IT & Software

Sub Category

The Singularity, Skynet, and the Future of Computing: Crash Course Computer Science #40
00:12:30
CrashCourse
49 Views · 4 years ago

In our SERIES FINALE of Crash Course Computer Science we take a look towards the future! In the past 70 years electronic computing has fundamentally changed how we live our lives, and we believe it’s just getting started. From ubiquitous computing, artificial intelligence, and self-driving cars to brain computer interfaces, wearable computers, and maybe even the singularity there is so much amazing potential on the horizon. Of course there is also room for peril with the rise of artificial intelligence and more immediate displacement of much of the workforce through automation. It’s tough to predict how it will all shake out, but it’s our hope that this series has inspired you to take part in shaping that future. Thank you so much for watching.

Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios

Want to know more about Carrie Anne?
https://about.me/carrieannephilbin

The Latest from PBS Digital Studios: https://www.youtube.com/playli....st?list=PL1mtdjDVOoO

Want to find Crash Course elsewhere on the internet?
Facebook - https://www.facebook.com/YouTubeCrash...
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse
CC Kids: http://www.youtube.com/crashcoursekids

Educational Technology: Crash Course Computer Science #39
00:11:52
CrashCourse
38 Views · 4 years ago

Today we’re going to go a little meta and talk about how computer science can support learning with educational technology. We here at Crash Course are big fans of interactive in-class learning and hands-on experiences, but we also believe in the additive power of educational technology inside and outside the classroom from the Internet itself and Massive Open Online Courses, or MOOCs to AI driven intelligent tutoring systems and virtual reality.

Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios

Want to know more about Carrie Anne?
https://about.me/carrieannephilbin

The Latest from PBS Digital Studios: https://www.youtube.com/playli....st?list=PL1mtdjDVOoO

Want to find Crash Course elsewhere on the internet?
Facebook - https://www.facebook.com/YouTubeCrash...
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse
CC Kids: http://www.youtube.com/crashcoursekids

Psychology of Computing: Crash Course Computer Science #38
00:12:39
CrashCourse
65 Views · 4 years ago

We’ve spent most of this series talking about computers. Which makes sense - this is Crash Course COMPUTER SCIENCE after all. But at their core computers are tools employed by humans and humans are pretty complicated. So today, we’re going to discuss some psychological considerations in building computers like how to make them easier for humans to use, the uncanny valley problem when humanoid robots gets more and more humanlike, and strategies to make our devices work better with us by incorporating our emotions and even altering our gaze. Oh, and we'll talk about Carrie Anne's all time favorite user interface design principle - knurling.

Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios

Want to know more about Carrie Anne?
https://about.me/carrieannephilbin

The Latest from PBS Digital Studios: https://www.youtube.com/playli....st?list=PL1mtdjDVOoO

Want to find Crash Course elsewhere on the internet?
Facebook - https://www.facebook.com/YouTubeCrash...
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse
CC Kids: http://www.youtube.com/crashcoursekids

Robots: Crash Course Computer Science #37
00:12:26
CrashCourse
31 Views · 4 years ago

Today we're going to talk about robots! Robots are often thought as a technology of the future, but they're already here by the millions in the workplace, our homes, and pretty soon on the roads. We'll discuss the origins of robotics to its proliferation, and even look at some common control designs that were implemented to make them more useful in the workplace. Robots are often thought of as a menace or danger to society, and although there definitely is the propensity for malicious uses, robots also have the potential to drastically improve the world.

Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios

Want to know more about Carrie Anne?
https://about.me/carrieannephilbin

The Latest from PBS Digital Studios: https://www.youtube.com/playli....st?list=PL1mtdjDVOoO

Want to find Crash Course elsewhere on the internet?
Facebook - https://www.facebook.com/YouTubeCrash...
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse
CC Kids: http://www.youtube.com/crashcoursekids

Natural Language Processing: Crash Course Computer Science #36
00:11:50
CrashCourse
29 Views · 4 years ago

Today we’re going to talk about how computers understand speech and speak themselves. As computers play an increasing role in our daily lives there has been an growing demand for voice user interfaces, but speech is also terribly complicated. Vocabularies are diverse, sentence structures can often dictate the meaning of certain words, and computers also have to deal with accents, mispronunciations, and many common linguistic faux pas. The field of Natural Language Processing, or NLP, attempts to solve these problems, with a number of techniques we’ll discuss today. And even though our virtual assistants like Siri, Alexa, Google Home, Bixby, and Cortana have come a long way from the first speech processing and synthesis models, there is still much room for improvement.

Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios

Want to know more about Carrie Anne?
https://about.me/carrieannephilbin

The Latest from PBS Digital Studios: https://www.youtube.com/playli....st?list=PL1mtdjDVOoO

Want to find Crash Course elsewhere on the internet?
Facebook - https://www.facebook.com/YouTubeCrash...
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse
CC Kids: http://www.youtube.com/crashcoursekids

Computer Vision: Crash Course Computer Science #35
00:11:10
CrashCourse
33 Views · 4 years ago

Today we’re going to talk about how computers see. We’ve long known that our digital cameras and smartphones can take incredibly detailed images, but taking pictures is not quite the same thing. For the past half-century, computer scientists have been working to help our computing devices understand the imagery they capture, leading to advancements everywhere, from tracking hands and whole bodies, biometrics to unlock our phones, and eventually giving autonomous cars the ability to understand their surroundings.

Check out Origin of Everything here!
https://www.youtube.com/channe....l/UCiB8h9jD2Mlxx96ZF

Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios

Want to know more about Carrie Anne?
https://about.me/carrieannephilbin

The Latest from PBS Digital Studios: https://www.youtube.com/playli....st?list=PL1mtdjDVOoO

Want to find Crash Course elsewhere on the internet?
Facebook - https://www.facebook.com/YouTubeCrash...
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse
CC Kids: http://www.youtube.com/crashcoursekids

Machine Learning & Artificial Intelligence: Crash Course Computer Science #34
00:11:51
CrashCourse
45 Views · 4 years ago

So we've talked a lot in this series about how computers fetch and display data, but how do they make decisions on this data? From spam filters and self-driving cars, to cutting edge medical diagnosis and real-time language translation, there has been an increasing need for our computers to learn from data and apply that knowledge to make predictions and decisions. This is the heart of machine learning which sits inside the more ambitious goal of artificial intelligence. We may be a long way from self-aware computers that think just like us, but with advancements in deep learning and artificial neural networks our computers are becoming more powerful than ever.

Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios

Want to know more about Carrie Anne?
https://about.me/carrieannephilbin

The Latest from PBS Digital Studios: https://www.youtube.com/playli....st?list=PL1mtdjDVOoO

Want to find Crash Course elsewhere on the internet?
Facebook - https://www.facebook.com/YouTubeCrash...
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse
CC Kids: http://www.youtube.com/crashcoursekids

Cryptography: Crash Course Computer Science #33
00:12:33
CrashCourse
47 Views · 4 years ago

Today we’re going to talk about how to keep information secret, and this isn’t a new goal. From as early as Julius Caesar’s Caesar cipher to Mary, Queen of Scots, encrypted messages to kill Queen Elizabeth in 1587, theres has long been a need to encrypt and decrypt private correspondence. This proved especially critical during World War II as Allan Turing and his team at Bletchley Park attempted to decrypt messages from Nazi Enigma machines, and this need has only grown as more and more information sensitive tasks are completed on our computers. So today, we’re going to walk you through some common encryption techniques such as the Advanced Encryption Standard (AES), Diffie-Hellman Key Exchange, and RSA which are employed to keep your information safe, private, and secure.

Note: In October of 2017, researchers released a viable hack against WPA2, known as KRACK Attack, which uses AES to ensure secure communication between computers and network routers. The problem isn't with AES, which is provably secure, but with the communication protocol between router and computer. In order to set up secure communication, the computer and router have to agree through what's called a "handshake". If this handshake is interrupted in just the right way, an attacker can cause the handshake to fault to an insecure state and reveal critical information which makes the connection insecure. As is often the case with these situations, the problem is with an implementation, not the secure algorithm itself. Our friends over at Computerphile have a great video on the topic: https://www.youtube.com/watch?v=mYtvjijATa4

Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios

Want to know more about Carrie Anne?
https://about.me/carrieannephilbin

The Latest from PBS Digital Studios: https://www.youtube.com/playli....st?list=PL1mtdjDVOoO

Want to find Crash Course elsewhere on the internet?
Facebook - https://www.facebook.com/YouTubeCrash...
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse
CC Kids: http://www.youtube.com/crashcoursekids

The World Wide Web: Crash Course Computer Science #30
00:11:37
CrashCourse
26 Views · 4 years ago

Today we’re going to discuss the World Wide Web - not to be confused with the Internet, which is the underlying plumbing for the web as well as other networks. The World Wide Web is built on the foundation of simply linking pages to other pages with hyperlinks, but it is this massive interconnectedness that makes it so powerful. But before the web could become a thing, Tim Berners-Lee would need to invent the web browser at CERN, and search engines would need to be created to navigate these massive directories of information. By the mid 1990’s we will see the rise of Yahoo and Google and monolithic websites like Ebay and Amazon, forming the web we know today. But before we end our unit on the Internet we want to take a moment to discuss the implications of Net Neutrality, and its potential to shape the Internet's future.

Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios

Want to know more about Carrie Anne?
https://about.me/carrieannephilbin

The Latest from PBS Digital Studios: https://www.youtube.com/playli....st?list=PL1mtdjDVOoO

Want to find Crash Course elsewhere on the internet?
Facebook - https://www.facebook.com/YouTubeCrash...
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse
CC Kids: http://www.youtube.com/crashcoursekids

The Internet: Crash Course Computer Science #29
00:11:58
CrashCourse
45 Views · 4 years ago

Today, we're going to talk about how the Internet works. Specifically, how that stream of characters you punch into your browser's address bar, like "youtube.com", return this very website. Just to clarify we're talking in a broader sense about that massive network of networks connecting millions of computers together, not just the World Wide Web, which is a portion of the Internet, and our topic for next week. Today, we're going to focus on how data is passed back and forth - how a domain name is registered by the Domain Name System, and of course how the data requested or sent gets to the right person in little packets following standard Internet Protocol, or IP. We'll also discuss two different approaches to transferring this data: Transmission Control Protocol, or TCP, when we need to be certain no information is lost, and User Datagram Protocol, or UDP, for those time sensitive applications - because nobody wants an email with missing text, but they also don't want to get lag-fragged in their favorite first person shooter.

Want to run traceroute on your computer? See directions below. Remember you can replace "dftba.com" with whatever website you want!

Traceroute on Windows
1. Press the Start Button
2. Type "CMD" and press "Enter"
3. In the Command Prompt type "tracert dftba.com"

Traceroute on Mac
1. Click on the "Go" drop down menu
2. Click on "Utilities"
3. Open Terminal
4. Type "traceroute dftba.com"

Traceroute on Linux
1. Open Terminal by typing CTRL+Alt+T
2. Type: "traceroute dftba.com"

Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios

Want to know more about Carrie Anne?
https://about.me/carrieannephilbin

The Latest from PBS Digital Studios: https://www.youtube.com/playli....st?list=PL1mtdjDVOoO

Want to find Crash Course elsewhere on the internet?
Facebook - https://www.facebook.com/YouTubeCrash...
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse
CC Kids: http://www.youtube.com/crashcoursekids

Computer Networks: Crash Course Computer Science #28
00:12:20
CrashCourse
3 Views · 4 years ago

Today we start a three episode arc on the rise of a global telecommunications network that changed the world forever. We’re going to begin with computer networks, and how they grew from small groups of connected computers on LAN networks to eventually larger worldwide networks like the ARPANET and even the Internet we know today. We'll also discuss how many technologies like Ethernet, MAC addresses, IP Addresses, packet switching, network switches, and TCP/IP were implemented to new problems as our computers became ever-increasingly connected. Next week we’ll talk about the Internet, and the week after the World Wide Web!

Pre-order our limited edition Crash Course: Computer Science Floppy Disk Coasters here!
https://store.dftba.com/produc....ts/computer-science-

Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios

Want to know more about Carrie Anne?
https://about.me/carrieannephilbin

The Latest from PBS Digital Studios: https://www.youtube.com/playli....st?list=PL1mtdjDVOoO

Want to find Crash Course elsewhere on the internet?
Facebook - https://www.facebook.com/YouTubeCrash...
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse
CC Kids: http://www.youtube.com/crashcoursekids

3D Graphics: Crash Course Computer Science #27
00:12:41
CrashCourse
5 Views · 4 years ago

Today we’re going to discuss how 3D graphics are created and then rendered for a 2D screen. From polygon count and meshes, to lighting and texturing, there are a lot of considerations in building the 3D objects we see in our movies and video games, but then displaying these 3D objects of a 2D surface adds an additional number of challenges. So we’ll talk about some of the reasons you see occasional glitches in your video games as well as the reason a dedicated graphics processing unit, or GPU, was needed to meet the increasing demand for more and more complex graphics.

Pre-order our limited edition Crash Course: Computer Science Floppy Disk Coasters here!
https://store.dftba.com/produc....ts/computer-science-

Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios

Want to know more about Carrie Anne?
https://about.me/carrieannephilbin

The Latest from PBS Digital Studios: https://www.youtube.com/playli....st?list=PL1mtdjDVOoO

Want to find Crash Course elsewhere on the internet?
Facebook - https://www.facebook.com/YouTubeCrash...
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse
CC Kids: http://www.youtube.com/crashcoursekids

Graphical User Interfaces: Crash Course Computer Science #26
00:12:59
CrashCourse
9 Views · 4 years ago

Today, we're going to discuss the critical role graphical user interfaces, or GUIs played in the adoption of computers. Before the mid 1980's the most common way people could interact with their devices was through command line interfaces, which though efficient, aren't really designed for casual users. This all changed with the introduction of the Macintosh by Apple in 1984. It was the first mainstream computer to use a GUI, standing on the shoulder of nearly two decades of innovation including work from the father of the GUI himself, Douglas Englebart, and some amazing breakthroughs at Xerox Parc.


Pre-order our limited edition Crash Course: Computer Science Floppy Disk Coasters here!
https://store.dftba.com/produc....ts/computer-science-

Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios

Want to know more about Carrie Anne?
https://about.me/carrieannephilbin

The Latest from PBS Digital Studios: https://www.youtube.com/playli....st?list=PL1mtdjDVOoO

Want to find Crash Course elsewhere on the internet?
Facebook - https://www.facebook.com/YouTubeCrash...
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse
CC Kids: http://www.youtube.com/crashcoursekids

The Personal Computer Revolution: Crash Course Computer Science #25
00:10:15
CrashCourse
7 Views · 4 years ago

Today we're going to talk about the birth of personal computing. Up until the early 1970s components were just too expensive, or underpowered, for making a useful computer for an individual, but this would begin to change with the introduction of the Altair 8800 in 1975. In the years that follow, we'll see the founding of Microsoft and Apple and the creation of the 1977 Trinity: The Apple II, Tandy TRS-80, and Commodore PET 2001. These new consumer oriented computers would become a huge hit, but arguably the biggest success of the era came with the release of the IBM PC in 1981. IBM completely changed the industry as its "IBM compatible" open architecture consolidated most of the industry except for, notably, Apple. Apple chose a closed architecture forming the basis of the Mac Vs PC debate that rages today. But in 1984, when Apple was losing marketshare fast it looked for a way to offer a new user experience like none other - which we'll discuss next week.

Pre-order our limited edition Crash Course: Computer Science Floppy Disk Coasters here!
https://store.dftba.com/produc....ts/computer-science-

Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios

Want to know more about Carrie Anne?
https://about.me/carrieannephilbin

The Latest from PBS Digital Studios: https://www.youtube.com/playli....st?list=PL1mtdjDVOoO

Want to find Crash Course elsewhere on the internet?
Facebook - https://www.facebook.com/YouTubeCrash...
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse
CC Kids: http://www.youtube.com/crashcoursekids

The Cold War and Consumerism: Crash Course Computer Science #24
00:11:19
CrashCourse
6 Views · 4 years ago

Today we’re going to step back from hardware and software, and take a closer look at how the backdrop of the cold war and space race and the rise of consumerism and globalization brought us from huge, expensive codebreaking machines in the 1940s to affordable handhelds and personal computers in the 1970s. This is an era that saw huge government funded projects - like the race to the moon. And afterward, a shift towards the individual consumer, commoditization of components, and the rise of the Japanese electronics industry.

