CompTIA Security+ Certification SY0-601 the Total Course

Your guide to prepare and clear the CompTIA Security+ Certification SY0-601 exam. About This Video Understand the various risk management concepts Learn the various cryptographic methods used to protect the critical keys in cryptography Understand the Diffie-Hellman key exchange agreement and method...

Full description

Bibliographic Details
Main Authors: Seminars, Total, Meyers, Mike (Author), Lachance, Daniel (Author)
Format: eBook
Language:English
Published: Packt Publishing 2021
Edition:1st edition
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 02892nmm a2200313 u 4500
001 EB001996376
003 EBX01000000000000001159277
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210823 ||| eng
100 1 |a Seminars, Total 
245 0 0 |a CompTIA Security+ Certification SY0-601  |b the Total Course  |c Seminars, Total 
250 |a 1st edition 
260 |b Packt Publishing  |c 2021 
300 |a 1 video file, approximately 17 hr., 23 min. 
653 |a Vidéo en continu 
653 |a Vidéos sur Internet 
653 |a Internet videos / http://id.loc.gov/authorities/subjects/sh2007001612 
653 |a streaming video / aat 
653 |a Streaming video / http://id.loc.gov/authorities/subjects/sh2005005237 
700 1 |a Meyers, Mike  |e author 
700 1 |a Lachance, Daniel  |e author 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
500 |a Made available through: Safari, an O'Reilly Media Company 
776 |z 9781803231853 
856 4 0 |u https://learning.oreilly.com/videos/~/9781803231853/?ar  |x Verlag  |3 Volltext 
082 0 |a 000 
520 |a Your guide to prepare and clear the CompTIA Security+ Certification SY0-601 exam. About This Video Understand the various risk management concepts Learn the various cryptographic methods used to protect the critical keys in cryptography Understand the Diffie-Hellman key exchange agreement and methods In Detail Excel the CompTIA Security+ Certification SY0-601 exam by taking this course, which deep dives into the various concepts of risk management and various kinds of risk involved, and the various security standards such as PCI DSS and the Cloud Controls Matrix (CCM) define what types of security controls to put in place to mitigate risk both on-premises and in the cloud. Learn about data protection and the various cryptographic methods used to protect the critical keys in cryptography that keep communication secure. The course also reviews different types of certificates including web, email, code-signing, machine/computer, and user. Explore the 3 As--authentication, authorization, and accounting/auditing, which play a big role in IT security. Tracking activity through auditing provides accountability for access to resources such as files on a file server or database rows. Learn about securing dedicated systems using IoT. IoT devices are function-specific and can communicate over the Internet. Examples include environmental control devices, medical devices, and video surveillance systems. This episode also covers the Zigbee smart home automation protocol. Wrap up the course by understanding data backup; backing up data provides availability in the event of data deletion, corruption, or encryption through ransomware. This episode discusses backup settings such as compression and encryption, as well as full, differential, and incremental backup types