CompTIA Security+ SY0-501

Access Control Technologies – CompTIA Security+ SY0-501 – 4.3

There are many physical and digital methods of providing access control. In this video, you’ll learn about proximity cards, biometrics, token generators, and more. << Previous Video: Access Control Models Next: Account Types >> Proximity cards are commonly used to gain access to doors, or door locks. You can see by moving the card close […]

Access Control Technologies – CompTIA Security+ SY0-501 – 4.3 Read More »

Access Control Models – CompTIA Security+ SY0-501 – 4.3

There are many different way to assign user rights and permissions to files, folders, and other objects. In this video, you’ll learn about some of the most popular access control models. << Previous Video: Federated Identities Next: Access Control Technologies >> The access that a user has to a particular resource starts with authorization. This

Access Control Models – CompTIA Security+ SY0-501 – 4.3 Read More »

Federated Identities – CompTIA Security+ SY0-501 – 4.2

There are many different ways to implement authentication in an application. In this video, you’ll learn about server-based authentication, token-based authentication, and the advantages of using federation for user authentication. << Previous Video: PAP, CHAP, and MS-CHAP Next: Access Control Models >> Authenticating to a web server can be somewhat of a challenge. That’s because

Federated Identities – CompTIA Security+ SY0-501 – 4.2 Read More »

PAP, CHAP, and MS-CHAP – CompTIA Security+ SY0-501 – 4.2

Some legacy authentication protocols are still in use today. In this video, you’ll learn about the operation of PAP, CHAP, and Microsoft’s MS-CHAP protocols. << Previous Video: Identity and Access Services Next: Federated Identities >> If you need to authenticate on a Point-to-Point network, then you need the Point-to-Point Protocol, or PPP, to be able

PAP, CHAP, and MS-CHAP – CompTIA Security+ SY0-501 – 4.2 Read More »

Identity and Access Services – CompTIA Security+ SY0-501 – 4.2

The authentication process can many different protocols to verify a person’s identity. In this video, you’ll learn about RADIUS, TACACS, LDAP, and more. << Previous Video: AAA and Authentication Next: PAP, CHAP, and MS-CHAP >> When we want to gain access to some type of network resource, then we need to provide the credentials. Those

Identity and Access Services – CompTIA Security+ SY0-501 – 4.2 Read More »

AAA and Authentication – CompTIA Security+ SY0-501 – 4.1

The authentication process is a foundational aspect of network security. In this video, you’ll learn about AAA, authentication factors, federation, single sign-on, and more. << Previous Video: Physical Security Controls Next: Identity and Access Services >> The AAA framework is a foundation of network security. When we’re logging into our network to gain access to

AAA and Authentication – CompTIA Security+ SY0-501 – 4.1 Read More »

Physical Security Controls – CompTIA Security+ SY0-501 – 3.9

We rely on physical controls to provide a layer of security that’s not available from digital security controls. In this video, you’ll learn about some of the most popular physical security controls in use today. << Previous Video: Redundancy, Fault Tolerance, and High Availability Next: AAA and Authentication >> Bad guys don’t like to be

Physical Security Controls – CompTIA Security+ SY0-501 – 3.9 Read More »

Redundancy, Fault Tolerance, and High Availability – CompTIA Security+ SY0-501 – 3.8

Now that you’ve built your cloud-based application instances, how to keep them running with 100% availability? In this video, you’ll learn about redundant systems, building fault tolerant architectures, and the advantages of high availability. << Previous Video: Resiliency and Automation Next: Physical Security Controls >> If someone’s trying to gain access to your servers or

Redundancy, Fault Tolerance, and High Availability – CompTIA Security+ SY0-501 – 3.8 Read More »

Resiliency and Automation – CompTIA Security+ SY0-501 – 3.8

In the cloud, things happen fast. In this video, you’ll learn resiliency and automation can be used to maintain the uptime and availability of these dynamic computing platforms. << Previous Video: Security in the Cloud Next: Redundancy, Fault Tolerance, and High Availability >> If you’re maintaining a cloud-based infrastructure, then there’s going to be a

Resiliency and Automation – CompTIA Security+ SY0-501 – 3.8 Read More »