Professor Messer’s N10-004 CompTIA Network+ Training Course
Network+ certification training for free? Absolutely!
Professor Messer’s N10-004 CompTIA Network+ Training Course Read More »
Network+ certification training for free? Absolutely!
Professor Messer’s N10-004 CompTIA Network+ Training Course Read More »
The overall structure of the exam requirements have changed a bit. Laptop and portable devices have been integrated into the hardware section of the requirements, and safety, communication, and professionalism have been collapsed into a single section called “Operational Procedures.” I like the simplified approach.
The CompTIA A+ 2009 requirements draft is now online Read More »
The intricacies of the Windows command line may seem difficult to grasp, but with a little bit of practice and knowledge you’ll begin to take advantage of some powerful functionality. In this video, we’ll use the Windows command line to manage files and directories, edit files, perform diagnostics and tune the operating system.
Some Windows diagnostic utilities aren’t used often, but they’re very useful when the right situation occurs. In this video, you’ll learn about Dr. Watson, the system restore utility, Windows security center, the task scheduler, and Windows Script Host.
The security of an organization is ultimately only as good as its people and its processes. In this video, we’ll discuss the importance of patching systems and training the user community. We’ll also learn about social engineering and discover ways to address social engineering situations.
Security systems are fantastic things, until they suddenly stop working. In this video, we’ll discuss some troubleshooting techniques for BIOS security, firewall issues, wireless clients, and encryption.
The practical implementation of security system impacts a wide range of systems, technologies, and processes. In this video, you’ll learn how to secure your BIOS, use smart cards, audit your system through event logs, and how NTFS can make your system more secure.
What are the most important aspects to remember for securing your organization’s important data? In this video, we’ll show you some useful best practices for securing data through such methods as access controls, event logging, encryption, password management, and incident reporting.
A wireless network provides excellent mobility, but it also creates a number of security concerns. In this video, we’ll discuss wireless encryption types and aspects of access point security that include MAC filtering, SSID management, IP addressing, and firmware.
Data security is the responsibility of everyone in the organization. In this module, we’ll examine some of the basic fundamentals of security such as authentication technologies, file system security, and social engineering.