Pre-order our limited edition Crash Course: Computer Science Floppy Disk Coasters here!
https://store.dftba.com/produc....ts/computer-science-

Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios

Want to know more about Carrie Anne?
https://about.me/carrieannephilbin

The Latest from PBS Digital Studios: https://www.youtube.com/playli....st?list=PL1mtdjDVOoO

Want to find Crash Course elsewhere on the internet?
Facebook - https://www.facebook.com/YouTubeCrash...
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse
CC Kids: http://www.youtube.com/crashcoursekids

Screens & 2D Graphics: Crash Course Computer Science #23
00:11:32
CrashCourse
6 Views · 4 years ago

Today we begin our discussion of computer graphics. So we ended last episode with the proliferation of command line (or text) interfaces, which sometimes used screens, but typically electronic typewriters or teletypes onto paper. But by the early 1960s a number of technologies were introduced to make screens much more useful from cathode ray tubes and graphics cards to ASCII art and light pens. This era would mark a turning point in computing - computers were no longer just number crunching machines, but potential assistants interactively augmenting human tasks. This was the dawn of graphical user interfaces which we’ll cover more in a few episodes.

Pre-order our limited edition Crash Course: Computer Science Floppy Disk Coasters here!
https://store.dftba.com/produc....ts/computer-science-

Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios

Want to know more about Carrie Anne?
https://about.me/carrieannephilbin

The Latest from PBS Digital Studios: https://www.youtube.com/playli....st?list=PL1mtdjDVOoO

Want to find Crash Course elsewhere on the internet?
Facebook - https://www.facebook.com/YouTubeCrash...
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse
CC Kids: http://www.youtube.com/crashcoursekids

Keyboards & Command Line Interfaces: Crash Course Computer Science #22
00:11:24
CrashCourse
5 Views · 4 years ago

Today, we are going to start our discussion on user experience. We've talked a lot in this series about how computers move data around within the computer, but not so much about our role in the process. So today, we're going to look at our earliest form of interaction through keyboards. We'll talk about how the keyboard got its qwerty layout, and then we'll track its evolution in electronic typewriters, and eventually terminals with screens. We are going to focus specifically on text interaction through command line interfaces, and next week we'll take a look at graphics.

Check out Eons!
https://www.youtube.com/watch?v=vtpi7yUHNyg

Pre-order our limited edition Crash Course: Computer Science Floppy Disk Coasters here!
https://store.dftba.com/produc....ts/computer-science-

Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios

Want to know more about Carrie Anne?
https://about.me/carrieannephilbin

The Latest from PBS Digital Studios: https://www.youtube.com/playli....st?list=PL1mtdjDVOoO

Want to find Crash Course elsewhere on the internet?
Facebook - https://www.facebook.com/YouTubeCrash...
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse
CC Kids: http://www.youtube.com/crashcoursekids

Compression: Crash Course Computer Science #21
00:12:48
CrashCourse
6 Views · 4 years ago

Get your first two months of CuriosityStream free by going to http://curiositystream.com/crashcourse and using the promo code “crashcourse”. So last episode we talked about some basic file formats, but what we didn’t talk about is compression. Often files are way too large to be easily stored on hard drives or transferred over the Internet - the solution, unsurprisingly, is to make them smaller. Today, we’re going to talk about lossless compression, which will give you the exact same thing when reassembled, as well as lossy compression, which uses the limitations of human perception to remove less important data. From listening to music and sharing photos, to talking on the phone and even streaming this video right now the ways we use the Internet and our computing devices just wouldn’t be possible without the help of compression.

Pre-order our limited edition Crash Course: Computer Science Floppy Disk Coasters here!
https://store.dftba.com/produc....ts/computer-science-

Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios

Want to know more about Carrie Anne?
https://about.me/carrieannephilbin

The Latest from PBS Digital Studios: https://www.youtube.com/playli....st?list=PL1mtdjDVOoO

Want to find Crash Course elsewhere on the internet?
Facebook - https://www.facebook.com/YouTubeCrash...
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse
CC Kids: http://www.youtube.com/crashcoursekids

Files & File Systems: Crash Course Computer Science #20
00:12:03
CrashCourse
8 Views · 4 years ago

Today we’re going to look at how our computers read and interpret computer files. We’ll talk about how some popular file formats like txt, wave, and bitmap are encoded and decoded giving us pretty pictures and lifelike recordings from just strings of 1’s and 0’s, and we’ll discuss how our computers are able to keep all this data organized and readily accessible to users. You’ll notice in this episode that we’re starting to talk more about computer users, not programmers, foreshadowing where the series will be going in a few episodes.

Pre-order our limited edition Crash Course: Computer Science Floppy Disk Coasters here!
https://store.dftba.com/produc....ts/computer-science-

Crash Course Physics episode on sound:
https://www.youtube.com/watch?v=qV4lR9EWGlY

Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios

The Latest from PBS Digital Studios: https://www.youtube.com/playli....st?list=PL1mtdjDVOoO

Want to know more about Carrie Anne?https://about.me/carrieannephilbin

Want to find Crash Course elsewhere on the internet?
Facebook - http://www.facebook.com/YouTubeCrashC...
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse

CC Kids: http://www.youtube.com/crashcoursekids

Intro to Algorithms: Crash Course Computer Science #13
00:11:44
CrashCourse
9 Views · 4 years ago

Algorithms are the sets of steps necessary to complete computation - they are at the heart of what our devices actually do. And this isn’t a new concept. Since the development of math itself algorithms have been needed to help us complete tasks more efficiently, but today we’re going to take a look a couple modern computing problems like sorting and graph search, and show how we’ve made them more efficient so you can more easily find cheap airfare or map directions to Winterfell... or like a restaurant or something.

Memory & Storage: Crash Course Computer Science #19
00:12:17
CrashCourse
16 Views · 4 years ago

Pre-order our limited edition Crash Course: Computer Science Floppy Disk Coasters here! https://store.dftba.com/produc....ts/computer-science-
So we’ve talked about computer memory a couple times in this series, but what we haven’t talked about is storage. Data written to storage, like your hard drive, is a little different, because it will still be there even if the power goes out - this is known as non-volatile memory. Today we’re going to trace the history of these storage technologies from punch cards, delay line memory, core memory, magnetic tape, and magnetic drums, to floppy disks, hard disk drives, cds, and solid state drives. Initially, volatile memory, like RAM was much faster than these non-volatile storage memories, but that distinction is becoming less and less true today.

CORRECTION: AT 5:00 we say "around 9 kilobytes" when we should have said "kilobits".

Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios

The Latest from PBS Digital Studios: https://www.youtube.com/playli....st?list=PL1mtdjDVOoO

Want to know more about Carrie Anne?https://about.me/carrieannephilbin

Want to find Crash Course elsewhere on the internet?
Facebook - http://www.facebook.com/YouTubeCrashCourse
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse

CC Kids: http://www.youtube.com/crashcoursekids

Integrated Circuits & Moore’s Law: Crash Course Computer Science #17
00:13:50
CrashCourse
12 Views · 4 years ago

Get your first two months of CuriosityStream free by going to http://curiositystream.com/crashcourse and using the promo code “crashcourse”.

So you may have heard of Moore's Law and while it isn't truly a law it has pretty closely estimated a trend we've seen in the advancement of computing technologies. Moore's Law states that we'll see approximately a 2x increase in transistors in the same space every two years, and while this may not be true for much longer, it has dictated the advancements we've seen since the introduction of transistors in the mid 1950s. So today we're going to talk about those improvements in hardware that made this possible - starting with the third generation of computing and integrated circuits (or ICs) and printed circuit boards (or PCBs). But as these technologies advanced a newer manufacturing process would bring us to the nanoscale manufacturing we have today - photolithography.

Check out Veritasium's video: How Does a Transistor Work?
https://www.youtube.com/watch?v=IcrBqCFLHIY

Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios

Want to know more about Carrie Anne?
https://about.me/carrieannephilbin

The Latest from PBS Digital Studios: https://www.youtube.com/playli....st?list=PL1mtdjDVOoO

Want to find Crash Course elsewhere on the internet?
Facebook - https://www.facebook.com/YouTubeCrash...
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse
CC Kids: http://www.youtube.com/crashcoursekids

Software Engineering: Crash Course Computer Science #16
00:10:35
CrashCourse
11 Views · 4 years ago

Today, we’re going to talk about how HUGE programs with millions of lines of code like Microsoft Office are built. Programs like these are way too complicated for a single person, but instead require teams of programmers using the tools and best practices that form the discipline of Software Engineering. We'll talk about how large programs are typically broken up into into function units that are nested into objects known as Object Oriented Programming, as well as how programmers write and debug their code efficiently, document and share their code with others, and also how code repositories are used to allow programmers to make changes while mitigating risk.

Ps. Have you had the chance to play the Grace Hopper game we made in episode 12. Check it out here! http://thoughtcafe.ca/hopper/

Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios

Want to know more about Carrie Anne?
https://about.me/carrieannephilbin

The Latest from PBS Digital Studios: https://www.youtube.com/playli....st?list=PL1mtdjDVOoO

Want to find Crash Course elsewhere on the internet?
Facebook - https://www.facebook.com/YouTubeCrash...
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse

CC Kids: http://www.youtube.com/crashcoursekids

Alan Turing: Crash Course Computer Science #15
00:13:04
CrashCourse
6 Views · 4 years ago

Today we’re going to take a step back from programming and discuss the person who formulated many of the theoretical concepts that underlie modern computation - the father of computer science himself: Alan Turing. Now normally we try to avoid “Great Man" history in Crash Course because truthfully all milestones in humanity are much more complex than just an individual or through a single lens - but for Turing we are going to make an exception. From his theoretical Turing Machine and work on the Bombe to break Nazi Enigma codes during World War II, to his contributions in the field of Artificial Intelligence (before it was even called that), Alan Turing helped inspire the first generation of computer scientists - despite a life tragically cut short.

Special thanks to Contributing Writer Robert Xiao whom we should have (and forgot) to include in the credits. His help with this episode was invaluable.

Ps. Have you had the chance to play the Grace Hopper game we made in episode 12. Check it out here! http://thoughtcafe.ca/hopper/

Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios

Want to know more about Carrie Anne?
https://about.me/carrieannephilbin

The Latest from PBS Digital Studios: https://www.youtube.com/playli....st?list=PL1mtdjDVOoO

Want to find Crash Course elsewhere on the internet?
Facebook - https://www.facebook.com/YouTubeCrash...
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse

CC Kids: http://www.youtube.com/crashcoursekids

Data Structures: Crash Course Computer Science #14
00:10:07
CrashCourse
10 Views · 4 years ago

Today we’re going to talk about on how we organize the data we use on our devices. You might remember last episode we walked through some sorting algorithms, but skipped over how the information actually got there in the first place! And it is this ability to store and access information in a structured and meaningful way that is crucial to programming. From strings, pointers, and nodes, to heaps, trees, and stacks get ready for an ARRAY of new terminology and concepts.

Ps. Have you had the chance to play the Grace Hopper game we made in episode 12. Check it out here! http://thoughtcafe.ca/hopper/

Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios

Want to know more about Carrie Anne?
https://about.me/carrieannephilbin

The Latest from PBS Digital Studios: https://www.youtube.com/playli....st?list=PL1mtdjDVOoO

Want to find Crash Course elsewhere on the internet?
Facebook - https://www.facebook.com/YouTubeCrash...
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse

CC Kids: http://www.youtube.com/crashcoursekids

Programming Basics: Statements & Functions: Crash Course Computer Science #12
00:11:57
CrashCourse
10 Views · 4 years ago

Today, Carrie Anne is going to start our overview of the fundamental building blocks of programming languages. We’ll start by creating small programs for our very own video game to show how statements and functions work. We aren’t going to code in a specific language, but we’ll show you how conditional statements like IF and ELSE statements, WHILE loops, and FOR loops control the flow of programs in nearly all languages, and then we’ll finish by packaging up these instructions into functions that can be called by our game to perform more and more complex actions.

Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios

Want to know more about Carrie Anne?
https://about.me/carrieannephilbin

The Latest from PBS Digital Studios: https://www.youtube.com/playli....st?list=PL1mtdjDVOoO

Want to find Crash Course elsewhere on the internet?
Facebook - https://www.facebook.com/YouTubeCrash...
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse

CC Kids: http://www.youtube.com/crashcoursekids

The First Programming Languages: Crash Course Computer Science #11
00:11:52
CrashCourse
14 Views · 4 years ago

Get your first two months of CuriosityStream free by going to http://curiositystream.com/crashcourse and using the promo code “crashcourse”.

So we ended last episode with programming at the hardware level with things like plugboards and huge panels of switches, but what was really needed was a more versatile way to program computers - software! For much of this series we’ve been talking about machine code, or the 1’s and 0’s our computers read to perform operations, but giving our computers instructions in 1’s and 0’s is incredibly inefficient, and a “higher-level” language was needed. This led to the development of assembly code and assemblers that allow us to use operands and mnemonics to more easily write programs, but assembly language is still tied to underlying hardware. So by 1952 Navy officer Grace Hopper had helped created the first high-level programming language A-0 and compiler to translate that code to our machines. This would eventually lead to IBM’s Fortran and then a golden age of computing languages over the coming decades. Most importantly, these new languages utilized new abstractions to make programming easier and more powerful giving more and more people the ability to create new and amazing things.


Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios

Want to know more about Carrie Anne?
https://about.me/carrieannephilbin

The Latest from PBS Digital Studios: https://www.youtube.com/playli....st?list=PL1mtdjDVOoO

Want to find Crash Course elsewhere on the internet?
Facebook - https://www.facebook.com/YouTubeCrash...
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse

CC Kids: http://www.youtube.com/crashcoursekids

Early Programming: Crash Course Computer Science #10
00:09:26
CrashCourse
14 Views · 4 years ago

Since Joseph Marie Jacquard’s textile loom in 1801, there has been a demonstrated need to give our machines instructions. In the last few episodes, our instructions were already in our computer’s memory, but we need to talk about how they got there - this is the heart of programming. Today, we’re going to look at the history of programming and the innovations that brought us from punch cards and punch paper tape to plugboards and consoles of switches. These technologies will bring us to the mid 1970s and the start of home computing, but they had limitations, and what was really needed was an easier and more accessible way to write programs - programming languages. Which we’ll get to next week.

Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios

Want to know more about Carrie Anne?
https://about.me/carrieannephilbin

Want more Crash Course in person? We'll be at NerdCon: Nerdfighteria in Boston on February 25th and 26th! For more information, go to http://www.nerdconnerdfighteria.com/

The Latest from PBS Digital Studios: https://www.youtube.com/playli....st?list=PL1mtdjDVOoO

Want to find Crash Course elsewhere on the internet?
Facebook - https://www.facebook.com/YouTubeCrashCourse/
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse

CC Kids: http://www.youtube.com/crashcoursekids

Advanced CPU Designs: Crash Course Computer Science #9
00:12:23
CrashCourse
16 Views · 4 years ago

So now that we’ve built and programmed our very own CPU, we’re going to take a step back and look at how CPU speeds have rapidly increased from just a few cycles per second to gigahertz! Some of that improvement, of course, has come from faster and more efficient transistors, but a number hardware designs have been implemented to boost performance. And you’ve probably heard or read about a lot of these - they’re the buzz words attached to just about every new CPU release - terms like instruction pipelining, cache, FLOPS, superscalar, branch prediction, multi-core processors, and even super computers! These designs are pretty complicated, but the fundamental concepts behind them are not. So bear with us as we introduce a lot of new terminology including what might just be the best computer science term of all time: the dirty bit. Let us explain.

Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios

The Latest from PBS Digital Studios: https://www.youtube.com/playli....st?list=PL1mtdjDVOoO

We’ve got merch!
https://store.dftba.com/collections/crashcourse

Want to know more about Carrie Anne?
https://about.me/carrieannephilbin

Want to find Crash Course elsewhere on the internet?
Facebook - http://www.facebook.com/YouTubeCrashC...
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse

Instructions & Programs: Crash Course Computer Science #8
00:10:36
CrashCourse
8 Views · 4 years ago

Take the 2017 PBS Digital Studios Survey: http://surveymonkey.com/r/pbsds2017. Today we’re going to take our first baby steps from hardware into software! Using that CPU we built last episode we’re going to run some instructions and walk you through how a program operates on the machine level. We'll show you how different programs can be used to perform different tasks, and how software can unlock new capabilities that aren't built into the hardware. This episode, like the last is pretty complicated, but don’t worry - as we move forward into programming the idea of opcodes, addresses, and registers at this machine level will be abstracted away like many of the concepts in this series.

Want to know more about the Intel 4004? You can read the manual here! http://bitsavers.trailing-edge.....com/pdf/intel/MCS4/

Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios

The Latest from PBS Digital Studios: https://www.youtube.com/playli....st?list=PL1mtdjDVOoO

We’ve got merch!
https://store.dftba.com/collections/c...


