Agreement Types – CompTIA Security+ SY0-501 – 5.1

The legal side of network security relies on a number of different agreement types. In this video, you’ll learn about standard operating procedures, interoperability agreements, and other common agreements. << Previous Video: Account Policy Enforcement Next: Personnel Management >> Every organization has their own set of processes and procedures for handling their IT operations. These […]

Agreement Types – CompTIA Security+ SY0-501 – 5.1 Read More »

Account Policy Enforcement – CompTIA Security+ SY0-501 – 4.4

Now that you’ve created your user accounts, how do you ensure that they are used securely? In this video, you’ll learn about credential management, Group Policy control, passwords, and more. << Previous Video: Account Management Next: Agreement Types >> The credentials that you use when you log in are the only thing that stands between

Account Policy Enforcement – CompTIA Security+ SY0-501 – 4.4 Read More »

Account Management – CompTIA Security+ SY0-501 – 4.4

There are important security considerations when managing your user accounts. In this video, you’ll learn about on-boarding, auditing, account naming conventions, and more. << Previous Video: Account Types Next: Account Policy Enforcement >> Setting a user’s account to have the least number of privileges is a foundation in IT security. If you’re configuring a user’s

Account Management – CompTIA Security+ SY0-501 – 4.4 Read More »

Account Types – CompTIA Security+ SY0-501 – 4.4

Not all account types are created the same. In this video, you’ll learn the differences between the different account types found in your operating system. << Previous Video: Access Control Technologies Next: Account Management >> If you’re using your computer to watch this video right now, you’re probably using a user account. This is an

Account Types – CompTIA Security+ SY0-501 – 4.4 Read More »

Access Control Technologies – CompTIA Security+ SY0-501 – 4.3

There are many physical and digital methods of providing access control. In this video, you’ll learn about proximity cards, biometrics, token generators, and more. << Previous Video: Access Control Models Next: Account Types >> Proximity cards are commonly used to gain access to doors, or door locks. You can see by moving the card close

Access Control Technologies – CompTIA Security+ SY0-501 – 4.3 Read More »

Access Control Models – CompTIA Security+ SY0-501 – 4.3

There are many different way to assign user rights and permissions to files, folders, and other objects. In this video, you’ll learn about some of the most popular access control models. << Previous Video: Federated Identities Next: Access Control Technologies >> The access that a user has to a particular resource starts with authorization. This

Access Control Models – CompTIA Security+ SY0-501 – 4.3 Read More »