Troubleshooting Security Systems
Security systems are fantastic things, until they suddenly stop working. In this video, we’ll discuss some troubleshooting techniques for BIOS security, firewall issues, wireless clients, and encryption.
Security systems are fantastic things, until they suddenly stop working. In this video, we’ll discuss some troubleshooting techniques for BIOS security, firewall issues, wireless clients, and encryption.
The practical implementation of security system impacts a wide range of systems, technologies, and processes. In this video, you’ll learn how to secure your BIOS, use smart cards, audit your system through event logs, and how NTFS can make your system more secure.
What are the most important aspects to remember for securing your organization’s important data? In this video, we’ll show you some useful best practices for securing data through such methods as access controls, event logging, encryption, password management, and incident reporting.
A wireless network provides excellent mobility, but it also creates a number of security concerns. In this video, we’ll discuss wireless encryption types and aspects of access point security that include MAC filtering, SSID management, IP addressing, and firmware.
Data security is the responsibility of everyone in the organization. In this module, we’ll examine some of the basic fundamentals of security such as authentication technologies, file system security, and social engineering.
Managing network, application, and system security is rapidly expanding to all parts of the organization. In this chapter, you’ll learn how security requirements are addressed by CompTIA A+ certified professionals.
Professor Messer’s Free CompTIA A+ Certification Training Course – Security Read More »
When the network isn’t working, the organization isn’t working. In this video, we’ll show you some command line utilities that can help you find any problems that might be lurking in your network. We’ll demonstrate IPCONFIG, NSLOOKUP, PING, TRACERT, PATHPING, NBTSTAT, and NETSTAT. We’ll also give you some best practices for troubleshooting network interfaces, protocols, and firewalls.
To make the most of a network connection, you’ll need to know how to share files, configure network printers, and setup browser configurations. In this video, we’ll show you how to take advantage of these network resources and how to use Windows services to help manage your network resources.
Before you can use a network, you first need to install and configure the network adapter’s hardware settings, protocols, and client options. In this video, we’ll demonstrate how to setup a wired and wireless adapter in Windows XP and how the protocols and network clients are configured.
Networks come in many different shapes and sizes. In this video, we’ll discuss the differences in Ethernet, WAN, and Token Ring topologies, and learn about the differences in client/server, peer to peer, and Windows Domain-based technologies. We’ll also take a tour through the myriad wired and wireless technologies, including ISDN, DSL, infrared, Bluetooth, and mobile wireless networks.