptographic key.
-
Security+: TACACS+
After watching this video, you will be able to describe Terminal Access Controller Access Control System (TACACS+).
-
Security+: Remote Authentication Dial-in User Service (RADIUS)
After watching this video, you will be able to describe RADIUS.
-
Security+: Lightweight Directory Access Protocol (LDAP)
After watching this video, you will be able to define LDAP.
-
Security+: Kerberos
After watching this video, you will be able to recognize Kerberos.
-
Security+: Identity and Access Management Part 2
After watching this video, you will be able to compare and contrast identity and access management concepts.
-
Security+: Challenge Handshake Authentication Protocol (CHAP)
After watching this video, you will be able to compare PAP, CHAP, and MSCHAP.
-
Security+: NT LAN Manager (NTLM)
After watching this video, you will be able to define NTLM.
-
Security+: Security Assertion Markup Language (SAML)
After watching this video, you will be able to define SAML.
-
Security+: Secure Token
After watching this video, you will be able to describe secure token.
-
Security+: OpenID Connect
After watching this video, you will be able to specify OpenID Connect.
-
Security+: Push Notification Services
After watching this video, you will be able to describe push notification services.
-
Security+: Geofencing and Geolocation
After watching this video, you will be able to compare geofencing and geolocation.
-
Security+: Containerization and Storage Segmentation
After watching this video, you will be able to classify containerization and storage segmentation.
-
Security+: Biometrics and Context-aware Authentication
After watching this video, you will be able to define biometrics and context-aware authentication.
-
Security+: Remote Wipe
After watching this video, you will be able to describe remote wipe.
-
Security+: Application and Content Management
After watching this video, you will be able to define application and content management.
-
Security+: Passwords, Pins, and Screen Locks
After watching this video, you will be able to describe passwords, pins, and screen locks.
-
Security+: Work with Technology Output Analysis
After watching this video, you will be able to work with technology output analysis.
-
Security+: Web Application Firewall
After watching this video, you will be able to describe web application firewall.
-
Security+: Deployment Models
After watching this video, you will be able to compare deployment models.
-
Security+: Survey of Connection Methods
After watching this video, you will be able to specify connection methods.
-
Security+: Unified Threat Management (UTM)
After watching this video, you will be able to describe UTM.
-
Security+: Patch Management Tools
After watching this video, you will be able to compare patch management tools.
-
Security+: Data Execution Prevention (DEP)
After watching this video, you will be able to specify data execution prevention.
-
Security+: Data Loss Prevention (DLP)
After watching this video, you will be able to define DLP.
-
Security+: Removable Media Control
After watching this video, you will be able to define removable media control.
-
Security+: Application Whitelisting
After watching this video, you will be able to specify application whitelisting.
-
Security+: Antivirus
After watching this video, you will be able to describe antivirus.
-
Security+: Host Intrusion Prevention
After watching this video, you will be able to work with Host Intrusion Detection System (HIDS) and Host Intrusion Prevention System (HIPS).
-
Security+: Host-based Firewall
After watching this video, you will be able to describe a host-based firewall.
-
Security+: File Integrity Check
After watching this video, you will be able to define file integrity check.
-
Security+: Passive vs. Active
After watching this video, you will be able to compare passive vs. active.
-
Security+: Banner Grabbing
After watching this video, you will be able to define banner grabbing.
-
Security+: Use Security Assessment Tools
After watching this video, you will be able to work with security assessment using software tools.
-
Security+: Other Command Line Tools
After watching this video, you will be able to describe other command line tools.
-
Security+: Honeypots
After watching this video, you will be able to describe honeypots.
-
Security+: Steganography Tools
After watching this video, you will be able to define steganography tools.
-
Security+: Backup Utilities
After watching this video, you will be able to configure backup utilities.
-
Security+: Configuration Compliance Scanner
After watching this video, you will be able to define configuration compliance scanner.
-
Security+: Vulnerability Scanners
After watching this video, you will be able to describe vulnerability scanners.
-
Security+: Data Sanitization Tools
After watching this video, you will be able to compare data sanitization tools.
-
Security+: Exploitation Frameworks
After watching this video, you will be able to describe exploitation frameworks.
-
Security+: Network Scanners
After watching this video, you will be able to work with network scanners.
