Professor Messer

Replication – SY0-601 CompTIA Security+ : 2.5

Replication is a useful method of maintaining application and data availability. In this video, you’ll learn about SAN replication, VM replication, and a comparison of on premises and cloud redundancy. << Previous Video: Power Redundancy Next: Backup Types >> When we deploy an application instance, it’s very common that the computing engine that is able

Replication – SY0-601 CompTIA Security+ : 2.5 Read More »

Power Redundancy – SY0-601 CompTIA Security+ : 2.5

Maintaining a power source is an important part of any security strategy. In this video, you’ll learn about UPS systems, generators, dual-power supplies, and power distribution units. << Previous Video: Network Redundancy Next: Replication >> Perhaps the primary resource we need to be able to operate our computers, our laptops, and mobile devices is power.

Power Redundancy – SY0-601 CompTIA Security+ : 2.5 Read More »

Multi-factor Authentication – SY0-601 CompTIA Security+ : 2.4

We use many different factors during the authentication process. In this video, you’ll learn about the AAA framework, multi-factor authentication factors, and multi-factor authentication attributes. << Previous Video: Biometrics Next: Disk Redundancy >>     We’re all familiar with the process of authenticating into a system. Usually you use a username, a password, and perhaps

Multi-factor Authentication – SY0-601 CompTIA Security+ : 2.4 Read More »

Biometrics – SY0-601 CompTIA Security+ : 2.4

There are many ways to authenticate someone based on a biometric feature. In this video, you’ll learn about fingerprint scanners, retinal scanners, voice recognition, and more. << Previous Video: Authentication Methods Next: Multi-factor Authentication >> A biometric authentication factor refers to something you are, this would be something like a fingerprint. For example, fingerprint scanners

Biometrics – SY0-601 CompTIA Security+ : 2.4 Read More »

Authentication Methods – SY0-601 CompTIA Security+ : 2.4

We use many different technologies during the authentication process. In this video, you’ll learn about directory services, federation, attestation, and more. << Previous Video: Automation and Scripting Next: Biometrics >>     Many operating systems will use a feature known as directory services. This is a central database that stores usernames, passwords, computers, printers, and

Authentication Methods – SY0-601 CompTIA Security+ : 2.4 Read More »