Privileges – CompTIA Security+ SY0-401: 5.3
User rights and permissions can be complex to manage. In this video, you’ll learn about user management, group management, and role-based management techniques.
User rights and permissions can be complex to manage. In this video, you’ll learn about user management, group management, and role-based management techniques.
How secure are your passwords? In this video, you’ll learn about password complexity, length, expiration dates, recovery processes, and account lockouts.
Managing Password Policies – CompTIA Security+ SY0-401: 5.3 Read More »
Microsoft Windows provides some powerful management tools to help security everyone who is connected to a Windows Domain. In this video, you’ll learn about Group Policy and how security managers can use Group Policy to help tighten down their security posture.
The user role can be a useful criteria for security management. In this video, you’ll learn the best practices for role-based management and how shared accounts and credentials should be managed.
Roles and Account Credentials – CompTIA Security+ SY0-401: 5.3 Read More »
Our networks rarely operate in a vacuum, and it becomes increasingly important that we provide the proper security posture to other parts of our network and to third-parties. In this video, you’ll learn how federation and transitive trust can give you more control over who goes out and who comes in.
Federation and Transitive Trust – CompTIA Security+ SY0-401: 5.2 Read More »
Providing a secure, single sign-on process is the goal of most network and application administrators. In this video, you’ll learn how single sign-on works and how it can be used to create a seamless authentication infrastructure for your user community.
The CHAP and PAP authentication protocols have been a mainstay of network computing. In this video, you’ll learn how PAP and CHAP operates over the network and some of the advantages and disadvantages of using these protocols for authentication.
A useful security authentication technique is the use of one-time passwords. In this video, you’ll learn how one-time passwords are implemented and the differences between the HOTP and TOTP algorithms.
One-time Password Algorithms – CompTIA Security+ SY0-401: 5.2 Read More »
If you want to secure your authentication process, then you’ll probably implement some form of multi-factor authentication. In this video, you’ll learn how to secure your authentication by using something you are, something you have, something you know, something you are, and something you do.
Multi-factor Authentication – CompTIA Security+ SY0-401: 5.2 Read More »
Most of our day-to-day authentication uses a single-factor to provide access. In this video, you’ll learn about the different factors of authentication and some of the challenges around using single-factor authentication.
Single-factor Authentication – CompTIA Security+ SY0-401: 5.2 Read More »