-
Security+: Password Crackers
After watching this video, you will be able to work with password crackers.
-
Security+: Wireless Scanners/Cracker
After watching this video, you will be able to specify wireless scanners/cracker.
-
Security+: Specialty Appliances
After watching this video, you will be able to recognize specialty appliances.
-
Security+: Encryption Gateways
After watching this video, you will be able to define encryption gateways.
-
Security+: Protocol Analyzers
After watching this video, you will be able to work with protocol analyzers.
-
Security+: Work with Organizational Components
After watching this video, you will be able to describe the various components that support organizational security.
-
Security+: NAC Gateways
After watching this video, you will be able to define NAC gateways.
-
Security+: DLP Systems
After watching this video, you will be able to describe DLP systems.
-
Security+: Media Gateways
After watching this video, you will be able to define media gateways.
-
Security+: Mail Gateways
After watching this video, you will be able to describe mail gateways.
-
Security+: Enforcement and Monitoring: Part 1
After watching this video, you will be able to describe enforcement and monitoring.
-
Security+: Full Device Encryption
After watching this video, you will be able to describe full device encryption.
-
Security+: Secure Mobile Devices
After watching this video, you will be able to describe ways to secure mobile devices.
-
Security+: Enforcement and Monitoring: Part 2
After watching this video, you will be able to describe enforcement and monitoring.
-
Security+: Online vs. Offline Attacks
After watching this video, you will be able to compare online vs. offline attacks.
-
Security+: Birthday, Known Plaintext, and Cipher Attacks
After watching this video, you will be able to describe birthday, known plaintext, and cipher attacks.
-
Security+: Downgrade Attacks
After watching this video, you will be able to describe downgrade attacks.
-
Security+: Collisions
After watching this video, you will be able to define collisions.
-
Security+: Brute-Force and Dictionary Attacks
After watching this video, you will be able to recognize brute-force and dictionary attacks.
-
Security+: Bluejacking and Bluesnarfing
After watching this video, you will be able to compare bluejacking and bluesnarfing.
-
Security+: Initialization Vector Weaknesses
After watching this video, you will be able to specify initialization vector weaknesses.
-
Security+: Replay Attacks
After watching this video, you will be able to recognize replay attacks.
-
Security+: Jamming
After watching this video, you will be able to describe jamming.
-
Security+: Evil Twins and Rogue Apps
After watching this video, you will be able to compare evil twins and rogue apps.
-
Security+: SIEM Systems
After watching this video, you will be able to define SIEM systems.
-
Security+: Wireless Access Points
After watching this video, you will be able to recognize wireless access points.
-
Security+: NIDS and NIPS
After watching this video, you will be able to compare NIDS and NIPS.
-
Security+: VPN Concentrators
After watching this video, you will be able to describe VPN concentrators.
-
Security+: Routers
After watching this video, you will be able to describe routers.
-
Security+: Bridges and Switches
After watching this video, you will be able to compare bridges and switches.
-
Security+: Improper Certificate and Key Management
After watching this video, you will be able to define improper certificate and key management.
-
Security+: New Threats and Zero Day Attacks
After watching this video, you will be able to recognize new threats and zero day attacks.
-
Security+: Firewalls
After watching this video, you will be able to define firewalls.
-
Security+: Identify the Impact of Vulnerabilities
After watching this video, you will be able to specify the impact of different types of vulnerabilities.
-
Security+: Proxies and Load Balancers
After watching this video, you will be able to compare proxies and load balancers.
-
Security+: Architecture and Design Weaknesses
After watching this video, you will be able to describe architecture and design weaknesses.
-
Security+: Improperly Configured Accounts
After watching this video, you will be able to work with improperly configured accounts.
-
Security+: Untrained Users
After watching this video, you will be able to specify untrained users.
-
Security+: Weak Cipher Suites and Implementations
After watching this video, you will be able to recognize weak cipher suites and implementations.
-
Security+: Vulnerable Business Processes
After watching this video, you will be able to recognize vulnerable business processes.
-
Security+: Improper Input and Error Handling
After watching this video, you will be able to specify improper input and error handling.
-
Security+: System Vulnerabilities
After watching this video, you will be able to recognize system vulnerabilities.
