An insecure network is an open door to misuse. In this video, you’ll learn ways to help secure your wired and wireless networks.
Our SOHO routers include a myriad of settings, configuration options, and network selections. In this video, you’ll learn about options like MAC address filtering, wireless encryption options, port forwarding and port triggering, SSID, IP address management, DMZ ports, WPS, and quality of service configurations.
Our wireless networks would be worthless if they didn’t include complex encryption methods. In this video, you’ll learn about the WEP, WPA, and WPA2 encryption protocols.
Which wireless encryption standard uses AES-based encryption?
Why is WPA encryption preferred over WEP?
Our wireless networks would be worthless without a strong method of encrypting the wireless data. In this video, you’ll learn about the WEP, WPA, and WPA2 wireless encryption protocols.
In which of these cases would you be using an encryption technology?
You have just contracted with a third-party to provide web-hosting for your organization, and all of the servers are located at a remote facility. Which of these methods would allow you to securely manage your servers over your insecure Internet connection?
You would like to encrypt one of your important spreadsheets, but you want all other files on your hard drive to be normally readable. What type of Windows encryption can be applied to this single file?
Whole disk encryption takes the idea of data protection to an entirely different level. In this video, you’ll learn about whole disk encryption technologies and how they can be used to provide the ultimate level of data protection on your devices.