There are a number of digital security techniques that can help protect your system from the bad guys. In this video, you’ll learn about anti-virus/anti-spyware software, firewalls, account protection, and user rights and permissions
The built-in Windows Firewall can help to protect your system from unwanted intrusions. In this video, you’ll learn about the Windows Firewall and some of its advanced security features.
Which of these criteria does the Windows Firewall use to allow or disallow network communication? Pick two.
We use many different network devices to connect our devices together. In this video, you’ll learn about hubs, switches, routers, firewalls, and much more.
A firewall uses a specific set of rules to allow or deny traffic flows through the network. In this video, you’ll learn about firewall rulebases and we’ll examine a firewall rulebase for an Internet-facing web server.
Today’s security technologies use different techniques for allowing traffic flows through the network. In this video, you’ll learn about firewall-based stateful inspection and how to perform simple packet filtering in other network devices.
Our firewalls allow us to keep the bad guys away from our systems but still provide for connectivity to network resources. In this video, you’ll learn about the advantages and disadvantages of hardware-based firewalls and software-based firewalls.
In this Study Group; multimode vs. singlemode, OSI layers, Class D and E addresses, firewalls and DMZs, NAT, and exam structure.
The DMZ is a staple of today’s firewall architectures. In this video, you’ll learn how a DMZ can be used to help protect your Internet-facing network resources.
If you manage a firewall, then you’re probably familiar with the security rules. In this video, you’ll learn about the importance of firewall rules and we’ll examine some of the default firewall rules from my firewall.