Transferring Files – CompTIA Security+ SY0-401: 1.4
There’s more than one way to send a file across the network. In this video, you’ll learn which file transfer technologies can be used to send in-the-clear and encrypted information.
There’s more than one way to send a file across the network. In this video, you’ll learn which file transfer technologies can be used to send in-the-clear and encrypted information.
Terminal access to remote devices is an important part of network and security management. In this video, you’ll learn how to use Telnet and SSH to manage your network infrastructure.
If you do any work on open wireless networks, you may want to consider using a VPN. In this video, you’ll learn how VPNs are able to secure all of your network traffic over an insecure open wireless networks.
Before installing a new wireless network, you’ll probably want to perform a site survey. In this video, you’ll learn why a site survey might be one of the most important parts of your wireless network installation.
The type of antenna can make or break a wireless network installation. In this video, you’ll learn about various antenna types and when they might best be used in a wireless network.
One method of controlling network access is through the use of a captive portal. In this video, you’ll learn how administrators use captive portals to increase the security of the network.
Configuring a wireless network requires a combination of power settings, antenna choice, and antenna location. In this video, you’ll learn how power and antenna settings can be used to customize your wireless network installation.
The TKIP and CCMP protocols have been an important part of our wireless key management and encryption technologies. In this video, you’ll learn how TKIP and CCMP relates to WPA and WPA2 wireless encryption.
What’s the name of your wireless network? In this video, you’ll learn how to limit the advertising of your wireless SSID.
One common method of access control on a wireless network is the use of physical hardware addresses. In this video, you’ll learn how to limit wireless access using MAC addresses.