Want to know more about Carrie Anne?
https://about.me/carrieannephilbin

Want to find Crash Course elsewhere on the internet?
Facebook - http://www.facebook.com/YouTubeCrashC...
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse

The Central Processing Unit (CPU): Crash Course Computer Science #7
00:11:38
CrashCourse
11 Views · 4 years ago

Take the 2017 PBS Digital Studios Survey: http://surveymonkey.com/r/pbsds2017. Today we’re going to build the ticking heart of every computer - the Central Processing Unit or CPU. The CPU’s job is to execute the programs we know and love - you know like GTA V, Slack... and Power Point. To make our CPU we’ll bring in our ALU and RAM we made in the previous two episodes and then with the help of Carrie Anne’s wonderful dictation (slowly) step through some clock cycles. WARNING: this is probably the most complicated episode in this series, we watched this a few times over ourselves, but don't worry at about .03Hz we think you can keep up.

Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios

The Latest from PBS Digital Studios: https://www.youtube.com/playli....st?list=PL1mtdjDVOoO

We’ve got merch!
https://store.dftba.com/collections/crashcourse


Want to know more about Carrie Anne?
https://about.me/carrieannephilbin

Want to find Crash Course elsewhere on the internet?
Facebook - http://www.facebook.com/YouTubeCrashC...
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse
CC Kids: http://www.youtube.com/crashcoursekids

Want to find Crash Course elsewhere on the internet?
Facebook - http://www.facebook.com/YouTubeCrashC...
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse

CC Kids: http://www.youtube.com/crashcoursekids

Registers and RAM: Crash Course Computer Science #6
00:12:17
CrashCourse
10 Views · 4 years ago

Take the 2017 PBS Digital Studios Survey: http://surveymonkey.com/r/pbsds2017. Today we’re going to create memory! Using the basic logic gates we discussed in episode 3 we can build a circuit that stores a single bit of information, and then through some clever scaling (and of course many new levels of abstraction) we’ll show you how we can construct the modern random-access memory, or RAM, found in our computers today. RAM is the working memory of a computer. It holds the information that is being executed by the computer and as such is a crucial component for a computer to operate. Next week we’ll use this RAM, and the ALU we made last episode, to help us construct our CPU - the heart of a computer.

*CORRECTION*

In our 16x16 Latch Matrix graphic, we inadvertently left off the horizontal row access line above the top row of latches. As a result, the highlighted line for the row at address 12 should actually be one line higher.


Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios

The Latest from PBS Digital Studios: https://www.youtube.com/playli....st?list=PL1mtdjDVOoO

We’ve got merch!
https://store.dftba.com/collections/crashcourse


Want to know more about Carrie Anne?
https://about.me/carrieannephilbin

Want to find Crash Course elsewhere on the internet?
Facebook - http://www.facebook.com/YouTubeCrashC...
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse
CC Kids: http://www.youtube.com/crashcoursekids

Want to find Crash Course elsewhere on the internet?
Facebook - http://www.facebook.com/YouTubeCrashC...
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse

CC Kids: http://www.youtube.com/crashcoursekids

How Computers Calculate - the ALU: Crash Course Computer Science #5
00:11:10
CrashCourse
13 Views · 4 years ago

Take the 2017 PBS Digital Studios Survey: http://surveymonkey.com/r/pbsds2017. Today we're going to talk about a fundamental part of all modern computers. The thing that basically everything else uses - the Arithmetic and Logic Unit (or the ALU). The ALU may not have to most exciting name, but it is the mathematical brain of a computer and is responsible for all the calculations your computer does! And it's actually not that complicated. So today we're going to use the binary and logic gates we learned in previous episodes to build one from scratch, and then we'll use our newly minted ALU when we construct the heart of a computer, the CPU, in episode 7.

*CORRECTION*

We got our wires crossed with the Intel 4004, which we discuss later. The 74181 was introduced by Texas Instruments in 1970 but appeared in technical manuals around 1969. The design of the 74181, like most of the 74xx/74xxx series, was an open design which was manufactured by many other companies - Fairchild was one such manufacturer. They produced a chip, the Fairchild 9341, which was pin-for-pin compatible with the 74181.

Fairchild was the first to prototype an ALU, building the Fairchild 4711 in 1968 - a one-off device not optimized for scale manufacturing. In 1969, Signetics came out with the 8260, which they marketed in a very limited sense (it was attached, AFAICT, to one particular computer, the Data General SUPERNOVA). TI follows afterwards (March 1970) with the 74181, coupled with the 9341 from Fairchild. The 74181 became the standard number for this part, and was available from many manufacturers (back in those days, chip makers cross-licensed designs all over the place in order to provide assurance that their part could be sourced from multiple manufacturers).

Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios

The Latest from PBS Digital Studios: https://www.youtube.com/playlist?list...

We’ve got merch!
https://store.dftba.com/collections/crashcourse

Want to know more about Carrie Anne?
https://about.me/carrieannephilbin

Want to find Crash Course elsewhere on the internet?
Facebook - http://www.facebook.com/YouTubeCrashC...
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse
CC Kids: http://www.youtube.com/crashcoursekids

Want to find Crash Course elsewhere on the internet?
Facebook - http://www.facebook.com/YouTubeCrashCourse
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse

CC Kids: http://www.youtube.com/crashcoursekids

Representing Numbers and Letters with Binary: Crash Course Computer Science #4
00:10:46
CrashCourse
10 Views · 4 years ago

Please take our PBS Digital Studios Survey! https://www.surveymonkey.com/r/pbsds2017

Today, we’re going to take a look at how computers use a stream of 1s and 0s to represent all of our data - from our text messages and photos to music and webpages. We’re going to focus on how these binary values are used to represent numbers and letters, and discuss how our need to perform operations on larger and more complex values brought us from our 8-bit video games to beautiful Instagram photos, and from unreadable garbled text in our emails to a universal language encoding scheme.


Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios

The Latest from PBS Digital Studios: https://www.youtube.com/playlist?list...

We’ve got merch!
https://store.dftba.com/collections/crashcourse

Want to know more about Carrie Anne?
https://about.me/carrieannephilbin

Want to find Crash Course elsewhere on the internet?
Facebook - http://www.facebook.com/YouTubeCrashC...
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse
CC Kids: http://www.youtube.com/crashcoursekids

Boolean Logic & Logic Gates: Crash Course Computer Science #3
00:10:07
CrashCourse
8 Views · 4 years ago

Today, Carrie Anne is going to take a look at how those transistors we talked about last episode can be used to perform complex actions. With the just two states, on and off, the flow of electricity can be used to perform a number of logical operations, which are guided by a branch of mathematics called Boolean Algebra. We’re going to focus on three fundamental operations - NOT, AND, and OR - and show how they were created in a series of really useful circuits. And its these simple electrical circuits that lay the groundwork for our much more complex machines.

*CORRECTION* AT 1:27 the graph says "Quinary System" but then the graph shows 10 possible states - which is actually decimal. Technically, there should be only 5 possible values there, but the overall concept is still the same.


Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios

The Latest from PBS Digital Studios: https://www.youtube.com/playlist?list...

We’ve got merch!
https://store.dftba.com/collections/crashcourse

Want to know more about Carrie Anne?
https://about.me/carrieannephilbin

Want to find Crash Course elsewhere on the internet?
Facebook - http://www.facebook.com/YouTubeCrashC...
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse
CC Kids: http://www.youtube.com/crashcoursekids

Electronic Computing: Crash Course Computer Science #2
00:10:44
CrashCourse
8 Views · 4 years ago

So we ended last episode at the start of the 20th century with special purpose computing devices such as Herman Hollerith’s tabulating machines. But as the scale of human civilization continued to grow as did the demand for more sophisticated and powerful devices. Soon these cabinet-sized electro-mechanical computers would grow into room-sized behemoths that were prone to errors. But is was these computers that would help usher in a new era of computation - electronic computing.

Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios

The Latest from PBS Digital Studios: https://www.youtube.com/playlist?list...

We’ve got merch!
https://store.dftba.com/collections/crashcourse

Want to know more about Carrie Anne?
https://about.me/carrieannephilbin

Want to find Crash Course elsewhere on the internet?
Facebook - http://www.facebook.com/YouTubeCrashC...
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse
CC Kids: http://www.youtube.com/crashcoursekids

Early Computing: Crash Course Computer Science #1
00:11:53
CrashCourse
5 Views · 4 years ago

Hello, world! Welcome to Crash Course Computer Science! So today, we’re going to take a look at computing’s origins, because even though our digital computers are relatively new, the need for computation is not. Since the start of civilization itself, humans have had an increasing need for special devices to help manage laborious tasks, and as the scale of society continued to grow, these computational devices began to play a crucial role in amplifying our mental abilities. From the abacus and astrolabe to the difference engine and tabulating machine, we’ve come a long way to satisfying this increasing need, and in the process completely transformed commerce, government, and daily life.

Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios

Want to know more about Carrie Anne?
https://about.me/carrieannephilbin

Want more Crash Course in person? We'll be at NerdCon: Nerdfighteria in Boston on February 25th and 26th! For more information, go to http://www.nerdconnerdfighteria.com/

The Latest from PBS Digital Studios: https://www.youtube.com/playlist?list...

Want to find Crash Course elsewhere on the internet?
Facebook - http://www.facebook.com/YouTubeCrashC...
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse

CC Kids: http://www.youtube.com/crashcoursekids

Crash Course Computer Science Preview
00:02:45
CrashCourse
8 Views · 4 years ago

Starting February 22nd, Carrie Anne Philbin will be hosting Crash Course Computer Science! In this series, we're going to trace the origins of our modern computers, take a closer look at the ideas that gave us our current hardware and software, discuss how and why our smart devices just keep getting smarter, and even look towards the future! Computers fill a crucial role in the function of our society, and it's our hope that over the course of this series you will gain a better understanding of how far computers have taken us and how far they may carry us into the future.

Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios

Want to know more about Carrie Anne?
https://about.me/carrieannephilbin

Want more Crash Course in person? We'll be at NerdCon: Nerdfighteria in Boston on February 25th and 26th! For more information, go to http://www.nerdconnerdfighteria.com/

The Latest from PBS Digital Studios: https://www.youtube.com/playli....st?list=PL1mtdjDVOoO

Want to find Crash Course elsewhere on the internet?
Facebook - http://www.facebook.com/YouTubeCrashCourse
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse

CC Kids: http://www.youtube.com/crashcoursekids

T29L4 إنشاء تجربة آمنة للعملاء على الإنترنت
00:03:48
Google Skills
6 Views · 4 years ago

T29L4 إنشاء تجربة آمنة للعملاء على الإنترنت

T29L3 تأمين الشبكات والأنظمة والبرامج
00:05:32
Google Skills
11 Views · 4 years ago

T29L3 تأمين الشبكات والأنظمة والبرامج

T29L2 تأمين أجهزة الموظفين
00:03:09
Google Skills
14 Views · 4 years ago

T29L2 تأمين أجهزة الموظفين

T29L1 تدريبات الأمان على الإنترنت
00:05:09
Google Skills
19 Views · 4 years ago

T29L1 تدريبات الأمان على الإنترنت

Et3alem.com| كورسات مهارات الكمبيوتر
00:00:55
et3alem
16 Views · 4 years ago

اتعلم دوت كوم يقدم لك كورسات متميزة لا غنى عنها فى مجال الحاسب الآلى تفيدك فى حياتك العملية والمهنية وتحت اى ظرف.
كورسات مهارات الكمبيوتر تشمل برامج Microsoft office 2010 و اساسيات الشبكات
انضم الان:
موقع:http://et3alem.com
الفيس بوك:http://www.facebook.com/et3alemdotcom

et3alem.com | Microsoft Word 2010
00:01:36
et3alem
7 Views · 4 years ago

قريباً....
إتعلم برنامج وورد 2010 مع أيمن محروس سواءًا كنت جديد على البرنامج أو تريد أن تضيف لمهارتك في البرنامج.
يغطي هذا الكورس شرح مبادئ البرنامج و حتى بعد الأدوات الإحترافية.
إبدأ الأن تعلم أحد أهم البرامج المطلوبة.
انضم الان:
موقع:http://et3alem.com
الفيس بوك:http://www.facebook.com/et3alemdotcom

et3alem.com | Microsoft Excel 2010 .. Using charts
00:03:35
et3alem
6 Views · 4 years ago

إتعلم برنامج إكسل 2010 مع أيمن محروس سواءًا كنت جديد على البرنامج أو تريد أن تضيف لمهارتك في البرنامج.
يغطي هذا الكورس شرح مبادئ البرنامج و حتى بعد الأدوات الإحترافية.
إبدأ الأن تعلم أحد أهم البرامج المطلوبة.
انضم الان:
موقع:http://et3alem.com
الفيس بوك:http://www.facebook.com/et3alemdotcom

et3alem.com | Microsoft Outlook 2010 .. مقدمة
00:00:49
et3alem
9 Views · 4 years ago

إتعلم برنامج اوت لوك 2010 مع أيمن محروس سواءًا كنت جديد على البرنامج أو تريد أن تضيف لمهارتك في البرنامج.
يغطي هذا الكورس شرح مبادئ البرنامج و حتى بعد الأدوات الإحترافية.
إبدأ الأن تعلم أحد أهم البرامج المطلوبة.
انضم الان:
موقع:http://et3alem.com
الفيس بوك:http://www.facebook.com/et3alemdotcom

et3alem.com | Microsoft Exel 2010 Worksheet
00:11:10
et3alem
9 Views · 4 years ago

إتعلم برنامج إكسيل 2010 مع أيمن محروس سواءًا كنت جديد على البرنامج أو تريد أن تضيف لمهارتك في البرنامج.
يغطي هذا الكورس شرح مبادئ البرنامج و حتى بعد الأدوات الإحترافية.
إبدأ الأن تعلم أحد أهم البرامج المطلوبة.
انضم الان:
موقع:http://et3alem.com
الفيس بوك:http://www.facebook.com/et3alemdotcom

et3alem.com | Microsoft Excel 2010 .. Formula Basics
00:06:21
et3alem
7 Views · 4 years ago

إتعلم برنامج إكسيل 2010 مع أيمن محروس سواءًا كنت جديد على البرنامج أو تريد أن تضيف لمهارتك في البرنامج.
يغطي هذا الكورس شرح مبادئ البرنامج و حتى بعد الأدوات الإحترافية.
إبدأ الأن تعلم أحد أهم البرامج المطلوبة.
انضم الان:
موقع:http://et3alem.com
الفيس بوك:http://www.facebook.com/et3alemdotcom

et3alem.com | Microsoft Word 2010 .. Proofing documents
00:03:57
et3alem
5 Views · 4 years ago

قريباً....
إتعلم برنامج وورد 2010 مع أيمن محروس سواءًا كنت جديد على البرنامج أو تريد أن تضيف لمهارتك في البرنامج.
يغطي هذا الكورس شرح مبادئ البرنامج و حتى بعد الأدوات الإحترافية.
إبدأ الأن تعلم أحد أهم البرامج المطلوبة.
انضم الان:
موقع:http://et3alem.com
الفيس بوك:http://www.facebook.com/et3alemdotcom

et3alem.com | Microsoft powerpoint 2010 .. مقدمة
00:00:53
et3alem
13 Views · 4 years ago

إتعلم برنامج باور بوينت 2010 مع أيمن محروس سواءًا كنت جديد على البرنامج أو تريد أن تضيف لمهارتك في البرنامج.
يغطي هذا الكورس شرح مبادئ البرنامج و حتى بعد الأدوات الإحترافية.
إبدأ الأن تعلم أحد أهم البرامج المطلوبة.
انضم الان:
موقع:http://et3alem.com
الفيس بوك:http://www.facebook.com/et3alemdotcom

et3alem.com | Microsoft Word 2010 .. Formatting text
00:06:01
et3alem
7 Views · 4 years ago

قريباً....
إتعلم برنامج وورد 2010 مع أيمن محروس سواءًا كنت جديد على البرنامج أو تريد أن تضيف لمهارتك في البرنامج.
يغطي هذا الكورس شرح مبادئ البرنامج و حتى بعد الأدوات الإحترافية.
إبدأ الأن تعلم أحد أهم البرامج المطلوبة.
انضم الان:
موقع:http://et3alem.com
الفيس بوك:http://www.facebook.com/et3alemdotcom

et3alem.com | اساسيات الشبكات - انواع الشبكات الجزء 2
00:01:38
et3alem
6 Views · 4 years ago

لدروس الشبكات يمكنك مشاهدتها علي يوتيوب عن طريق: https://www.youtube.com/playli....st?list=PLqGEgt_8f5g
او عن طريق موقع اتعلم دوت كوم
http://et3alem.com