-
Security+: Resource Exhaustion
After watching this video, you will be able to describe resource exhaustion.
-
Security+: Misconfiguration
After watching this video, you will be able to define misconfiguration.
-
Security+: System Sprawl and Undocumented Assets
After watching this video, you will be able to describe system sprawl and undocumented assets.
-
Security+: Memory and Buffer Vulnerability
After watching this video, you will be able to define memory and buffer vulnerability.
-
Security+: Identifying Common Misconfigurations
After watching this video, you will be able to identify common misconfigurations.
-
Security+: Identifying Lack of Security Controls
After watching this video, you will be able to identify lack of security controls.
-
Security+: Credentialed vs. Noncredentialed
After watching this video, you will be able to compare credentialed vs. noncredentialed.
-
Security+: Intrusive vs. Nonintrusive
After watching this video, you will be able to compare intrusive vs. nonintrusive.
-
Security+: Pentesting vs. Vulnerability Scanning
After watching this video, you will be able to compare pentesting vs. vulnerability scanning.
-
Security+: Identifying Vulnerability
After watching this video, you will be able to identify vulnerability.
-
Security+: Passively Testing Security Controls
After watching this video, you will be able to passively test security controls.
-
Security+: Working with Pentesting and Scanning
After watching this video, you will be able to recognize penetration testing and vulnerability scanning methods.
-
Security+: False Positives
After watching this video, you will be able to describe false positives.
-
Security+: Race Conditions
After watching this video, you will be able to describe race conditions.
-
Security+: Define Cryptographic and Wireless Attacks
After watching this video, you will be able to recognize cryptographic and wireless attacks.
-
Security+: RFID and Near Field Communication (NFC)
After watching this video, you will be able to compare RFID and near field communication (NFC).
-
Security+: Pivot
After watching this video, you will be able to describe a pivot.
-
Security+: Active vs. Passive Reconnaissance
After watching this video, you will be able to compare active vs. passive reconnaissance.
-
Security+: Disassociation Attacks
After watching this video, you will be able to recognize disassociation attacks.
-
Security+: WPS Attacks
After watching this video, you will be able to define WPS attacks.
-
Security+: Persistence
After watching this video, you will be able to define persistence.
-
Security+: Initial Exploitation
After watching this video, you will be able to specify initial exploitation.
-
Security+: Black vs. Gray vs. White Box Testing
After watching this video, you will be able to compare black vs. gray vs. white box.
-
Security+: Escalation of Privilege
After watching this video, you will be able to recognize escalation of privilege.
-
Security+: Operating System Security Considerations
After watching this video, you will be able to recall key considerations of a secure operating system.
-
Security+: Secure Boot
After watching this video, you will be able to describe the benefits of secure system booting and how UEFI plays a role in it.
-
Security+: Hardware Root Of Trust
After watching this video, you will be able to describe how anchoring the trust of a system within hardware using TPM, SED, and HSM improves security.
-
Security+: Supply Chain
After watching this video, you will be able to identify when security needs to be considered in the supply chain.
-
Security+: EMI and EMP
After watching this video, you will be able to identify how systems may be protected from EMI and EMP.
-
Security+: RAID
After watching this video, you will be able to describe how RAID can provide resiliency.
-
Security+: High Availability
After watching this video, you will be able to define how high availability provides resiliency.
-
Security+: Virtualization, Cloud, and Resiliency
After watching this video, you will be able to recall various virtualization, cloud, and resiliency concepts.
-
Security+: Templates and Master Image
After watching this video, you will be able to describe how templates and master images provide resiliency.
-
Security+: Adjusting to Demands
After watching this video, you will be able to describe elasticity, scalability, and distributive allocation.
-
Security+: Additional Resiliency Considerations
After watching this video, you will be able to describe how non-persistence, snapshots, reverting to known states, rolling back configurations all provide resiliency.
-
Security+: Virtual Desktop Infrastructure
After watching this video, you will be able to define the purpose and benefit to using a VDI/VDE.
-
Security+: Cloud Storage and Models
After watching this video, you will be able to compare the different types of cloud offerings such as IaaS, PaaS, and SaaS.
-
Security+: Automation and Scripting
After watching this video, you will be able to describe how automation and scripting provide resiliency.
