VLANs – CompTIA Security+ SY0-401: 1.3
Nearly every network requires the administration of virtual LANs, or VLANs. In this video, you’ll learn about VLANs and how they can be used to logically segment and secure your network.
Nearly every network requires the administration of virtual LANs, or VLANs. In this video, you’ll learn about VLANs and how they can be used to logically segment and secure your network.
One of the key concepts of TCP/IP networks is subnetting. In this video, you’ll learn why we subnet our networks and you’ll see a network design that incorporates separate IP subnets.
Subnetting the Network – CompTIA Security+ SY0-401: 1.3 Read More »
A common network design is to include a virtual DMZ (demilitarized zone) to separate the Internet from the inside of the network. In this video, you’ll learn how a DMZ is used as a layer of protection and which devices you would commonly find in a DMZ.
The event and access logs from network devices can provide a wealth of information. In this video, you’ll learn how post-event analysis and real-time analysis of logs can provide valuable security information.
One of the fundamental best practices of network security is to segment the network to prevent access and protect resources. In this video, you’ll learn about network separation and how organizations can use different segmentation strategies in their infrastructure.
Network Separation – CompTIA Security+ SY0-401: 1.2 Read More »
Spanning Tree Protocol (STP) is an important standard that provides a mechanism for switched networks to avoid outages due to network loops. In this video, you’ll learn how loops can cause network issues and I’ll demonstrate what happens when Spanning Tree constantly adjusts to avoid network loops.
Spanning Tree Protocol and Loop Protection – CompTIA Security+ SY0-401: 1.2 Read More »
A relatively easy way to overwhelm network devices is to attack them with a flood of network packets. In this video, you’ll learn about some of the more popular methods of flooding a network and how to help prevent these denial of service attacks.
If you need to secure a physical network port, then you’ll want to consider some type of network access control (NAC). In this video, you’ll get an overview of port security and I’ll show you a step-by-step of 802.1X in operation.
Port Security and 802.1X – CompTIA Security+ SY0-401: 1.2 Read More »
Access control lists are used in almost every security device on your network. In this video, you’ll learn how ACLs are used to provide secure access to your important resources.
Access Control Lists – CompTIA Security+ SY0-401: 1.2 Read More »
A router is one of the most important devices in your network. In this video, you’ll learn how to securely connect and manage your routers and other infrastructure devices.
Secure Router Configuration – CompTIA Security+ SY0-401: 1.2 Read More »