Antenna Types – CompTIA Security+ SY0-401: 1.5
The type of antenna can make or break a wireless network installation. In this video, you’ll learn about various antenna types and when they might best be used in a wireless network.
The type of antenna can make or break a wireless network installation. In this video, you’ll learn about various antenna types and when they might best be used in a wireless network.
One method of controlling network access is through the use of a captive portal. In this video, you’ll learn how administrators use captive portals to increase the security of the network.
Captive Portals – CompTIA Security+ SY0-401: 1.5 Read More »
Configuring a wireless network requires a combination of power settings, antenna choice, and antenna location. In this video, you’ll learn how power and antenna settings can be used to customize your wireless network installation.
Wireless Power and Antenna Placement – CompTIA Security+ SY0-401: 1.5 Read More »
The TKIP and CCMP protocols have been an important part of our wireless key management and encryption technologies. In this video, you’ll learn how TKIP and CCMP relates to WPA and WPA2 wireless encryption.
What’s the name of your wireless network? In this video, you’ll learn how to limit the advertising of your wireless SSID.
SSID Management – CompTIA Security+ SY0-401: 1.5 Read More »
One common method of access control on a wireless network is the use of physical hardware addresses. In this video, you’ll learn how to limit wireless access using MAC addresses.
MAC Address Filtering – CompTIA Security+ SY0-401: 1.5 Read More »
Wireless authentication is handled using one of the EAP family of protocols. In this video, you’ll learn the differences between the EAP, LEAP, and PEAP authentication protocols.
EAP, LEAP, and PEAP – CompTIA Security+ SY0-401: 1.5 Read More »
Without encryption, our wireless networks would be relatively useless. In this video, you’ll get an overview of wireless encryption with WEP, WPA, and WPA2.
Wireless Encryption – CompTIA Security+ SY0-401: 1.5 Read More »
The OSI model is a useful description of data as is flows out of one computing device, across the network, and into another device. In this video, you’ll learn how the real-world maps to the world of the OSI model.
Protocols and the OSI Model – CompTIA Security+ SY0-401: 1.4 Read More »
We rely on the TCP and UDP protocols to keep all of our network traffic going to the right place at the right time. In this video, you’ll learn the differences between the two protocols and some of the most popular port numbers in use today.
Common Network Ports – CompTIA Security+ SY0-401: 1.4 Read More »