Telephony – CompTIA Security+ SY0-401: 1.3
VoIP and telephony technologies are now integrated into almost all of our networks. In this video, you’ll learn what security concerns exist for telephony-related technologies.
VoIP and telephony technologies are now integrated into almost all of our networks. In this video, you’ll learn what security concerns exist for telephony-related technologies.
Nearly every Internet-connected organization uses some type of network address translation. In this video, you’ll learn how destination NAT and source NAT is used to provide Internet connectivity and to protect your internal servers from users on the Internet.
Network Address Translation – CompTIA Security+ SY0-401: 1.3 Read More »
Nearly every network requires the administration of virtual LANs, or VLANs. In this video, you’ll learn about VLANs and how they can be used to logically segment and secure your network.
One of the key concepts of TCP/IP networks is subnetting. In this video, you’ll learn why we subnet our networks and you’ll see a network design that incorporates separate IP subnets.
Subnetting the Network – CompTIA Security+ SY0-401: 1.3 Read More »
A common network design is to include a virtual DMZ (demilitarized zone) to separate the Internet from the inside of the network. In this video, you’ll learn how a DMZ is used as a layer of protection and which devices you would commonly find in a DMZ.
The event and access logs from network devices can provide a wealth of information. In this video, you’ll learn how post-event analysis and real-time analysis of logs can provide valuable security information.
One of the fundamental best practices of network security is to segment the network to prevent access and protect resources. In this video, you’ll learn about network separation and how organizations can use different segmentation strategies in their infrastructure.
Network Separation – CompTIA Security+ SY0-401: 1.2 Read More »
Spanning Tree Protocol (STP) is an important standard that provides a mechanism for switched networks to avoid outages due to network loops. In this video, you’ll learn how loops can cause network issues and I’ll demonstrate what happens when Spanning Tree constantly adjusts to avoid network loops.
Spanning Tree Protocol and Loop Protection – CompTIA Security+ SY0-401: 1.2 Read More »
A relatively easy way to overwhelm network devices is to attack them with a flood of network packets. In this video, you’ll learn about some of the more popular methods of flooding a network and how to help prevent these denial of service attacks.
If you need to secure a physical network port, then you’ll want to consider some type of network access control (NAC). In this video, you’ll get an overview of port security and I’ll show you a step-by-step of 802.1X in operation.
Port Security and 802.1X – CompTIA Security+ SY0-401: 1.2 Read More »