Monthly Archives: April 2023

CompTIA Security+ SY0-601 – 4.5 Key aspects of digital forensics

1. Documentation and evidence In this video I’m going to be talking about evidence and particular things that you should follow when collecting evidence. So first of all, evidence, right, evidence proves either you’re guilty or you’re not. Evidence is used by the prosecution in a court case to prove you’re guilty or evidence is… Read More »

CompTIA Security+ SY0-601 – 4.4 Apply mitigation techniques or controls to secure an environment

1. Incident mitigation techniques In this video I’m going to be talking about techniques to mitigate security incidents. Basically after an incident or even before an incident, what are things that you could have done before an incident occur? What are things you do after an incident occur? And this really goes a lot into… Read More »

CompTIA Security+ SY0-601 – 4.3 support an investigation

1. Log Files In this video, I’m going to be talking about basically log files and we’ll take a quick look at theme systems also. Now in the world of security incidents, after an incident or June of incidents, administrators need to examine evidence, things that they can look at that says, okay, this is… Read More »

CompTIA Security+ SY0-601 – 4.2 Policies, processes, and procedures for incident response

1. Incident response process In this video, I’m going to be going over the Incident Response Process. Now, the Incident Response Process is a series of steps of how an organization should be responding to security incidents that may occur throughout the workday in a business. Your exam loves to test you on this. Your… Read More »

CompTIA Security+ SY0-601 – 5.3 Policies to organizational security

1. Personnel Controls In this video, I’m going to be going over the worst thing that has ever happened to it security people. Yes, humans are no good humans. They circumvent all of our security. Maybe if there was no humans, there wouldn’t be a need for it security. Then again, it wouldn’t be a… Read More »

CompTIA Security+ SY0-601 – 5.5 Privacy and sensitive data concepts in relation to security

1. Privacy breaches In this video and section, we’re going to be talking about privacy data. Privacy. Biggest topic in today’s world right now is privacy and privacy of your personal information. So new laws all around the world are being passed right now as I speak, to secure people’s private information. Particularly the big… Read More »

CompTIA Security+ SY0-601 – 5.4 Risk management processes and concepts Part 2

3. Risk Assessments In this video, I’m going to be talking about risk assessment types. So there are two risk assessments that you’re going to need to know for your exam. One is a qualitative and one is a quantum tattoo format. So qualitative and quantitative format. So let’s talk about what exactly they are.… Read More »

CompTIA Security+ SY0-601 – 5.4 Risk management processes and concepts Part 1

1. Risk types, terms, and Process In this video we’re going to be talking about risk types. Now before we get into this whole section on risk, let’s just define risk. Risk is defined. The definition of risk is the probability that a threat exploits a vulnerability. So there’s a couple of quick things here… Read More »

CompTIA Security+ SY0-601 – Performance Based Questions

1. Performance Based Questions Introduction In this video, I’m going to be talking about this section, performance based questions. Now, this particular section, I want to be going over with you guys a variety of different performancebased questions that the exam may ask you. In this one, you’re basically just going to watch me do… Read More »

CompTIA CYSA+ CS0-002 – Eradication, Recovery, and Post-incident Actions Part 2

5. Recovery Actions (OBJ 4.2) Recovery actions. In this lesson, we are going to talk about the four main types of recovery actions. These include things like patching, permissions, logging, and system hardening. When we talk about patching, this involves installing a set of changes to a computer program or it’s supporting data that’s designed… Read More »

img