Virtualization – CompTIA Security+ SY0-401: 1.3
The virtualization of the data center is now a standard part of our networks. In this video, you’ll learn about the security concerns that involve virtualization technologies.
The virtualization of the data center is now a standard part of our networks. In this video, you’ll learn about the security concerns that involve virtualization technologies.
An open network jack in a conference room can provide a malicious user with complete access to the internal network. In this video, you’ll learn how network access control (NAC) can be used to help secure network connections.
Network Access Control – CompTIA Security+ SY0-401: 1.3 Read More »
VoIP and telephony technologies are now integrated into almost all of our networks. In this video, you’ll learn what security concerns exist for telephony-related technologies.
Nearly every Internet-connected organization uses some type of network address translation. In this video, you’ll learn how destination NAT and source NAT is used to provide Internet connectivity and to protect your internal servers from users on the Internet.
Network Address Translation – CompTIA Security+ SY0-401: 1.3 Read More »
Nearly every network requires the administration of virtual LANs, or VLANs. In this video, you’ll learn about VLANs and how they can be used to logically segment and secure your network.
One of the key concepts of TCP/IP networks is subnetting. In this video, you’ll learn why we subnet our networks and you’ll see a network design that incorporates separate IP subnets.
Subnetting the Network – CompTIA Security+ SY0-401: 1.3 Read More »
A common network design is to include a virtual DMZ (demilitarized zone) to separate the Internet from the inside of the network. In this video, you’ll learn how a DMZ is used as a layer of protection and which devices you would commonly find in a DMZ.
The event and access logs from network devices can provide a wealth of information. In this video, you’ll learn how post-event analysis and real-time analysis of logs can provide valuable security information.
One of the fundamental best practices of network security is to segment the network to prevent access and protect resources. In this video, you’ll learn about network separation and how organizations can use different segmentation strategies in their infrastructure.
Network Separation – CompTIA Security+ SY0-401: 1.2 Read More »
Spanning Tree Protocol (STP) is an important standard that provides a mechanism for switched networks to avoid outages due to network loops. In this video, you’ll learn how loops can cause network issues and I’ll demonstrate what happens when Spanning Tree constantly adjusts to avoid network loops.
Spanning Tree Protocol and Loop Protection – CompTIA Security+ SY0-401: 1.2 Read More »