-
Security+: Additional Cloud Concepts
After watching this video, you will be able to describe the function of a cloud access security broker and security as a service.
-
Security+: Review Secure System Design and App Dev
After watching this video, you will be able to recall various concepts related to secure system design and application development.
-
Security+: Compiled vs. Runtime Code
After watching this video, you will be able to compare compiled code vs. runtime code.
-
Security+: VM Sprawl and Escape
After watching this video, you will be able to describe the issues related to VMs.
-
Security+: Hypervisors
After watching this video, you will be able to compare different types of hypervisors and the benefits of using application containers.
-
Security+: Code Quality and Testing
After watching this video, you will be able to define various methods for code quality and testing.
-
Security+: Secure Coding Techniques
After watching this video, you will be able to describe various techniques that are used for secure coding.
-
Security+: Additional Devices and Security Concerns
After watching this video, you will be able to describe the security concerns of multi-function devices, camera systems, medical devices, vehicles, and aircraft.
-
Security+: SoC and RTOS
After watching this video, you will be able to describe the security concerns of SoC and RTOS.
-
Security+: Secure DevOps
After watching this video, you will be able to describe the importance of security with DevOps.
-
Security+: Development Life Cycle Models
After watching this video, you will be able to compare waterfall and Agile development life cycle models.
-
Security+: Keyboards, Mice, Displays, and Other Devices
After watching this video, you will be able to describe the security concerns and considerations when using wireless keyboards and mice, displays, Wi-Fi enabled MicroSD cards, printers, usb storage, and digital cameras.
-
Security+: Trusted Operating System
After watching this video, you will be able to describe the concept of a trusted operating system.
-
Security+: SCADA, IoT, and HVAC
After watching this video, you will be able to describe the security concerns of SCADA, IoT, and HVAC.
-
Security+: Secure Development Concepts
After watching this video, you will be able to define secure development concepts.
-
Security+: Development Concepts
After watching this video, you will be able to define various development concepts.
-
Security+: Explore Security Controls
After watching this video, you will be able to recall the purpose of various security controls.
-
Security+: Secure Network Architecture Concepts
After watching this video, you will be able to recall the purpose of various secure network architecture concepts.
-
Security+: Tunneling and VPNs
After watching this video, you will be able to describe site-to-site and remote access vpns.
-
Security+: Segregation, Segmentation, and Isolation
After watching this video, you will be able to define how physical, logical, virtual, and air gap separation provide security.
-
Security+: Software Defined Network
After watching this video, you will be able to describe the security concerns surrounding the SDN.
-
Security+: Device and Technology Placement
After watching this video, you will be able to define where various devices and technologies should be placed for maximum security benefits.
-
Security+: Zones and Topologies
After watching this video, you will be able to describe the reasoning behind implementing different zones and topologies.
-
Security+: Dumpster Diving
After watching this video, you will be able to describe dumpster diving.
-
Security+: Tailgating and Piggybacking
After watching this video, you will be able to define shoulder surfing.
-
Security+: Watering Hole Attacks (Social Networks)
After watching this video, you will be able to describe watering hole attacks (social networks).
-
Security+: Phishing, Spear Phishing, and Whaling
After watching this video, you will be able to compare phishing, spear phishing, and whaling.
-
Security+: Tailgating and Piggybacking
After watching this video, you will be able to recognize tailgating and piggybacking.
-
Security+: Impersonation and Hoaxing
After watching this video, you will be able to define impersonation and hoaxing.
-
Security+: Compare Types of Malware
After watching this video, you will be able to describe and compare malware types.
-
Security+: Spyware
After watching this video, you will be able to classify spyware.
-
Security+: Keyloggers
After watching this video, you will be able to define keyloggers.
-
Security+: Polymorphic Packers
After watching this video, you will be able to describe polymorphic packers.
-
Security+: Stegomalware
After watching this video, you will be able to define stegomalware.
-
Security+: Backdoors
After watching this video, you will be able to define backdoors.
-
Security+: Bots and Botnets
After watching this video, you will be able to describe bots and botnets.
-
Security+: Logic Bombs
After watching this video, you will be able to define logic bombs.
-
Security+: Rootkits
After watching this video, you will be able to define rootkits.
-
Security+: Ransomware
After watching this video, you will be able to describe ransomware.