تعرف على الشبكات مع أيمن محروس سواءًا كنت جديد فى مجال الشبكات أو تريد أن تضيف لمهارتك فى هذا المجال الواسع.
يغطي هذا الكورس شرح مبادئ الشبكات و حتى بعد الأدوات الإحترافية.
إبدأ الأن تعلم أحد أهم البرامج المطلوبة.
انضم الان:
موقع:http://et3alem.com
الفيس بوك:http://www.facebook.com/et3alemdotcom

et3alem.com |   اساسيات الشبكات .. مقدمة
00:00:51
et3alem
8 Views · 4 years ago

لدروس الشبكات يمكنك مشاهدتها علي يوتيوب عن طريق: https://www.youtube.com/playli....st?list=PLqGEgt_8f5g
او عن طريق موقع اتعلم دوت كوم
http://et3alem.com

تعرف على الشبكات مع أيمن محروس سواءًا كنت جديد فى مجال الشبكات أو تريد أن تضيف لمهارتك فى هذا المجال الواسع.
يغطي هذا الكورس شرح مبادئ الشبكات و حتى بعد الأدوات الإحترافية.
إبدأ الأن تعلم أحد أهم البرامج المطلوبة.
انضم الان:
موقع:http://et3alem.com
الفيس بوك:http://www.facebook.com/et3alemdotcom

et3alem.com | اساسيات الشبكات - انواع الشبكات الجزء 1
00:01:40
et3alem
6 Views · 4 years ago

لدروس الشبكات يمكنك مشاهدتها علي يوتيوب عن طريق: https://www.youtube.com/playli....st?list=PLqGEgt_8f5g
او عن طريق موقع اتعلم دوت كوم
http://et3alem.com

تعرف على الشبكات مع أيمن محروس سواءًا كنت جديد فى مجال الشبكات أو تريد أن تضيف لمهارتك فى هذا المجال الواسع.
يغطي هذا الكورس شرح مبادئ الشبكات و حتى بعد الأدوات الإحترافية.
إبدأ الأن تعلم أحد أهم البرامج المطلوبة.
انضم الان:
موقع:http://et3alem.com
الفيس بوك:http://www.facebook.com/et3alemdotcom

استكشاف أخطاء الشبكة وإصلاحها | اساسيات الشبكات
00:07:58
et3alem
2 Views · 4 years ago

لدروس الشبكات يمكنك مشاهدتها علي يوتيوب عن طريق: https://www.youtube.com/playli....st?list=PLqGEgt_8f5g
او عن طريق موقع اتعلم دوت كوم
http://et3alem.com

تعرف على الشبكات مع أيمن محروس سواءًا كنت جديد فى مجال الشبكات أو تريد أن تضيف لمهارتك فى هذا المجال الواسع.
يغطي هذا الكورس شرح مبادئ الشبكات و حتى بعد الأدوات الإحترافية.
إبدأ الأن تعلم أحد أهم البرامج المطلوبة.
انضم الان:
موقع:http://et3alem.com
الفيس بوك:http://www.facebook.com/et3alemdotcom

انواع الكابلات و السويتشات | اساسيات الشبكات
00:06:33
et3alem
3 Views · 4 years ago

لدروس الشبكات يمكنك مشاهدتها علي يوتيوب عن طريق: https://www.youtube.com/playli....st?list=PLqGEgt_8f5g
او عن طريق موقع اتعلم دوت كوم
http://et3alem.com

تعرف على الشبكات مع أيمن محروس سواءًا كنت جديد فى مجال الشبكات أو تريد أن تضيف لمهارتك فى هذا المجال الواسع.
يغطي هذا الكورس شرح مبادئ الشبكات و حتى بعد الأدوات الإحترافية.
إبدأ الأن تعلم أحد أهم البرامج المطلوبة.
انضم الان:
موقع:http://et3alem.com
الفيس بوك:http://www.facebook.com/et3alemdotcom

بروتوكول الشبكة الجزء 2 | اساسيات الشبكات
00:02:39
et3alem
4 Views · 4 years ago

لدروس الشبكات يمكنك مشاهدتها علي يوتيوب عن طريق: https://www.youtube.com/playli....st?list=PLqGEgt_8f5g
او عن طريق موقع اتعلم دوت كوم
http://et3alem.com

تعرف على الشبكات مع أيمن محروس سواءًا كنت جديد فى مجال الشبكات أو تريد أن تضيف لمهارتك فى هذا المجال الواسع.
يغطي هذا الكورس شرح مبادئ الشبكات و حتى بعد الأدوات الإحترافية.
إبدأ الأن تعلم أحد أهم البرامج المطلوبة.
انضم الان:
موقع:http://et3alem.com
الفيس بوك:http://www.facebook.com/et3alemdotcom

طوبولوجيا الشبكة | اساسيات الشبكات
00:02:27
et3alem
13 Views · 4 years ago

لدروس الشبكات يمكنك مشاهدتها علي يوتيوب عن طريق: https://www.youtube.com/playli....st?list=PLqGEgt_8f5g
او عن طريق موقع اتعلم دوت كوم
http://et3alem.com

تعرف على الشبكات مع أيمن محروس سواءًا كنت جديد فى مجال الشبكات أو تريد أن تضيف لمهارتك فى هذا المجال الواسع.
يغطي هذا الكورس شرح مبادئ الشبكات و حتى بعد الأدوات الإحترافية.
إبدأ الأن تعلم أحد أهم البرامج المطلوبة.
انضم الان:
موقع:http://et3alem.com
الفيس بوك:http://www.facebook.com/et3alemdotcom

Vulnerability Scanning - CompTIA Security+ SY0-401: 3.8
00:08:19
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Vulnerability scans can provide you with a wealth of information about your network security. In this video, you’ll learn about different scan types, how to identify vulnerability, and how to interpret scan results.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Penetration Testing - CompTIA Security+ SY0-401: 3.8
00:10:01
ITCOURSES
12 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
One way to determine the security of your network is to actively attack your computing resources. In this video, you’ll learn techniques for testing security controls on your network.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Assessment Techniques - CompTIA Security+ SY0-401: 3.7
00:06:32
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Security policies should be written to include the security assessment of your infrastructure. In this video, you’ll learn the best practices around baselining, reviewing code, performing design reviews, and completing architecture reviews.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Assessment Types - CompTIA Security+ SY0-401: 3.7
00:04:13
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
It’s important to accurately categorize security assessments. In this video, you’ll learn the differences between a security risk, security vulnerability and security threat.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Assessment Tools - CompTIA Security+ SY0-401: 3.7
00:08:09
ITCOURSES
8 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
As a security professional, you need assessment tools to help keep your network secure. In this video, you’ll learn about active vs. passive tools, protocol analyzers, honeypots, and more.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Vulnerability Scanning Overview - CompTIA Security+ SY0-401: 3.7
00:06:27
ITCOURSES
4 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
How many vulnerabilities do your network devices have? In this video, you’ll learn how to use a vulnerability scanner to find the susceptible areas in your network.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Detection vs. Prevention - CompTIA Security+ SY0-401: 3.6
00:06:04
ITCOURSES
4 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Should you detect, or should you prevent? In this video, you’ll learn the advantages and disadvantages for implementing these security techniques.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Reporting - CompTIA Security+ SY0-401: 3.6
00:07:29
ITCOURSES
10 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
If you can’t see a problem, then you can’t fix it. In this video, you’ll learn how reporting can help you create and maintain a security computing environment.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Security Posture - CompTIA Security+ SY0-401: 3.6
00:04:36
ITCOURSES
11 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
You can’t build a security policy unless you know how to plan, monitor, and remediate security issues. In this video, you’ll learn some best-practices for baselining, watching, and resolving security problems.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Physical Port Security - CompTIA Security+ SY0-401: 3.6
00:04:37
ITCOURSES
10 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Physical access to a network can be a significant security concern. In this video, you’ll learn how to protect your physical network interfaces using configuration settings and access control software.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Operating System Hardening - CompTIA Security+ SY0-401: 3.6
00:10:04
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Out of the box, your operating system probably isn’t the most secure. In this video, you’ll learn some best practices for security your operating system from the bad guys.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Monitoring System Logs - CompTIA Security+ SY0-401: 3.6
00:06:35
ITCOURSES
7 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Your system logs contain a wealth of security details. In this video, you’ll learn about the different log types and how they can be used to security your network.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Arbitrary and Remote Code Execution - CompTIA Security+ SY0-401: 3.5
00:03:15
ITCOURSES
7 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
A serious programming error can open your computer to code that can be run from anywhere in the world. In this video, you’ll learn about remote code execution and how you can avoid having your computer taken over by the bad guys.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Malicious Add-ons and Attachments - CompTIA Security+ SY0-401: 3.5
00:06:21
ITCOURSES
7 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
We are constantly installing new software and add-ons, but how do we know if this software is safe to use? In this video, you’ll learn about add-ons and attachments, and I’ll give you some real-world examples of malicious add-ons.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Locally Shared Objects and Flash Cookies - CompTIA Security+ SY0-401: 3.5
00:03:02
ITCOURSES
7 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
A number of security concerns are related to cookies and the information that we’re storing in our computer. In this video, you’ll learn about Flash cookies and how these locally shared objects can potentially leak information to the bad guys.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Cookies, Header Manipulation, and Session Hijacking - CompTIA Security+ SY0-401: 3.5
00:11:03
ITCOURSES
7 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
If you have the right information, it may be possible to gain access to a user’s account information without any authentication. In this video, you’ll learn about session hijacking and I’ll demonstrate a live session hijack by gaining access to cookie information and manipulating HTTP headers.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Zero-Day Attacks - CompTIA Security+ SY0-401: 3.5
00:05:59
ITCOURSES
9 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Many of our applications contain security vulnerabilities that haven’t been discovered yet. In this video, you’ll learn about zero-day attacks and why it’s important to patch our systems as quickly as possible.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Buffer Overflows and Integer Overflows - CompTIA Security+ SY0-401: 3.5
00:05:06
ITCOURSES
10 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
A poorly developed application can allow the bad guys to manipulate memory using buffer overflows and integer overflows. In this video, you’ll learn how an overflow works and what you can do to prevent these security issues.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Directory Traversal and Command Injection - CompTIA Security+ SY0-401: 3.5
00:03:56
ITCOURSES
9 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
The bad guys can take a poorly configured web server and get access to the server’s entire file system. In this video, you’ll learn about directory traversal and how to protect your web server against command injections.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

SQL Injection, XML Injection, and LDAP Injection - CompTIA Security+ SY0-401: 3.5
00:05:56
ITCOURSES
12 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Database security can sometimes be circumvented by poorly designed software. In this video, you’ll learn how SQL injection, XML injection, and LDAP injection can get data from the most secure databases.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Cross-Site Scripting - CompTIA Security+ SY0-401: 3.5
00:12:35
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Browser security flaws can allow information to be inappropriately shared between web sites. In this video, you’ll learn about the different types of cross-site scripting and how to protect yourself against XSS.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

WPS Attacks - CompTIA Security+ SY0-401: 3.4
00:03:45
ITCOURSES
5 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
If you can’t break the encryption, maybe you can break down the door. In this video, you’ll learn about a significant security flaw in wireless devices that use WPS.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

WPA Attacks - CompTIA Security+ SY0-401: 3.4
00:03:33
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
An encryption technology doesn’t have to suffer from a cryptographic flaw to be susceptible to attack. In this video, you’ll learn how an encryption protocol as strong as WPA can be successfully hacked.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Wireless Replay and WEP Attacks - CompTIA Security+ SY0-401: 3.4
00:02:42
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Flaws in WEP encryption were exploited using a series of replays and very specific cryptographic attacks. In this video, you’ll learn the process that the bad guys used to break WEP encryption.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Near Field Communication - CompTIA Security+ SY0-401: 3.4
00:03:02
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Our mobile devices are used for communication, entertainment, and now for near-field applications. In this video, you’ll learn about near field communication and how this may change our perspective on mobile security.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Wireless Packet Analysis - CompTIA Security+ SY0-401: 3.4
00:07:09
ITCOURSES
9 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
There’s a wealth of data hidden in the packets that traverse our wireless networks. In this video, you’ll learn how easy it is to perform wireless packet analysis and what you can do to protect yourself on a wireless network.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Wireless IV Attacks - CompTIA Security+ SY0-401: 3.4
00:07:31
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Many encryption methods use initialization vectors to provide additional randomization to the data. In this video, you’ll learn how a poorly implemented initialization vector created an enormous security concern for our wireless networks.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Bluejacking and Bluesnarfing - CompTIA Security+ SY0-401: 3.4
00:05:43
ITCOURSES
11 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
We rely on Bluetooth networks to connect our mobile device to headphones, speakers, and other devices, but is a Bluetooth network really safe? In this video, you’ll learn about the security concerns surrounding bluejacking and bluesnarfing.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Wardriving and Warchalking - CompTIA Security+ SY0-401: 3.4
00:04:21
ITCOURSES
8 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
We’ve rapidly moved from chalk-based wireless network identification to completely automated wireless maps. In this video, you’ll learn about the history of warchalking and how today’s wireless crowdsourced mapping is accomplished.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Wireless Interference - CompTIA Security+ SY0-401: 3.4
00:04:49
ITCOURSES
7 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Our wireless networks are only as good as the signal it provides. In this video, you’ll learn how the bad guys are disrupting our wireless infrastructure to help them gain access to our network.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Rogue Access Points and Evil Twins - CompTIA Security+ SY0-401: 3.4
00:05:19
ITCOURSES
8 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
One rogue access point can create a significant security issue. In this video, you’ll learn about rogue access points, evil twins, and how to protect yourself from these security concerns.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

The Effectiveness of Social Engineering - CompTIA Security+ SY0-401: 3.3
00:04:00
ITCOURSES
9 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Is social engineering really a threat? In this video, you’ll learn how a talented social engineer was able to steal a valuable Twitter handle.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Whaling - CompTIA Security+ SY0-401: 3.3
00:03:51
ITCOURSES
7 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
These days, the bad guys know that the management of the company is the one with the money and the power. In this video, you’ll learn about techniques that the bad guys use for hunting the big whale.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Hoaxes - CompTIA Security+ SY0-401: 3.3
00:04:21
ITCOURSES
7 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
We spend a lot of time and resources dealing with electronic hoaxes. In this video, you’ll learn about hoaxes and some resources that you can use to research suspicious email hoaxes.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Impersonation - CompTIA Security+ SY0-401: 3.3
00:03:40
ITCOURSES
5 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Impersonation is the foundation of social engineering. In this video, you’ll learn how the bad guys use impersonation to circumvent your security technologies.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Tailgating - CompTIA Security+ SY0-401: 3.3
00:04:22
ITCOURSES
9 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Once you’re inside of a building, the security posture of an organization is dramatically decreased. In this video, you’ll learn how the bad guys can get into your secure building without being noticed.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Dumpster Diving - CompTIA Security+ SY0-401: 3.3
00:03:49
ITCOURSES
9 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
One man’s trash is another man’s security exploit. In this video, you’ll learn about the dangers involved when disposing of your organization’s rubbish.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Shoulder Surfing - CompTIA Security+ SY0-401: 3.3
00:03:21
ITCOURSES
8 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
What could be easier to social engineer than a shoulder surf? In this video, you’ll learn about shoulder surfing and some methods to protect yourself against this tactic.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Watering Hole Attack - CompTIA Security+ SY0-401: 3.2
00:03:03
ITCOURSES
10 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
The most successful attacks happen when the target is least expecting them. In this video, you’ll learn how watering hole attacks can be a very effective way to gain access to an unsuspecting target.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

