The security of the devices on our network must be managed through both physical and technological means. In this video, you’ll learn the importance of good physical security, methods to restrict local and remote access to our devices, and the applications and protocols that you can use to build a more secure networking environment.
<< Previous Video: User AuthenticationNext: Common Security Threats >>
Ha! Burns fat while you sleep!…You got some great intro’s Professor…