-
Security+: Remote Access Trojans (RATs)
After watching this video, you will be able to specify RATs.
-
Security+: Cryptomalware
After watching this video, you will be able to define cryptomalware.
-
Security+: Viruses
After watching this video, you will be able to describe viruses.
-
Security+: Define the Threat Landscape and Agents
After watching this video, you will be able to define and describe the threat landscape and agents.
-
Security+: Trojans
After watching this video, you will be able to describe Trojans.
-
Security+: Worms
After watching this video, you will be able to define worms.
-
Security+: Sophistication, Resources, and Funding of Threats
After watching this video, you will be able to define levels of sophistication, resources, and funding of threats.
-
Security+: Open-source Intelligence in Threats
After watching this video, you will be able to describe different open-source intelligence in threats.
-
Security+: Intent and Motivation of Threats
After watching this video, you will be able to recognize threat intent and motivation.
-
Security+: Insiders and Competitors
After watching this video, you will be able to describe insider and competitor threats.
-
Security+: Organized Crime, Nation States, and APTs
After watching this video, you will be able to compare organized crime, states, and APTs.
-
Security+: Structured vs. Unstructured Threats
After watching this video, you will be able to compare structured and unstructured threats.
-
Security+: Internal vs. External Threats
After watching this video, you will be able to compare internal and external threats.
-
Security+: Countermeasures and Mitigation
After watching this video, you will be able to define countermeasures and mitigation.
-
Security+: Threats and Threat Agents
After watching this video, you will be able to define threats, threat agents, exploits, and payloads.
-
Security+: Script Kiddies and Hacktivists
After watching this video, you will be able to describe script kiddies and hacktivists.
-
Security+: Indicators of Compromise (IOCs)
After watching this video, you will be able to describe IOCs.
-
Security+: Risks and Vulnerabilities
After watching this video, you will be able to describe risks and vulnerabilities.
-
Security+: Defining the Threat Landscape
After watching this video, you will be able to describe the threat landscape.
-
Security+: Pass the Hash Attacks
After watching this video, you will be able to define pass the hash attacks.
-
Security+: Replay Attacks
After watching this video, you will be able to describe replay attacks.
-
Security+: Review Application Attacks
After watching this video, you will be able to recognize application and service attacks.
-
Security+: Domain Hijacking
After watching this video, you will be able to recognize domain hijacking.
-
Security+: DNS Poisoning
After watching this video, you will be able to describe DNS poisoning.
-
Security+: Cross-site Scripting and Request Forgery
After watching this video, you will be able to compare cross-site scripting and request forgery.
-
Security+: Man-in-the-browser
After watching this video, you will be able to define man-in-the-browser.
-
Security+: Injection Attacks
After watching this video, you will be able to recognize injection attacks.
-
Security+: Reflection and Amplification
After watching this video, you will be able to compare reflection and amplification.
-
Security+: Privilege Escalation
After watching this video, you will be able to define privilege escalation.
-
Security+: Man-in-the-middle Attacks
After watching this video, you will be able to describe man-in-the-middle attacks.
-
Security+: DoS and DDoS Attacks
After watching this video, you will be able to recognize DoS and DDoS attacks.
-
Security+: Buffer Overflow Attacks
After watching this video, you will be able to describe buffer overflow attacks.
-
Security+: ARP Poisoning
After watching this video, you will be able to define ARP poisoning.
-
Security+: Define Social Engineering and Hijacking
After watching this video, you will be able to recognize and classify social engineering and hijacking attacks.
-
Security+: Refactoring
After watching this video, you will be able to describe refactoring.
-
Security+: Spoofing
After watching this video, you will be able to classify spoofing.
-
Security+: Zero Day Attacks
After watching this video, you will be able to describe zero day attacks.
-
Security+: Shimming
After watching this video, you will be able to define shimming.
-
Security+: Typosquatting
After watching this video, you will be able to recognize typosquatting.
-
Security+: URL Hijacking
After watching this video, you will be able to describe URL hijacking.
-
Security+: Reasons for Effectiveness
After watching this video, you will be able to specify reasons for effectiveness.
-
Security+: Vishing and Smishing
After watching this video, you will be able to compare vishing and smishing.
-
Security+: Session Hijacking
After watching this video, you will be able to describe session hijacking.