URL Hijacking - CompTIA Security+ SY0-401: 3.2
00:04:07
ITCOURSES
7 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
One way to redirect your browsing activity is to force you to a site that you weren’t intending to visit. In this video, you’ll learn the techniques used to hijack URLs.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Password Attacks - CompTIA Security+ SY0-401: 3.2
00:10:48
ITCOURSES
9 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
The bad guys don’t need to know your password; they’ll figure it out themselves. In this video, you’ll learn the techniques that the bad guys use to reverse-engineer your password.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Transitive and Client-side Attacks - CompTIA Security+ SY0-401: 3.2
00:04:16
ITCOURSES
11 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
If the bad guys can’t attack a server directly, then they’ll try going through a trusted neighbor. In this video, you’ll learn how transitive attacks and attacks against the clients have become significant security concerns.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Insider Threats - CompTIA Security+ SY0-401: 3.2
00:03:42
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
A huge security risk is on the inside of your network. In this video, you’ll learn about insider threats and what you can to do help secure yourself from this very intimate security concern.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Privilege Escalation - CompTIA Security+ SY0-401: 3.2
00:02:37
ITCOURSES
7 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
If a bad guy can escalate the privileges of a regular user, he’ll have greater access to the system. In this video, you’ll learn about privilege escalation and how to mitigate privilege escalation.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Christmas Tree Attack - CompTIA Security+ SY0-401: 3.2
00:06:42
ITCOURSES
10 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
By changing a few bits inside of a network packet, you can cause a number of things to occur. In this video, you’ll learn about Xmas tree attacks and you’ll see what happens when I run a Christmas tree attack against my own router.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Vishing - CompTIA Security+ SY0-401: 3.2
00:03:37
ITCOURSES
10 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Why would the bad guys hack into your computer when they could just give you a call? In this video, you’ll learn about vishing (voice phishing), and how the bad guys can even fool you into calling them yourself.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Phishing - CompTIA Security+ SY0-401: 3.2
00:07:32
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
The bad guys know that the easiest way to steal your information is to have you type it in for them yourself. In this video, you’ll learn how phishing happens and things you can do to protect against phishing and spear phishing.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Spam - CompTIA Security+ SY0-401: 3.2
00:05:41
ITCOURSES
5 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Unsolicited emails are an ongoing security concern. In this video, you’ll learn about spam, spim, and spit.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Spoofing - CompTIA Security+ SY0-401: 3.2
00:04:10
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
The bad guys are very good at providing fake information to us. In this video, you’ll learn how spoofing works and how pharming and phishing have become common ways to illicitly obtain our private information.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Replay Attacks - CompTIA Security+ SY0-401: 3.2
00:02:27
ITCOURSES
7 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Even if the bad guys can’t hack into your system, they may be able to temporarily morph into something that looks exactly like you. In this video, you’ll learn how replay attacks can be used to gain inappropriate access to devices and how software developers can protect against replay attacks.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Denial of Service - CompTIA Security+ SY0-401: 3.2
00:07:08
ITCOURSES
4 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Denial of service attacks are very difficult to defend against. In this video, you’ll learn about denial of service attacks and you’ll see how one of the first DoS attacks, the Smurf attack, was able to disrupt services on many networks.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Man-in-the-Middle Attacks - CompTIA Security+ SY0-401: 3.2
00:08:06
ITCOURSES
5 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
One challenge with modern network security is protecting against man-in-the-middle attacks. In this video, you’ll learn about man-in-the-middle and I’ll demonstrate a live MiTM attack.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Armored Virus - CompTIA Security+ SY0-401: 3.1
00:01:56
ITCOURSES
8 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
The virus developers know that the secret to remaining active is to hide as much as possible. In this video, you’ll learn how virus programmers use obfuscation to create armored viruses.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Polymorphic Malware - CompTIA Security+ SY0-401: 3.1
00:03:03
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Polymorphic malware is constantly changing, and this makes it difficult to identify and remove. In this video, you’ll learn about polymorphic malware and the methods that we’re using to control and eradicate this malicious software.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Ransomware - CompTIA Security+ SY0-401: 3.1
00:02:47
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Ransomware is a specific kind of malware that goes directly after your wallet. In this video, you’ll learn some of techniques that ransomware uses to get your money.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Botnets - CompTIA Security+ SY0-401: 3.1
00:03:42
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
The remote-control of a botnet has the ability to cause significant harm to our computers and our assets. In this video, you’ll learn how botnets work and how one of the largest botnets in history has become very good at taking money out of our bank accounts.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Logic Bombs - CompTIA Security+ SY0-401: 3.1
00:03:31
ITCOURSES
5 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Logic bombs can be very destructive and can reside in our systems with near invisibility until they trigger. In this video, you’ll learn about common logic bomb categorizations and some real-world examples of logic bombs.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Rootkits - CompTIA Security+ SY0-401: 3.1
00:05:39
ITCOURSES
8 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
One of the most significant challenges with rootkits is their ability to be invisible inside of your computer. In this video, you’ll learn where rootkits live and how they manage to avoid our normal malware detection strategies.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Trojans and Backdoors - CompTIA Security+ SY0-401: 3.1
00:08:53
ITCOURSES
4 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Trojan Horses are a special kind of malware that manages to infect our machines by tricking us into running the malicious software. In this video, you’ll learn about trojans and backdoors, and I’ll demonstrate how an application posing as a game can quickly infect our computer.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Adware and Spyware - CompTIA Security+ SY0-401: 3.1
00:06:42
ITCOURSES
5 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Adware and spyware is notorious for causing performance problems and application incompatibilities. In this video, you’ll learn about adware, spyware, and some techniques for identifying an adware or spyware infection.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Viruses and Worms - CompTIA Security+ SY0-401: 3.1
00:10:06
ITCOURSES
5 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Viruses are well known for corrupting our operating systems and documents. In this video, you’ll learn how viruses work and how worms are able to replicate without human intervention.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Malware Overview - CompTIA Security+ SY0-401: 3.1
00:08:47
ITCOURSES
7 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Malware is one of the most prevalent forms of malicious software attacks. In this video, you’ll learn about malware types and some of the problems that occur when malware is installed onto our computers.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Confidentiality, Integrity, Availability, and Safety - CompTIA Security+ SY0-401: 2.9
00:06:11
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
The AIC triad is an important concept in security. In this video, you’ll learn about confidentiality, integrity, availability, and safety.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Cold Site, Hot Site, and Warm Site - CompTIA Security+ SY0-401: 2.8
00:02:31
ITCOURSES
11 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
If you’re managing a disaster recovery plan, then you’ll need some off-site options. In this video, you’ll learn about the advantages and disadvantages of cold sites, hot sites, and warm sites.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Redundancy, Fault Tolerance, and High Availability - CompTIA Security+ SY0-401: 2.8
00:10:08
ITCOURSES
9 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
If you’re planning to maintain uptime and availability of your computing resources, then you’ll almost certainly need to implement redundant systems. In this video, you’ll learn about redundancy, fault tolerant systems, and high availability infrastructures.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Tabletop Exercises - CompTIA Security+ SY0-401: 2.8
00:02:50
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Instead of performing a full-blow disaster drill, you can validate your plans using a tabletop exercise. In this video, you’ll learn about tabletop exercises and some techniques for running tabletop exercises in your own organization.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Succession Planning - CompTIA Security+ SY0-401: 2.8
00:01:34
ITCOURSES
7 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Part of a disaster recovery plan is the organization’s strategy for succession planning. In this video, you’ll learn the important parts of a company’s formal succession plan.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

IT Contingency Planning - CompTIA Security+ SY0-401: 2.8
00:03:11
ITCOURSES
5 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
There are a number of formal processes that you can follow for IT contingency planning. In this video, you’ll learn about some well-documented contingency strategies from the United States National Institute of Standards and Technology.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Disaster Recovery Planning and Testing - CompTIA Security+ SY0-401: 2.8
00:03:32
ITCOURSES
13 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
A disaster can be small and large events, and you need to be ready for anything. In this video, you’ll learn about disaster recovery planning and some strategies for dealing with disaster events.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Continuity of Operations - CompTIA Security+ SY0-401: 2.8
00:01:32
ITCOURSES
5 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
A company’s business systems are often interrelated, and the IT department is the glue that holds everything together. In this video, you’ll learn about business continuity and some strategies for building a strong continuity plan.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Redundancy and Single Points of Failure - CompTIA Security+ SY0-401: 2.8
00:03:18
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
A secure network usually includes a number of redundant systems. In this video, you’ll learn more about redundant hardware and systems and how far the planning goes when designing redundancy.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Critical Systems and Components - CompTIA Security+ SY0-401: 2.8
00:02:40
ITCOURSES
8 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
What are the critical systems in your organization? In this video, you’ll learn how to identify tangible and intangible assets and learn strategies for identifying critical business systems.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Business Impact Analysis - CompTIA Security+ SY0-401: 2.8
00:02:37
ITCOURSES
12 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
When a security event occurs, the organization will need to completely understand the business impact of the event. In this video, you’ll learn strategies that you can use to determine the true impact to the business.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Physical Security Control Types - CompTIA Security+ SY0-401: 2.7
00:03:53
ITCOURSES
10 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
There are a number of different control categorizations for physical security. In this video, you’ll learn about deterrent, preventive, detective, and compensating control types.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Physical Security - CompTIA Security+ SY0-401: 2.7
00:11:00
ITCOURSES
8 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
A proper security strategy includes both technical and physical security methods. In this video, you’ll learn about some common physical security techniques.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Environmental Monitoring - CompTIA Security+ SY0-401: 2.7
00:01:42
ITCOURSES
8 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
An effective data center cooling system needs constant monitoring. In this video, you’ll learn some techniques for properly monitoring your computing environment.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Hot and Cold Aisles - CompTIA Security+ SY0-401: 2.7
00:01:44
ITCOURSES
24 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
A data center cooling system works best when hot air is properly vented. In this video, you’ll learn how data centers use these hot and cold aisles to efficiently cool the entire computing environment.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

EMI Shielding - CompTIA Security+ SY0-401: 2.7
00:01:05
ITCOURSES
3 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
The shielding of electromagnetic interference an important consideration around computer equipment. In this video, you’ll learn about EMI and how to maintain proper shielding.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Fire Suppression - CompTIA Security+ SY0-401: 2.7
00:03:00
ITCOURSES
5 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
There are a number of different strategies for fire suppression. In this video, you’ll learn about some fire suppression techniques and when they should be considered.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

HVAC, Temperature, and Humidity Controls - CompTIA Security+ SY0-401: 2.7
00:03:51
ITCOURSES
8 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
The environmental controls in your data center are an important part of your infrastructure. In this video, you’ll learn some important considerations regarding your HVAC, temperature settings, and humidity controls.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Gathering Training Metrics - CompTIA Security+ SY0-401: 2.6
00:02:14
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Without some feedback mechanisms, you won’t have a way to evaluate your training strategies. In this video, you’ll learn some techniques for gathering metrics about your security training.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Social Networking and Peer-to-Peer Security - CompTIA Security+ SY0-401: 2.6
00:02:01
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
A single peer-to-peer user in your organization can be a significant security risk. In this video, you’ll learn why peer-to-peer software and social networks should be carefully managed.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

New Threats and Security Trends - CompTIA Security+ SY0-401: 2.6
00:02:44
ITCOURSES
3 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
The security landscape is constantly changing. In this video, you’ll learn about some of the latest threats and emerging security concerns.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

User Habits - CompTIA Security+ SY0-401: 2.6
00:02:01
ITCOURSES
4 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
How are your users handling the organization’s data? In this video, you’ll learn some techniques for maintaining good data hygiene for your entire user base.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Compliance Best-Practices and Standards - CompTIA Security+ SY0-401: 2.6
00:03:47
ITCOURSES
7 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
The data in our organization may fall under some very important compliance regulations. In this video, you’ll learn about SOX, HIPAA, and GLBA compliance requirements.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Data Labeling, Handling, and Disposal - CompTIA Security+ SY0-401: 2.6
00:03:01
ITCOURSES
18 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
What happens when you need to get rid of data? In this video, you’ll find that the handling and disposal of data can be a relatively complex issue.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Information Classification - CompTIA Security+ SY0-401: 2.6
00:01:41
ITCOURSES
9 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Not all data has the same level of classification. In this video, you’ll learn about some common data classifications such as unclassified, confidential, and secret.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Personally Identifiable Information - CompTIA Security+ SY0-401: 2.6
00:02:52
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Our personal information is more at risk than ever. In this video, you’ll learn about personally identifiable information and some of the security concerns surrounding our personal privacy.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Security Policy Training and Procedures - CompTIA Security+ SY0-401: 2.6
00:03:52
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Your security policies won’t be very useful if your user community isn’t trained. In this video, you’ll learn some techniques for training your users on your organization’s security policies.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Incident Damage and Loss Control - CompTIA Security+ SY0-401: 2.5
00:01:52
ITCOURSES
7 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Nearly all security incidents will incur some level of damage or loss of data. In this video, you’ll learn how to limit the spread of the damage.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Data Breaches - CompTIA Security+ SY0-401: 2.5
00:02:18
ITCOURSES
5 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Nobody likes their data to leave the network, but sometimes data breaches occur. In this video, you’ll learn how to secure and analyze the attack after a data breach has occurred.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

First Responder - CompTIA Security+ SY0-401: 2.5
00:01:17
ITCOURSES
4 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
The first responder to a security incident has a number of important responsibilities. In this video, you’ll learn the roles of the first responder to a security event.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Incident Recovery and Reconstitution - CompTIA Security+ SY0-401: 2.5
00:02:54
ITCOURSES
10 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
When the security event has concluded, it’s time to rebuild any damaged sections of the network. In this video, you’ll learn some strategies for getting back up and running as quickly as possible.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Incident Reporting - CompTIA Security+ SY0-401: 2.5
00:03:47
ITCOURSES
7 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
What’s the best way to gather information during a security incident? In this video, you’ll learn some techniques for gathering details and how to report after the security event is over.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Lessons Learned from Incidents - CompTIA Security+ SY0-401: 2.5
00:02:14
ITCOURSES
8 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
After an incident has occurred, it’s important to compare notes and plan for the next attack. In this video, you’ll learn how to answer the tough questions about a security incident.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Incident Mitigation and Isolation - CompTIA Security+ SY0-401: 2.5
00:04:42
ITCOURSES
5 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
There are many ways to limit the impact of a security incident. In this video, you’ll learn about methods to stop the attack and limit the scope of the damage.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Incident Escalation and Notification - CompTIA Security+ SY0-401: 2.5
00:02:37
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
When you’re involved with an incident, communication is key. In this video, you’ll learn about escalation procedures and strategies for security notifications.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Incident Identification - CompTIA Security+ SY0-401: 2.5
00:04:09
ITCOURSES
4 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
One of the challenges of security incidents is recognizing that one has occurred. In this video, you’ll learn about some techniques that can help you detect incidents and attacks.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Preparing for an Incident - CompTIA Security+ SY0-401: 2.5
00:05:30
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
What happens when there’s an incident? In this video, you’ll learn about the industry best practices and some strategies for preparing for (and perhaps preventing) an incident.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Big Data Analysis - CompTIA Security+ SY0-401: 2.4
00:03:06
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
The era of big data has arrived, and we’re now faced with analyzing more data than ever before. In this video, you’ll learn about big data analysis and the techniques that we’re using to sift through our huge data stores.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Chain of Custody - CompTIA Security+ SY0-401: 2.4
00:01:36
ITCOURSES
7 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
If you’re handling evidence, then you’ll need to follow a strict chain of custody. In this video, you’ll learn about chain of custody and how it can assist with the resolution of security incidents.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Tracking Man-Hours and Expenses - CompTIA Security+ SY0-401: 2.4
00:01:42
ITCOURSES
7 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Processing a security incident can be an expensive endeavor. In this video, you’ll learn the importance of proper expense accounting and why tracking these details is an important consideration.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Interviewing Witnesses - CompTIA Security+ SY0-401: 2.4
00:01:10
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
There’s sometimes no replacement for having a first-hand account of an incident. In this video, you’ll learn the advantages and disadvantages of interviewing witnesses.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Taking Screenshots - CompTIA Security+ SY0-401: 2.4
00:01:55
ITCOURSES
2 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
There are many ways to capture the information that appears on a screen. In this video, you’ll learn a few techniques for taking screenshots across many different operating systems.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Taking Hashes - CompTIA Security+ SY0-401: 2.4
00:05:13
ITCOURSES
3 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
How can you tell if a digital file on a piece of storage media has been altered? In this video, you’ll learn about hashing, and I’ll demonstrate how to compare hashes with a file that has been altered.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Recording Time Offsets - CompTIA Security+ SY0-401: 2.4
00:03:32
ITCOURSES
4 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Time is relative, and that’s certainly the case with a computer’s internal clock. In this video, you’ll learn how operating systems count time and how a computer’s timezone setting can change how you look at data.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Capturing Video - CompTIA Security+ SY0-401: 2.4
00:02:10
ITCOURSES
5 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
A video can sometimes provide much more information that weeks of log files. In this video, you’ll learn some strategies for collecting evidence with video.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Capturing Network Traffic and Logs - CompTIA Security+ SY0-401: 2.4
00:02:48
ITCOURSES
5 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
The packets traversing network can be a wealth of information. In this video, you’ll learn how to collect information from network traffic and logs.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Capturing System Images - CompTIA Security+ SY0-401: 2.4
00:03:29
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Imaging a system can be a very effective way of preserving evidence. In this video, you’ll learn about system imaging and some strategies for obtaining system data without directly imaging a storage drive.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Order of Volatility - CompTIA Security+ SY0-401: 2.4
00:04:57
ITCOURSES
10 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Not all data sticks around, and some data stays around longer than others. In this video, you’ll learn about the order of data volatility and which data should be gathered more urgently than others.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Data Loss Prevention - CompTIA Security+ SY0-401: 2.3
00:05:04
ITCOURSES
5 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
If there’s no monitoring of data leakage, then your customer’s private information could find its way out. In this video, you’ll learn some strategies around data loss prevention and how some organizations found customer data exfiltrating their network.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Data Loss and Theft Policies - CompTIA Security+ SY0-401: 2.3
00:02:05
ITCOURSES
3 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Our data is some of the most important assets in our organization. In this video, you’ll learn about the implementation of data loss and data theft policies.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Security Audits - CompTIA Security+ SY0-401: 2.3
00:03:08
ITCOURSES
5 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Nobody likes an audit, but it’s one of the best things you can do to provide a check of your network security. In this video, you’ll learn the importance of an audit and which audit types may be appropriate for your organization.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

