Today’s N10-008 CompTIA Network+ Pop Quiz: They’re like butterflies
Today’s N10-008 CompTIA Network+ Pop Quiz: They’re like butterflies Read More »
Segmentation can be an important method of managing security. In this video, you’ll learn about Internet of Things (IoT) segmentation, SCADA, operational technology, guest networks, and BYOD. << Previous: Regulatory Compliance Next Video: Denial of Service >> In IT security, segmentation can be a very valuable tool. We may want to physically separate devices from
Segmentation Enforcement – CompTIA Network+ N10-009 – 4.1 Read More »
Almost every organization must manage compliance. In this video, you’ll learn about compliance requirements associated with data localization, the General Data Protection Regulation (GDPR), and the Payment Card Industry Data Security Standard (PCI DSS). << Previous: Security Technologies Next Video: Segmentation Enforcement >> An ongoing challenge for IT professionals is to maintain compliance with the
Regulatory Compliance – CompTIA Network+ N10-009 – 4.1 Read More »
There are many ways to help secure the enterprise. In this video, you’ll learn about honeypots and honeynets, risk, vulnerabilities, exploits, threats, and the CIA triad. << Previous: Authentication Next Video: Regulatory Compliance >> In IT security, there is a constant fight happening between the attackers and the folks that are being attacked. And one
Security Technologies – CompTIA Network+ N10-009 – 4.1 Read More »
The authentication process is an important part of any infrastructure. In this video, you’ll learn about single sign-on, RADIUS, LDAP, SAML, and other authentication technologies. << Previous: Security Concepts Next Video: Security Technologies >> Many of us are very familiar with the process of authenticating. We put in a username, a password. Sometimes there’s an
Information security is a broad field with many security concepts. In this video, you’ll learn about the states of data, digital certificates, certificate authorities, identify and access management (IAM), and much more. << Previous: Remote Access Next Video: Authentication >> In IT security there are a number of different topics to consider. And in this
Security Concepts – CompTIA Network+ N10-009 – 4.1 Read More »
Many network administrators are configuring switches and routers from a remote location. In this video, you’ll learn about SSH, API integration, consoles, jump boxes, and in-band and out-of-band management. << Previous: VPNs Next Video: Security Concepts >> If you’ve done anything in networking relating to switches, routers, firewalls, or other devices, then you’ve probably connected
Virtual Private Networks allow us to communicate securely over public networks. In this video, you’ll learn about client-to-site VPNs, clientless VPNs, and compare full VPN tunnels and split tunnels. << Previous: Time Protocols Next Video: Remote Access >> A VPN is a Virtual Private Network. That is a way of taking information that would normally