-
Security+: Clickjacking
After watching this video, you will be able to define clickjacking.
-
Security+: Forensic Investigation Procedures
After watching this video, you will be able to identify the steps required during a forensics investigation.
-
Security+: Forensic Investigation
After watching this video, you will be able to describe the purpose of forensic investigation.
-
Security+: Disaster Recovery
After watching this video, you will be able to define disaster recovery and the disaster recovery plan.
-
Security+: Intelligence Gathering
After watching this video, you will be able to compare strategic intelligence and strategic counterintelligence.
-
Security+: Building an Incident Response Plan
After watching this video, you will be able to describe the importance and components of an incident response plan.
-
Security+: Defining Incident Response
After watching this video, you will be able to define incident response and the incident response process.
-
Security+: Backups
After watching this video, you will be able to describe the different types of backups.
-
Security+: Recovery Sites
After watching this video, you will be able to describe the different types of recovery sites.
-
Security+: Security Controls
After watching this video, you will be able to identify different security controls.
-
Security+: Geographic Considerations
After watching this video, you will be able to recognize the geographic implications of disaster recovery.
-
Security+: Risks
After watching this video, you will be able to identify risks to an organization.
-
Security+: Risk Assessment
After watching this video, you will be able to describe risk assessment.
-
Security+: Risk Analysis
After watching this video, you will be able to define risk analysis.
-
Security+: Testing for Risks
After watching this video, you will be able to specify how to and who should be testing for risks.
-
Security+: Risk Management
After watching this video, you will be able to define risk management.
-
Security+: Recall BIA and Risk Management Concepts
After watching this video, you will be able to recall business impact assessment and risk management concepts.
-
Security+: Quantitative Risk Analysis
After watching this video, you will be able to describe quantitative risk analysis.
-
Security+: Qualitative Risk Analysis
After watching this video, you will be able to describe qualitative risk analysis.
-
Security+: Change Management
After watching this video, you will be able to define procedures for implementing change.
-
Security+: Risk Response
After watching this video, you will be able to define methods that can be used to respond to risk.
-
Security+: Acceptable Use Policy
After watching this video, you will be able to define the purpose of acceptable use policies.
-
Security+: Security Awareness Training
After watching this video, you will be able to describe the benefits of security awareness training.
-
Security+: Explore Policies, Plans, and Procedures
After watching this video, you will be able to recall the purpose of various policies, plans, and procedures.
-
Security+: Additional Security Policies
After watching this video, you will be able to describe the benefits of social media policies and personal e-mail policies.
-
Security+: Privacy Assessments
After watching this video, you will be able to describe privacy impact assessment and privacy threshold assessment.
-
Security+: Mean Time Between Failure and Mean Time to Repair
After watching this video, you will be able to define Mean Time Between Failure (MTBF) and Mean Time to Repair (MTR).
-
Security+: Business Continuity Plan (BCP)
After watching this video, you will be able to describe the purpose of a BCP.
-
Security+: Determining Recovery Team
After watching this video, you will be able to define concepts related to recovery time such as MTD, RTO, and RPO.
-
Security+: Business Impact Analysis (BIA)
After watching this video, you will be able to identify the general steps in a BIA.
-
Security+: Administrative Job Control
After watching this video, you will be able to describe the benefits of enforcing mandatory vacations, job rotation, separation of duties, and the principle of least privilege.
-
Security+: Agreements
After watching this video, you will be able to define various agreements such as BPA, SLA, ISA, and MOU.
-
Security+: Personnel Management
After watching this video, you will be able to describe the benefits of a clean desk policy, a background check policy, exit interviews, NDA, and onboarding.
-
Security+: Standard Operating Procedure
After watching this video, you will be able to describe the benefits of using standard operating procedures.
-
Security+: Recall Continuity and Privacy Concepts
After watching this video, you will be able to recall incident response, forensics, disaster recovery, and security concepts.
-
Security+: Data Retention
After watching this video, you will be able to describe the purpose of data retention.
-
Security+: Destruction and Sanitization
After watching this video, you will be able to describe media sanitization and data destruction.
-
Security+: Data Roles
After watching this video, you will be able to define various data roles.
-
Security+: Labeling and Handling
After watching this video, you will be able to describe the benefits of labeling and handling.