User Rights and Permissions - CompTIA Security+ SY0-401: 2.3
00:02:28
ITCOURSES
4 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
How important is the management of user rights and permissions? In this video, you’ll learn which questions you should be asking to provide the best security for your users and your important data.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Incident Management - CompTIA Security+ SY0-401: 2.3
00:03:23
ITCOURSES
5 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
When an incident occurs, there needs to be a clear plan of execution. In this video, you’ll learn how to create an incident management strategy for your organization.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Change Management - CompTIA Security+ SY0-401: 2.3
00:03:22
ITCOURSES
8 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
How do you make a change? In this video, you’ll learn about the challenges and importance of a good change management strategy.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Third-Party Security Compliance - CompTIA Security+ SY0-401: 2.2
00:02:15
ITCOURSES
8 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
The compliance of security policies is an important consideration when working with a third-party. In this video, you’ll learn which security policies may be required and how to resolve issues when working with third-part security.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Security Policy Considerations with Third Parties - CompTIA Security+ SY0-401: 2.2
00:03:48
ITCOURSES
8 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
The process of planning and implementing security policies can provide some significant security advantages in the future. In this video, you’ll learn about third-party security policies and what can happen when third-party security policies are not properly followed.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Data Backups with Third Parties - CompTIA Security+ SY0-401: 2.2
00:03:23
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
All of your data may be well protected in your data center, but what happens to the data on your offsite backups? In this video, you’ll learn about managing data backups with third-parties and what problems you could face if your data backups are not properly handled.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Data Ownership and Unauthorized Data Sharing - CompTIA Security+ SY0-401: 2.2
00:03:07
ITCOURSES
7 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
If you’ve partnered with another organization, there will probably be data that is shared between you and the third-party. In this video, you’ll learn how to manage data between parties and what can happen when shared data is not properly secured.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Risk Awareness with Third Parties - CompTIA Security+ SY0-401: 2.2
00:02:16
ITCOURSES
3 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
How can an organization manage risk when a third-party is involved? In this video, you’ll learn the fundamentals for risk awareness when working with other organizations.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Privacy Considerations and Data Ownership with Third Parties - CompTIA Security+ SY0-401: 2.2
00:03:19
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
When third-parties share data, there should always be a consideration towards privacy and data ownership. In this video, you’ll learn about protecting customer privacy and the disposition of stored data.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Interoperability Agreements - CompTIA Security+ SY0-401: 2.2
00:02:50
ITCOURSES
5 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Before entering into a business arrangement, it’s always good to have a set of agreements that include security considerations. In this video, you’ll learn about interoperability agreements such as service level agreements, business partner agreements, and more.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Security Implications of Social Media - CompTIA Security+ SY0-401: 2.2
00:03:08
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
The use of social media is an important part of marketing an organization, but it can bring a number of security concerns. In this video, you’ll learn about security concerns in social media and you’ll discover how the lack of security on a social media account caused a problem for a major organization.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

On-boarding and Off-boarding Business Partners - CompTIA Security+ SY0-401: 2.2
00:04:21
ITCOURSES
7 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
As you start and end projects with business partners, the security process becomes an important consideration. In this video, you’ll learn about some best-practices around on-boarding and off-boarding business partners.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Recovery Time Objectives - CompTIA Security+ SY0-401: 2.1
00:04:42
ITCOURSES
5 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
There are many considerations when working on the recovery of business resources. In this video, you’ll learn about these important recovery thresholds and how to calculate the amount of uptime and availability.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Risks with Cloud Computing and Virtualization - CompTIA Security+ SY0-401: 2.1
00:06:00
ITCOURSES
9 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Cloud computing and virtualization are powerful new technologies, but they aren’t without their own risk concerns. In this video, you’ll learn about the risks associated with cloud computing and virtualization.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Risk Avoidance - CompTIA Security+ SY0-401: 2.1
00:03:08
ITCOURSES
7 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
There are many ways to widen the gap between yourself and risk. In this video, you’ll learn some different strategies for avoiding risk in your organization.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Vulnerabilities, Threat Vectors, and Probability - CompTIA Security+ SY0-401: 2.1
00:04:27
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
The bad guys are very good at infiltrating our computer systems. In this video, you’ll learn about system vulnerabilities, examples of threat vectors, and how to calculate the probability of a security risk.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Quantitative and Qualitative Risk Assessment - CompTIA Security+ SY0-401: 2.1
00:04:32
ITCOURSES
5 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Risk factors can take many forms. In this video, you’ll learn how to asses both quantitative and qualitative risk factors in your environment.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Calculating Risk - CompTIA Security+ SY0-401: 2.1
00:05:10
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
The calculation of risk can help you make educated business decisions related to your security infrastructure. In this video, you’ll learn how to associate a dollar value to the risks in your organization.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Reducing Risk with Security Policies - CompTIA Security+ SY0-401: 2.1
00:04:11
ITCOURSES
8 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
The backbone of any security strategy is the creation and management of security policies. In this video, you’ll learn why policies are important and which parts of the organization will be involved in the creation of security policies.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

False Positives and False Negatives - CompTIA Security+ SY0-401: 2.1
00:05:10
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
As you build your security strategy, you’ll need to manage the inevitable false positives and false negatives. In this video, you’ll learn about false positives and false negatives and how to handle them in your environment.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Control Types - CompTIA Security+ SY0-401: 2.1
00:03:52
ITCOURSES
4 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
If you’re planning to build a structured security policy, you’ll find the organization of security controls to be a valuable starting point. In this video, you’ll learn about the NIST standards for the organization of security control types.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

VPN Over Open Wireless Networks - CompTIA Security+ SY0-401: 1.5
00:02:46
ITCOURSES
10 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
If you do any work on open wireless networks, you may want to consider using a VPN. In this video, you’ll learn how VPNs are able to secure all of your network traffic over an insecure open wireless networks.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Site Surveys - CompTIA Security+ SY0-401: 1.5
00:03:29
ITCOURSES
7 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Before installing a new wireless network, you’ll probably want to perform a site survey. In this video, you’ll learn why a site survey might be one of the most important parts of your wireless network installation.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Antenna Types - CompTIA Security+ SY0-401: 1.5
00:02:51
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
The type of antenna can make or break a wireless network installation. In this video, you’ll learn about various antenna types and when they might best be used in a wireless network.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Captive Portals - CompTIA Security+ SY0-401: 1.5
00:02:24
ITCOURSES
5 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
One method of controlling network access is through the use of a captive portal. In this video, you’ll learn how administrators use captive portals to increase the security of the network.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Wireless Power and Antenna Placement - CompTIA Security+ SY0-401: 1.5
00:02:19
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Configuring a wireless network requires a combination of power settings, antenna choice, and antenna location. In this video, you’ll learn how power and antenna settings can be used to customize your wireless network installation.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

TKIP and CCMP - CompTIA Security+ SY0-401: 1.5
00:05:17
ITCOURSES
9 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
The TKIP and CCMP protocols have been an important part of our wireless key management and encryption technologies. In this video, you’ll learn how TKIP and CCMP relates to WPA and WPA2 wireless encryption.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

SSID Management - CompTIA Security+ SY0-401: 1.5
00:01:28
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
What’s the name of your wireless network? In this video, you’ll learn how to limit the advertising of your wireless SSID.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

MAC Address Filtering - CompTIA Security+ SY0-401: 1.5
00:01:54
ITCOURSES
5 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
One common method of access control on a wireless network is the use of physical hardware addresses. In this video, you’ll learn how to limit wireless access using MAC addresses.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

EAP, LEAP, and PEAP - CompTIA Security+ SY0-401: 1.5
00:02:00
ITCOURSES
9 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Wireless authentication is handled using one of the EAP family of protocols. In this video, you’ll learn the differences between the EAP, LEAP, and PEAP authentication protocols.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Wireless Encryption - CompTIA Security+ SY0-401: 1.5
00:04:28
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Without encryption, our wireless networks would be relatively useless. In this video, you’ll get an overview of wireless encryption with WEP, WPA, and WPA2.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Protocols and the OSI Model - CompTIA Security+ SY0-401: 1.4
00:06:49
ITCOURSES
5 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
The OSI model is a useful description of data as is flows out of one computing device, across the network, and into another device. In this video, you’ll learn how the real-world maps to the world of the OSI model.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Common Network Ports - CompTIA Security+ SY0-401: 1.4
00:13:07
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
We rely on the TCP and UDP protocols to keep all of our network traffic going to the right place at the right time. In this video, you’ll learn the differences between the two protocols and some of the most popular port numbers in use today.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

NetBIOS - CompTIA Security+ SY0-401: 1.4
00:03:38
ITCOURSES
4 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
The NetBIOS family of protocols has been used for years for many different purposes. In this video, you’ll learn about various forms of NetBIOS and how they are used in today’s technologies.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Storage Area Networking - CompTIA Security+ SY0-401: 1.4
00:06:22
ITCOURSES
10 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
We have more storage than ever in our data centers. In this video, you’ll learn about NAS, SAN, Fibre Channel, and iSCSI storage technologies.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

HTTPS and TLS/SSL - CompTIA Security+ SY0-401: 1.4
00:02:23
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Without encryption, we would not be able to securely use our network connections. In this videos, you’ll learn how your browser encrypts all of the information you send to a web server using HTTPS or TLS/SSL.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

DNS - CompTIA Security+ SY0-401: 1.4
00:02:01
ITCOURSES
9 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
We rely on the DNS protocol for almost everything that we do on our networks. In this video, you’ll get an overview of the domain name services protocol and learn how it is used to convert names to IP addresses.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Transferring Files - CompTIA Security+ SY0-401: 1.4
00:03:15
ITCOURSES
11 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
There’s more than one way to send a file across the network. In this video, you’ll learn which file transfer technologies can be used to send in-the-clear and encrypted information.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Telnet and SSH - CompTIA Security+ SY0-401: 1.4
00:04:55
ITCOURSES
22 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Terminal access to remote devices is an important part of network and security management. In this video, you’ll learn how to use Telnet and SSH to manage your network infrastructure.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

ICMP and SNMP - CompTIA Security+ SY0-401: 1.4
00:04:37
ITCOURSES
7 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Every network and security manager makes extensive use of network management protocols. In this video, you’ll learn how ICMP and SNMP can be used to help manage and protect your network.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

IPsec - CompTIA Security+ SY0-401: 1.4
00:01:39
ITCOURSES
5 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
If you’re concerned about the security of your network connections, then the IPsec protocol suite is for you. In this video, you’ll learn the basics of IPsec technology.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

IPv4 and IPv6 - CompTIA Security+ SY0-401: 1.4
00:05:08
ITCOURSES
16 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
IPv4 and IPv6 are some of the fundamental building-blocks of network communication. In this video, you’ll learn the structure and design of the IPv4 and IPv6 protocols.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Defense in Depth - CompTIA Security+ SY0-401: 1.3
00:03:45
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
One of the fundamental foundations of information security is the concept of defense in depth. In this video, you’ll learn about defense in depth and some of the technologies used to implement defense in depth.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Cloud Computing - CompTIA Security+ SY0-401: 1.3
00:07:01
ITCOURSES
4 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
The term “cloud computing” has many different meanings, depending on the context. In this video, you’ll learn about platforms as a service, software as a service, infrastructure as a service, and the different cloud deployment models.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Virtualization - CompTIA Security+ SY0-401: 1.3
00:02:19
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
The virtualization of the data center is now a standard part of our networks. In this video, you’ll learn about the security concerns that involve virtualization technologies.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Network Access Control - CompTIA Security+ SY0-401: 1.3
00:01:56
ITCOURSES
4 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
An open network jack in a conference room can provide a malicious user with complete access to the internal network. In this video, you’ll learn how network access control (NAC) can be used to help secure network connections.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Telephony - CompTIA Security+ SY0-401: 1.3
00:02:41
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
VoIP and telephony technologies are now integrated into almost all of our networks. In this video, you’ll learn what security concerns exist for telephony-related technologies.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Remote Access - CompTIA Security+ SY0-401: 1.3
00:02:49
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Most of us rely on remote connectivity to enable us to perform our job. In this video, you’ll learn the important security considerations for remote access.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Network Address Translation - CompTIA Security+ SY0-401: 1.3
00:03:46
ITCOURSES
4 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Nearly every Internet-connected organization uses some type of network address translation. In this video, you’ll learn how destination NAT and source NAT is used to provide Internet connectivity and to protect your internal servers from users on the Internet.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

VLANs - CompTIA Security+ SY0-401: 1.3
00:01:53
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Nearly every network requires the administration of virtual LANs, or VLANs. In this video, you’ll learn about VLANs and how they can be used to logically segment and secure your network.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Subnetting the Network - CompTIA Security+ SY0-401: 1.3
00:02:46
ITCOURSES
13 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
One of the key concepts of TCP/IP networks is subnetting. In this video, you’ll learn why we subnet our networks and you’ll see a network design that incorporates separate IP subnets.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

DMZ - CompTIA Security+ SY0-401: 1.3
00:02:20
ITCOURSES
5 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
A common network design is to include a virtual DMZ (demilitarized zone) to separate the Internet from the inside of the network. In this video, you’ll learn how a DMZ is used as a layer of protection and which devices you would commonly find in a DMZ.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Log Analysis - CompTIA Security+ SY0-401: 1.2
00:02:31
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
The event and access logs from network devices can provide a wealth of information. In this video, you’ll learn how post-event analysis and real-time analysis of logs can provide valuable security information.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Network Separation - CompTIA Security+ SY0-401: 1.2
00:02:49
ITCOURSES
5 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
One of the fundamental best practices of network security is to segment the network to prevent access and protect resources. In this video, you’ll learn about network separation and how organizations can use different segmentation strategies in their infrastructure.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Flood Guards - CompTIA Security+ SY0-401: 1.2
00:04:07
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
A relatively easy way to overwhelm network devices is to attack them with a flood of network packets. In this video, you’ll learn about some of the more popular methods of flooding a network and how to help prevent these denial of service attacks.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Port Security and 802.1X - CompTIA Security+ SY0-401: 1.2
00:05:34
ITCOURSES
4 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
If you need to secure a physical network port, then you’ll want to consider some type of network access control (NAC). In this video, you’ll get an overview of port security and I’ll show you a step-by-step of 802.1X in operation.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Access Control Lists - CompTIA Security+ SY0-401: 1.2
00:01:56
ITCOURSES
5 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Access control lists are used in almost every security device on your network. In this video, you’ll learn how ACLs are used to provide secure access to your important resources.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Secure Router Configuration - CompTIA Security+ SY0-401: 1.2
00:02:36
ITCOURSES
7 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
A router is one of the most important devices in your network. In this video, you’ll learn how to securely connect and manage your routers and other infrastructure devices.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Spanning Tree Protocol and Loop Protection - CompTIA Security+ SY0-401: 1.2
00:04:48
ITCOURSES
12 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Spanning Tree Protocol (STP) is an important standard that provides a mechanism for switched networks to avoid outages due to network loops. In this video, you’ll learn how loops can cause network issues and I’ll demonstrate what happens when Spanning Tree constantly adjusts to avoid network loops.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

