Today’s SY0-601 Security+ Pop Quiz: Still better than math
Today’s SY0-601 Security+ Pop Quiz: Still better than math Read More »
Installing a wireless network can be an involved process. In this video, you’ll learn about site surveys, channel selection, access point placement, and more. << Previous Video: Wireless Authentication Protocols Next: Mobile Networks >> Before installing a wireless network, it’s useful to know the environment that you’re installing this equipment in. So it’s common to
Installing Wireless Networks – SY0-601 CompTIA Security+ : 3.4 Read More »
There are many options available when configuring wireless authentication. In this video, you’ll learn about EAP, EAP-FAST, PEAP, EAP-TLS, and more. << Previous Video: Wireless Authentication Methods Next: Installing Wireless Networks >> In a previous video, we talked about the need for authenticating to a wireless network. And of course, there are many different ways
Wireless Authentication Protocols – SY0-601 CompTIA Security+ : 3.4 Read More »
There are a number of different methods to authenticate users with a wireless network. In this video, you’ll learn about PSK, 802.1X, captive portal, and WPS. << Previous Video: Wireless Cryptography Next: Wireless Authentication Protocols >> When you’re connecting to a wireless network. One of the first thing that happens is authentication. We need some
Wireless Authentication Methods – SY0-601 CompTIA Security+ : 3.4 Read More »
Wireless networks wouldn’t be a very useful networking medium without cryptography. In this video, you’ll learn about wireless encryption, WPA2, WPA3, SAE, and more. << Previous Video: Other Network Appliances Next: Wireless Authentication Methods >> When we’re using our wired networks, we don’t have to worry so much about other people listening in to what
Wireless Cryptography – SY0-601 CompTIA Security+ : 3.4 Read More »
A layered approach to network security is always the best. In this video, you’ll learn about jump servers, hardware security modules (HSM), and sensors and collectors. << Previous Video: Intrusion Prevention Next: Wireless Cryptography >> One of the challenges we have when we’re administering our network and our servers is to be able to provide
Other Network Appliances – SY0-601 CompTIA Security+ : 3.3 Read More »
Intrusion prevention is a useful way to block known vulnerabilities. In this video, you’ll learn about passive monitoring, out-of-band responses, inline monitoring, and in-line responses. << Previous Video: Proxy Servers Next: Other Network Appliances >> A network based intrusion detection system or more commonly a network based intrusion prevention system. It’s designed to look at
Intrusion Prevention – SY0-601 CompTIA Security+ : 3.3 Read More »
A proxy can control traffic on complex enterprise networks. In this video, you’ll learn about forward proxies, reverse proxies, and open proxies. << Previous Video: Network Access Control Next: Intrusion Prevention >> A proxy server is a device that sits between the users and the rest of the network. This proxy server usually receives requests
Network access control (NAC) is an important part of IT security. In this video, you’ll learn about posture assessments, compare persistent and dissolvable agents, and agentless NAC. << Previous Video: Firewalls Next: Proxy Servers >> There are a number of different ways to control access to your network. When we’re setting up a firewall on
Network Access Control – SY0-601 CompTIA Security+ : 3.3 Read More »
The firewall is a staple of IT security. In this video, you’ll learn about stateless vs. stateful firewalls, UTMs, next-generation firewalls, web application firewalls, and more. << Previous Video: Secure Networking Next: Network Access Control >> If you’re connected to the internet at home or in your office, then you are using a firewall to