VLAN Management - CompTIA Security+ SY0-401: 1.2
00:03:43
ITCOURSES
5 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
VLANs are an essential part of nearly every enterprise network. In this video, you’ll how VLANs work and how VLANs are used to segment and organize our networks.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Firewall Rules - CompTIA Security+ SY0-401: 1.2
00:07:54
ITCOURSES
5 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
How does a firewall know which traffic is good, and which traffic is bad? In this video, you’ll learn about the fundamentals of firewall rules and you’ll step through an actual firewall rule set.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Web Application Firewalls - CompTIA Security+ SY0-401: 1.1
00:03:03
ITCOURSES
8 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Firewalls now examine port numbers and applications as they traverse the network, but what’s protecting our servers from malicious user input? In this video, you’ll learn how a web application firewall (WAF) can protect from attacks that take advantage of unexpected application use.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Spam Filters - CompTIA Security+ SY0-401: 1.1
00:04:27
ITCOURSES
9 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Few things are more frustrating than having to sort through an email inbox that’s full of unsolicited email. In this video, you’ll learn about spam filters and some common methods used to separate the legitimate email from the spam.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Protocol Analyzers - CompTIA Security+ SY0-401: 1.1
00:01:38
ITCOURSES
7 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
If you ever want to know exactly what’s happening on a network, then you need a protocol analyzer. In this video, you’ll learn about protocol analyzers and how they can be used to monitor traffic and solve network problems.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Network Intrusion Detection and Prevention - CompTIA Security+ SY0-401: 1.1
00:05:30
ITCOURSES
5 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
DS and IPS technology can watch for a wide variety of attacks by examining the traffic as it passes through the network in real-time. In this video, you’ll learn about IDS/IPS technology and the identification technologies that they use.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Application-Aware Security Devices - CompTIA Security+ SY0-401: 1.1
00:03:04
ITCOURSES
8 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Today’s modern security devices not only must understand the network, but they must also be fluent in the language of our applications. In this video, you’ll learn about security devices that can protect your network by watching application flows.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

VPN Concentrators - CompTIA Security+ SY0-401: 1.1
00:02:05
ITCOURSES
4 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
We’re an increasingly mobile workforce, so we therefore need technologies to keep us secure while we travel. In this video, you’ll learn how VPN concentrators can be used to provide encrypted tunnels from our favorite coffee shop to our corporate network.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Web Security Gateways and UTMs - CompTIA Security+ SY0-401: 1.1
00:02:34
ITCOURSES
6 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
As technology as improved, we’ve added more and more functionality to our security gateways. In this video, you’ll learn about unified threat management appliances and the functionality they bring to securing our network resources.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Load Balancers and Proxies - CompTIA Security+ SY0-401: 1.1
00:05:51
ITCOURSES
4 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
If you need to expand the capacity of your applications and network resources, you'll need to use technologies like load balancers and proxies. In this video, you'll learn how load balancers and proxies can be used to increase the scale of your network capacities.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Routers, Firewalls, and Switches - CompTIA Security+ SY0-401: 1.1
00:07:45
ITCOURSES
2 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq

- - - - -
The fundamental technologies in almost every network are switches, routers, and firewalls. In this video, you'll learn how these devices are used to connect and protect our network devices.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Introduction to CompTIA SY0-401 Security+ Certification
00:11:22
ITCOURSES
7 Views · 4 years ago

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
CompTIA's Security+ is a popular IT certification, and the certification topics range from networking to cryptography. In this video, I'll give you an overview of the Security+ certification and I'll give you some tips to help with your exam testing experience.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt

Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/

FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Cisco CCIE RS Core Concepts - MPLS Labels
00:08:10
ITCOURSES
9 Views · 4 years ago

Here is a sample Nugget from the CCIE RS Core Concepts course on VPN Technologies. Here we examine the MPLS label and the MPLS label stack under a microscope. You can find the full course here:
https://www.cbtnuggets.com/it-....training/cisco-ccie-
Remember, the Core Concepts classes at CBT Nuggets for CCIE are just that - they are designed to give you the foundational core you need in order to really begin honing your skills for the Written and Lab exams.

Cisco CCIE Core Concepts - BGP Well-Known Mandatory Attributes
00:07:17
ITCOURSES
9 Views · 4 years ago

Over at CBT Nuggets, several of the CCIE instructors polished up our CCIE-level videos to make sure we are efficiently teaching you the Core Concepts you must master en route to your CCIE Certification. This sample Nugget is from the Layer 3 course found here:
https://www.cbtnuggets.com/it-....training/cisco-ccie-
This is one of the many Nuggets on Border Gateway Protocol (BGP) which I personally found to be a big challenge as I was working to my expert-level certification. Enjoy!

CCIE RS Jan 29 L2Sec VLANhopping
00:55:24
ITCOURSES
17 Views · 4 years ago

for Deployment and training write to - professoraaronjc@gmail.com

LINX103: ARTEMIS: Neutralizing BGP Hijacking within a Minute (Vasileios Kotronis)
00:17:52
ITCOURSES
23 Views · 4 years ago

ARTEMIS (Automatic and Real-Time dEtection and MItigation System), is a research effort between the INSPIRE group, FORTH, Greece (www.inspire.edu.gr) and the Center for Applied Internet Data Analysis (CAIDA), University of California San Diego, USA (www.caida.org). It is a defense approach versus BGP prefix hijacking attacks (a) based on accurate and fast detection operated by the AS itself, leveraging the pervasiveness of publicly available BGP monitoring services and their recent shift towards real-time streaming (e.g., RIPE RIS streaming service), thus (b) enabling flexible and fast mitigation of hijacking events. Compared to existing approaches/tools, ARTEMIS combines characteristics desirable to network operators such as comprehensiveness, accuracy, speed, privacy, and flexibility. Our experiments in the real Internet have shown that with the ARTEMIS approach, prefix hijacking can be neutralized (i.e., detected & mitigated) within a minute.

As a software-based tool, ARTEMIS has been selected as one of the seven funded RIPE NCC Community Projects of 2017 (https://www.ripe.net/support/c....pf/funding-recipient The goal of the project is to build a tool for BGP prefix hijacking detection and mitigation, which will benefit the technical community of network operators.

CCIE Security v5 Technologies: DMVPN
00:04:10
ITCOURSES
13 Views · 4 years ago

This course is a part of our CCIE Security v5 Technology series. It consists of
multiple modules focused on many different aspects of the Dynamic Multipoint VPN
(DMVPN) technology, such as routing, redundancy and configuration.

Author: Piotr Kaluzny

Sign up for an All Access Pass to view the entire course!

https://ine.com/pages/all-access-pass

https://streaming.ine.com/c/ine-ccie-scv5-dmvpn

Multicast Troubleshooting Quickie #1
00:11:23
ITCOURSES
10 Views · 4 years ago

Symptom: ONLY 2 multicast streams (232.2.1.1 and 239.2.1.1) are getting thru to the hosts who requested them. The other 4 streams the same hosts requested are NOT getting thru.

Start of Video - 2:30: The Facts and the Symptom
Fact #1 - Host off of Cat9K-40 is sending IGMPv2 membership reports to join ASM groups 239.1.1.1, 239.2.1.1 and 239.129.1.1
Fact #2 - Host off of Cat9K-50 is sending IGMPv3 membership reports to join SSM groups 232.1.1.1, 232.2.1.1 and 232.129.1.1
Fact #3 - All multicast sources are off of Cat9k-10 in subnet 10.1.2.0/24. They are sending the mcast for all 3 SSM groups and all 3 ASM groups
Fact #4 - Cat9K-20 is the Rendezvous Point (RP) for all 3 ASM groups
SYMPTOM: The receivers are NOT receiving all the multicast streams they are requesting to receive. Only 232.2.1.1 and 239.2.1.1 are getting received by their respective receivers.

2:31-4:40: Overview of How I Plan on Troubleshooting This PLUS What I will Find

4:41 til End: Off to the CLI and playing Network Detective. :)

Chellenge: BGP false Origin
00:24:08
ITCOURSES
11 Views · 4 years ago

Solution configs: https://showipintbri.blogspot.....com/2018/05/challeng

This was a challenge I was introduced by a friend on @theLANtamer's Discord server. It was originally from the Great Vinit Jain's Cisco Live presentation:
(https://www.ciscolive.com/glob....al/on-demand-library

If anyone has another way to solve this please let me know.

day 163 - twitch vs youtube, F5 patches. VSS, CEF, and 80 days to go!
00:19:57
ITCOURSES
12 Views · 4 years ago

:: VLOG TOPICS ::
- Twitch vs Youtube
Tyler Blevins
Casey Neistat
streaming vs on-demand
competition
attention spans
streaming on youtube
streaming IT

- F5 and spectre/meltdown

- Recent topics: VSS, CEF
running low on video content
new questions videos

:: MEAT CHUNKS (links OTD) ::
Tyler (Ninja) Blevins' interview:
https://youtu.be/aXuM-LpVD50

Casey Neistat's tweet:
https://twitter.com/CaseyNeist....at/status/9757807311

F5 releases upgrade to address Spectre and Meltdown:
https://support.f5.com/csp/article/K91229003

Building your personal brand:
https://www.ccieby30.com/singl....e-post/2018/03/21/Bu

Another @showipintbri challenge:
https://youtu.be/Ls118KFUG-I

:: SOCIAL MEDIA ::
TWITCH - https://www.twitch.tv/thelantamer
DISCORD - https://discord.gg/BBSGPYH
YOUTUBE - https://www.youtube.com/thelantamer
TWITTER - https://twitter.com/thelantamer
INSTAGRAM - https://www.instagram.com/thelantamer/
FACEBOOK - https://www.facebook.com/lantamer/

:: LAB LINKS ::
Google Drive share - http://bit.ly/2AbJQhp
INE Diagrams - http://bit.ly/2mgTGso
INE VIRL files on Github - http://bit.ly/2ht78YH

day 160 - eve-ng pro, my sleep app, 87 days to go!
00:12:52
ITCOURSES
7 Views · 4 years ago

:: VLOG TOPICS ::
- sleep app
itunes apps gone
- new discord channel for bootcamps
- My progress: QoS, UDP flooding
- eve-ng

:: MEAT CHUNKS (links OTD) ::
Eve-ng Pro version released:
http://www.eve-ng.net

Sleep cycle app:
https://www.sleepcycle.com/how-it-works/

:: SOCIAL MEDIA ::
TWITCH - https://www.twitch.tv/thelantamer
DISCORD - https://discord.gg/BBSGPYH
YOUTUBE - https://www.youtube.com/thelantamer
TWITTER - https://twitter.com/thelantamer
INSTAGRAM - https://www.instagram.com/thelantamer/
FACEBOOK - https://www.facebook.com/lantamer/

:: LAB LINKS ::
Google Drive share - http://bit.ly/2AbJQhp
INE Diagrams - http://bit.ly/2mgTGso
INE VIRL files on Github - http://bit.ly/2ht78YH

Cisco VIRL 1.5 upgrade and caveats
02:16:46
ITCOURSES
7 Views · 4 years ago

:: MEAT CHUNKS (links OTD) ::
1.5 release notes:
https://learningnetwork.cisco.com/docs/DOC-34340

When you need support for VIRL PE:
https://learningnetwork.cisco.com/groups/virl

1.5 install help site (release notes link is broken):
http://get.virl.info/

Dmitry Figol's networking programmability stream and blog about streaming:
https://twitch.tv/dmfigol
https://dmfigol.me/blog/live-s....treaming-on-twitch-f

:: VLOG TOPICS ::
- VIRL 1.5 release notes review

much of this release is about installing the product
in-place not supported with 1.2.83 or earlier
versions earlier than 1.3.296 no longer supported
ignore online training material link http://getvirl.cisco.com, goes nowhere as of this stream
uwm - cleanup and validations for some entries
uwm - some configurations removed (eth0 cannot be changed without a re-install)
- confusing here, because says some primary network int changes can be done with virl_setup
uwm - new tabs in system configuration
uwmadmin user changes, some changes restricted to this account
bugfixes (includes spectre and meltdown)
salt master update
system scaling
by default memory factor of 2
by default CPU factor of 3
images 'heavier' than IOSv impact capacity
protocols running impact node limit
staggered launches (CPU starvation handling)
staggered launch instructions
caveats
multiple project simulations simultaneously (1.3)
ntp for some time zones (east of GMT)
ntp - killing the process when sync fails
extracting configurations using safari (recommend firefox or chrome)
several live visualization known caveats
other issues with IE (firefox or chrome)
issues making multiple system/config/update changes simultaneously
upgrade packages individually
OSX users - configure scroll bars to 'always show' in System preferences / General
OSX VM Maestro install caveat (Sierra)
CPU-HOG message is cosmetic and can be ignored

EXCERPT for NTP issues:
NTP does not sync under certain circumstances. If this happens, please open a new thread on the VIRL CLN Community Forum.

Workaround: Restart NTPd using sudo systemctl restart ntp, check with ntpq -p.
Sometimes, it was sometimes necessary to kill the nptd process manually:

sudo systemctl stop
ntp killall ntpd
sudo systemctl start

- VIRL 1.5 in-place upgrade

- VM Maestro upgrade


VALIDATION checklist:
- images are upgraded
- load a simulation via UWM
- close and load a new simulation via VM Maestro

FOLLOWUP ISSUE:
- load time for vm maestro

day 154 - IS-IS, evolving technologies, 8 days
00:11:39
ITCOURSES
8 Views · 4 years ago

:: MEAT CHUNKS (links OTD) ::
Nick Russo's Evolving Technologies Guide:
https://learningnetwork.cisco.com/docs/DOC-31004

:: VLOG TOPICS ::
- Virl 1.5 update???
- Video topics covered (IPv6 and BGP, MPLS VPNV6, IS-IS)
- Evolving technologies (IoT, SDN, ACI, etc. etc.)

:: SOCIAL MEDIA ::
TWITCH - https://www.twitch.tv/thelantamer
DISCORD - https://discord.gg/BBSGPYH
YOUTUBE - https://www.youtube.com/thelantamer
TWITTER - https://twitter.com/thelantamer
INSTAGRAM - https://www.instagram.com/thelantamer/
FACEBOOK - https://www.facebook.com/lantamer/

:: LAB LINKS ::
Google Drive share - http://bit.ly/2AbJQhp
INE Diagrams - http://bit.ly/2mgTGso
INE VIRL files on Github - http://bit.ly/2ht78YH

day 153 - written scheduled! [choppy first 30 seconds]
00:06:21
ITCOURSES
4 Views · 4 years ago

[something happened with OBS, sorry but it's just first 30 seconds or so that is choppy]

:: MEAT CHUNKS (links OTD) ::
None - been too busy for links!

:: VLOG TOPICS ::
- family project major phase done ( for now )
- SCRUM training
- Agile, net ops, working in azure
- Virl 1.5 update tomorrow
- Registered for Cisco Live
- Written exam scheduled

:: SOCIAL MEDIA ::
TWITCH - https://www.twitch.tv/thelantamer
DISCORD - https://discord.gg/BBSGPYH
YOUTUBE - https://www.youtube.com/thelantamer
TWITTER - https://twitter.com/thelantamer
INSTAGRAM - https://www.instagram.com/thelantamer/
FACEBOOK - https://www.facebook.com/lantamer/

:: LAB LINKS ::
Google Drive share - http://bit.ly/2AbJQhp
INE Diagrams - http://bit.ly/2mgTGso
INE VIRL files on Github - http://bit.ly/2ht78YH

The Case of the Flapping BGP Routes
00:14:52
ITCOURSES
7 Views · 4 years ago

The Case of the Flapping BGP Routes: A Network Detective Ride-Along

Let's go on a Network Detective Ride-Along together!  :)   YouTube Style!   Case open to case closed in less than 15 minutes.  You ride along! 

Below you will find the link to the troubleshooting ride-along as well as 3 very helpful reference blogs on using the BGP table version to help you solve the crime!  

Understanding the BGP Table Version – Part 1: Introduction to BGP Table Version
https://www.networkingwithfish.....com/understanding-t

Cyber Security Basics: Social Engineering w/ Phishing Demo
00:06:30
ITCOURSES
7 Views · 4 years ago

Cyber Security Basics: Social Engineering w/ Phishing Demo
Get FREE Network Programmability Training:
http://kwtrain.com/sdn
=====================================================

=====================================================
This video is the first in a series of Cyber Security Basics videos. In the video, our resident Cyber Security expert, Charles Judd demonstrates how staggeringly easy it is to obtain someone's login credentials by launching a phishing attack.
=====================================================

=====================================================
Don't miss a single one of Kevin's YouTube videos. Subscribe here:
http://youtube.com/subscriptio....n_center?add_user=kw
=====================================================

=====================================================
Kevin Wallace, CCIEx2 #7945 (Collaboration and R&S), CCSI #20061
Homepage: http://kwtrain.com
Twitter: http://twitter.com/kwallaceccie
Facebook: http://facebook.com/kwallaceccie
YouTube: http://youtube.com/user/kwallaceccie
LinkedIn: http://linkedin.com/in/kwallaceccie
Google+: http://google.com/+KevinWallace
=====================================================

=====================================================
Get Kevin's Free e-Book "Your Route to Cisco Career Success"
http://kwtrain.com/success
=====================================================

=====================================================
If you enjoyed this video, here is the video title and also the link for you to share:
Cyber Security Basics: Social Engineering w/ Phishing Demo
https://www.youtube.com/watch?v=_IuPjLAo62w
=====================================================

day 151 - spanning-tree root port review mini-lab
01:25:44
ITCOURSES
11 Views · 4 years ago

:: MEAT CHUNKS (links OTD) ::
Network collective: Tools for network engineers:
https://vimeo.com/254681671

:: VLOG TOPICS ::
IPv6
Spanning-tree root port selection

:: SOCIAL MEDIA ::
TWITCH - https://www.twitch.tv/thelantamer
DISCORD - https://discord.gg/BBSGPYH
YOUTUBE - https://www.youtube.com/thelantamer
TWITTER - https://twitter.com/thelantamer
INSTAGRAM - https://www.instagram.com/thelantamer/
FACEBOOK - https://www.facebook.com/lantamer/

:: LAB LINKS ::
Google Drive share - http://bit.ly/2AbJQhp
INE Diagrams - http://bit.ly/2mgTGso
INE VIRL files on Github - http://bit.ly/2ht78YH

day 150 - launching EIGRP packets into ...
00:54:46
ITCOURSES
20 Views · 4 years ago

:: MEAT CHUNKS (links OTD) ::
Falcon Heavy launch:
https://youtu.be/wbSwFU6tY1c

:: VLOG TOPICS ::
Whiskey shot for space exploration!
Cloud automation
Progress IPv6
EIGRP issue from BOSON

:: SOCIAL MEDIA ::
TWITCH - https://www.twitch.tv/thelantamer
DISCORD - https://discord.gg/BBSGPYH
YOUTUBE - https://www.youtube.com/thelantamer
TWITTER - https://twitter.com/thelantamer
INSTAGRAM - https://www.instagram.com/thelantamer/
FACEBOOK - https://www.facebook.com/lantamer/

:: LAB LINKS ::
Google Drive share - http://bit.ly/2AbJQhp
INE Diagrams - http://bit.ly/2mgTGso
INE VIRL files on Github - http://bit.ly/2ht78YH

day 149 - learning by skimming??
00:11:07
ITCOURSES
11 Views · 4 years ago

:: MEAT CHUNKS (links OTD) ::
CCIE collab update, 1.0 to 2.0
https://learningnetwork.cisco.....com/community/certif


:: VLOG TOPICS ::
Skimming through topics
- IPv6 (DHCP, routing)

Video inventory
- catching up
- written vs advanced technology

Focus, time constraints
- entertainment
- news
- social media
- family time
- work
- vlogging/streaming

SCRUM

day 148 - written blueprint checklist plan
00:16:09
ITCOURSES
6 Views · 4 years ago

:: VLOG TOPICS ::
Update on written plan, blueprint

:: MEAT CHUNKS (links OTD) ::
Written blueprint
http://bit.ly/2nEQJPW

Neckercube's flash cards:
https://neckercube.com/index.p....hp/2018/01/31/ccie-f

::WHIP CRACKING (labs)::

:: SOCIAL MEDIA ::
TWITCH - https://www.twitch.tv/thelantamer
DISCORD - https://discord.gg/BBSGPYH
YOUTUBE - https://www.youtube.com/thelantamer
TWITTER - https://twitter.com/thelantamer
INSTAGRAM - https://www.instagram.com/thelantamer/
FACEBOOK - https://www.facebook.com/lantamer/

:: LAB LINKS ::
Google Drive share - http://bit.ly/2AbJQhp
INE Diagrams - http://bit.ly/2mgTGso
INE VIRL files on Github - http://bit.ly/2ht78YH

day 147 - so about that written exam prep ...
00:18:26
ITCOURSES
4 Views · 4 years ago

:: VLOG TOPICS ::
Flash cards!
Planning for the written

:: MEAT CHUNKS (links OTD) ::
Neckercube's flash cards:
https://neckercube.com/index.p....hp/2018/01/31/ccie-f

Another networking vlogger!:
https://youtu.be/Yltan4ON_j8

day 146 - cisco doc rant, multicast PIM register lab
01:30:32
ITCOURSES
7 Views · 4 years ago

:: VLOG TOPICS ::
Support menu gone!
Cisco Live goodness, DS passed written!

:: MEAT CHUNKS (links OTD) ::
Critical Cisco ASA/Anyconnect vulnerability:
https://tools.cisco.com/securi....ty/center/content/Ci

::WHIP CRACKING (labs)::
Multicast PIM Accept Register

::RFCs::
https://tools.ietf.org/html/dr....aft-ietf-pim-sm-v2-n

:: SOCIAL MEDIA ::
TWITCH - https://www.twitch.tv/thelantamer
DISCORD - https://discord.gg/BBSGPYH
YOUTUBE - https://www.youtube.com/thelantamer
TWITTER - https://twitter.com/thelantamer
INSTAGRAM - https://www.instagram.com/thelantamer/
FACEBOOK - https://www.facebook.com/lantamer/

:: LAB LINKS ::
Google Drive share - http://bit.ly/2AbJQhp
INE Diagrams - http://bit.ly/2mgTGso
INE VIRL files on Github - http://bit.ly/2ht78YH

day 145 - support menu gone! Multicast PIM accept-RP
01:04:39
ITCOURSES
12 Views · 4 years ago

:: VLOG TOPICS ::
Support menu gone!
Back to the workbook

:: MEAT CHUNKS (links OTD) ::
Public PCAP files:
http://www.netresec.com/?page=PcapFiles

Narbik's online zero-to-hero course:
https://www.linkedin.com/feed/....update/urn:li:activi

::WHIP CRACKING (labs)::
Multicast PIM accept-RP

::RFCs::
https://tools.ietf.org/html/dr....aft-ietf-pim-sm-v2-n

:: SOCIAL MEDIA ::
TWITCH - https://www.twitch.tv/thelantamer
DISCORD - https://discord.gg/BBSGPYH
YOUTUBE - https://www.youtube.com/thelantamer
TWITTER - https://twitter.com/thelantamer
INSTAGRAM - https://www.instagram.com/thelantamer/
FACEBOOK - https://www.facebook.com/lantamer/

:: LAB LINKS ::
Google Drive share - http://bit.ly/2AbJQhp
INE Diagrams - http://bit.ly/2mgTGso
INE VIRL files on Github - http://bit.ly/2ht78YH

day 144 - IGMP GhostBusters
01:15:56
ITCOURSES
10 Views · 4 years ago

:: VLOG TOPICS ::
Building my own Multicast lab to figure out IGMP

:: MEAT CHUNKS (links OTD) ::

::WHIP CRACKING (labs)::
IGMP packet tracing

::RFCs::
https://tools.ietf.org/html/dr....aft-ietf-pim-sm-v2-n

:: SOCIAL MEDIA ::
TWITCH - https://www.twitch.tv/thelantamer
DISCORD - https://discord.gg/BBSGPYH
YOUTUBE - https://www.youtube.com/thelantamer
TWITTER - https://twitter.com/thelantamer
INSTAGRAM - https://www.instagram.com/thelantamer/
FACEBOOK - https://www.facebook.com/lantamer/

:: LAB LINKS ::
Google Drive share - http://bit.ly/2AbJQhp
INE Diagrams - http://bit.ly/2mgTGso
INE VIRL files on Github - http://bit.ly/2ht78YH

day 144 - multicast PIM assert, accept RP
01:47:16
ITCOURSES
7 Views · 4 years ago

:: MEAT CHUNKS (links OTD) ::
PIM DR vs PIM ASSERT:
https://routingnull0.com/2014/....03/13/hour-375-multi

::WHIP CRACKING (labs)::
PIM Assert review
PIM Accept RP

::RFCs::
https://tools.ietf.org/html/dr....aft-ietf-pim-sm-v2-n

:: SOCIAL MEDIA ::
TWITCH - https://www.twitch.tv/thelantamer
DISCORD - https://discord.gg/BBSGPYH
YOUTUBE - https://www.youtube.com/thelantamer
TWITTER - https://twitter.com/thelantamer
INSTAGRAM - https://www.instagram.com/thelantamer/
FACEBOOK - https://www.facebook.com/lantamer/

:: LAB LINKS ::
Google Drive share - http://bit.ly/2AbJQhp
INE Diagrams - http://bit.ly/2mgTGso
INE VIRL files on Github - http://bit.ly/2ht78YH

day 144 - go-to book for Multicast, PIM dense sparse mode
02:03:56
ITCOURSES
7 Views · 4 years ago

:: VLOG TOPICS ::
Cisco Live Barcelona!
Update on learning multicast

:: MEAT CHUNKS (links OTD) ::
Updated books listing in GDrive share:
http://bit.ly/2niITLC

Cisco Live multicast troubleshooting presentation:
https://www.ciscolive.com/glob....al/on-demand-library

Dmitry's twitter for Cisco Live Barcelona updates:
@dmfigol

::WHIP CRACKING (labs)::
PIM Dense Sparse mode

::RFCs::
https://tools.ietf.org/html/dr....aft-ietf-pim-sm-v2-n

:: SOCIAL MEDIA ::
TWITCH - https://www.twitch.tv/thelantamer
DISCORD - https://discord.gg/BBSGPYH
YOUTUBE - https://www.youtube.com/thelantamer
TWITTER - https://twitter.com/thelantamer
INSTAGRAM - https://www.instagram.com/thelantamer/
FACEBOOK - https://www.facebook.com/lantamer/

:: LAB LINKS ::
Google Drive share - http://bit.ly/2AbJQhp
INE Diagrams - http://bit.ly/2mgTGso
INE VIRL files on Github - http://bit.ly/2ht78YH

day 143 - CCNP expiring and that's OK, Multicast PIM sparse mode
01:49:52
ITCOURSES
6 Views · 4 years ago

:: VLOG TOPICS ::
CCNP expiring in 4 days
Audio in last stream
Multicasting with fish

:: MEAT CHUNKS (links OTD) ::
Denise Fishburne's multicast VOD from Cisco Live:
https://www.ciscolive.com/glob....al/on-demand-library

MPLS and iBGP PE-CE peerings (thanks Tony E):
https://tgregory.org/tag/bgp-l3vpn/

::WHIP CRACKING (labs)::
PIM Dense mode
PIM Sparse mode

:: SOCIAL MEDIA ::
TWITCH - https://www.twitch.tv/thelantamer
DISCORD - https://discord.gg/BBSGPYH
YOUTUBE - https://www.youtube.com/thelantamer
TWITTER - https://twitter.com/thelantamer
INSTAGRAM - https://www.instagram.com/thelantamer/
FACEBOOK - https://www.facebook.com/lantamer/

:: LAB LINKS ::
Google docs share - http://bit.ly/2AbJQhp
INE Diagrams - http://bit.ly/2mgTGso
INE VIRL files on Github - http://bit.ly/2ht78YH

day 142 - homegrown convergence lab, cont'd
02:14:12
ITCOURSES
5 Views · 4 years ago

:: VLOG TOPICS ::
Twitch dashboard
Convergence optimizations

::WHIP CRACKING (labs)::
BYOL (Bring Your Own Lab) - convergence optimization

:: SOCIAL MEDIA ::
TWITCH - https://www.twitch.tv/thelantamer
DISCORD - https://discord.gg/BBSGPYH
YOUTUBE - https://www.youtube.com/thelantamer
TWITTER - https://twitter.com/thelantamer
INSTAGRAM - https://www.instagram.com/thelantamer/
FACEBOOK - https://www.facebook.com/lantamer/

:: LAB LINKS ::
Google docs share - http://bit.ly/2AbJQhp
INE Diagrams - http://bit.ly/2mgTGso
INE VIRL files on Github - http://bit.ly/2ht78YH

day 141 - BGP and EIGRP convergence optimizations playground
02:09:18
ITCOURSES
12 Views · 4 years ago

:: VLOG TOPICS ::
Stream updates
DMVPN wrap-up
- 5 hour lab
- Front-door VRF (FVRF)
separates underlay and overlay routing
spokes only need a default route to underlay in vrf
Convergence optimizations

:: MEAT CHUNKS (links OTD) ::
Delan's CCIE VLOG 10 (Love to see content from fellow vloggers!):
https://youtu.be/L1rxXdUZpk4

::WHIP CRACKING (labs)::
BYOL (Bring Your Own Lab) - convergence optimization

:: SOCIAL MEDIA ::
TWITCH - https://www.twitch.tv/thelantamer
DISCORD - https://discord.gg/BBSGPYH
YOUTUBE - https://www.youtube.com/thelantamer
TWITTER - https://twitter.com/thelantamer
INSTAGRAM - https://www.instagram.com/thelantamer/
FACEBOOK - https://www.facebook.com/lantamer/

:: LAB LINKS ::
Google docs share - http://bit.ly/2AbJQhp
INE Diagrams - http://bit.ly/2mgTGso
INE VIRL files on Github - http://bit.ly/2ht78YH

day 140 - VRF-aware DMVPNs, part 2, configuration
03:53:06
ITCOURSES
12 Views · 4 years ago

:: MEAT CHUNKS (links OTD) ::
Cisco IPSec Overhead Calculator tool:
https://cway.cisco.com/tools/ipsec-overhead-calc/

::WHIP CRACKING (labs)::
VRF-aware DMVPN

:: RFCs ::
2332 (NHRP) - https://tools.ietf.org/html/rfc2332

:: SOCIAL MEDIA ::
TWITCH - https://www.twitch.tv/thelantamer
DISCORD - https://discord.gg/BBSGPYH
TWITTER - https://twitter.com/thelantamer
INSTAGRAM - https://www.instagram.com/thelantamer/
FACEBOOK - https://www.facebook.com/lantamer/

:: LAB LINKS ::
Google docs share - http://bit.ly/2AbJQhp
INE Diagrams - http://bit.ly/2mgTGso
INE VIRL files on Github - http://bit.ly/2ht78YH

day 140 - tried to take shortcuts and paid the price, plus VRF-aware DMVPN part 1
00:59:29
ITCOURSES
6 Views · 4 years ago

:: VLOG TOPICS ::
No shortcuts in CCIE
Convergence videos
DMVPN

:: MEAT CHUNKS (links OTD) ::
Another Narbik seminar coming soon!
https://learningnetwork.cisco.....com/community/learni

Packetlife DMVPN over VRFs:
http://packetlife.net/blog/201....2/jan/9/multiple-dmv

CCIEby30's discovery protocols blog:
https://www.ccieby30.com/singl....e-post/2018/01/18/Ci

::WHIP CRACKING (labs)::
VRF-aware DMVPN

:: RFCs ::
2332 (NHRP) - https://tools.ietf.org/html/rfc2332

:: SOCIAL MEDIA ::
TWITCH - https://www.twitch.tv/thelantamer
DISCORD - https://discord.gg/BBSGPYH
TWITTER - https://twitter.com/thelantamer
INSTAGRAM - https://www.instagram.com/thelantamer/
FACEBOOK - https://www.facebook.com/lantamer/

:: LAB LINKS ::
Google docs share - http://bit.ly/2AbJQhp
INE Diagrams - http://bit.ly/2mgTGso
INE VIRL files on Github - http://bit.ly/2ht78YH

day 139 - DMVPN phases: I get it now (I think)
01:13:28
ITCOURSES
11 Views · 4 years ago

:: VLOG TOPICS ::
About them meat chunks ...
DMVPN resources

:: MEAT CHUNKS (links OTD) ::
Repeat appearance, DMVPN explained from CLN blog:
https://learningnetwork.cisco.....com/blogs/vip-perspe

Useful mnemonics:
https://networkphil.com/2018/0....1/16/helpful-mnemoni

Neckercube's CCIE lab study program:
https://neckercube.com/index.p....hp/2018/01/17/retros

::WHIP CRACKING (labs)::
DMVPN phase 1 with EIGRP
DMVPN phase 2 with EIGRP

:: RFCs ::
2332 (NHRP) - https://tools.ietf.org/html/rfc2332

:: SOCIAL MEDIA ::
TWITCH - https://www.twitch.tv/thelantamer
DISCORD - https://discord.gg/BBSGPYH
TWITTER - https://twitter.com/thelantamer
INSTAGRAM - https://www.instagram.com/thelantamer/
FACEBOOK - https://www.facebook.com/lantamer/

:: LAB LINKS ::
Google docs share - http://bit.ly/2AbJQhp
INE Diagrams - http://bit.ly/2mgTGso
INE VIRL files on Github - http://bit.ly/2ht78YH

day 138 - benefits of CCIE study without the number: DMVPN phases
01:46:51
ITCOURSES
9 Views · 4 years ago

[ originally streamed live on twitch.tv/thelantamer]

:: VLOG TOPICS ::
Benefits of CCIE study without the number
I need a DMVPN phase chart

:: MEAT CHUNKS (links OTD) ::
Delan Ajero's VLOG: