Hashing – CompTIA Network+ N10-006 – 3.3
The hash has become a powerful method of verification and security. In this video, you’ll learn about hashing, message digests, and the MD5 and SHA hash types.
The network authentication process can take many different forms. In this video, you’ll learn about PAP, CHAP, EAP, PEAP, Kerberos, single sign-on, and multi-factor authentication.
User Authentication – CompTIA Network+ N10-006 – 3.3 Read More »
We relay on wireless security technologies to keep our network communication secure. In this video, you’ll learn about WEP, WPA, WPA2, and MAC filtering.
Wireless Security – CompTIA Network+ N10-006 – 3.3 Read More »
We rely on access lists to allow or deny traffic flows through our networks. In this video, you’ll learn about content filters, URL filters, and firewall rules.
The traffic we send across the network is subject to viewing by anyone along the way. In this video, you’ll learn about which protocols and services should be used to ensure a secure communications channel.
Using Secure Protocols – CompTIA Network+ N10-006 – 3.3 Read More »
The default configuration of your operating system includes a number of services that you probably don’t use. In this video, you’ll learn how disabling unneeded network services and user accounts can help secure your computer.
Disabling Unneeded Network Services – CompTIA Network+ N10-006 – 3.3 Read More »
Organizations use a formal set of policies to help guide their security requirements. In this video, you’ll learn about security policies and how they are used to develop a formal security posture. << Previous: Switch Port SecurityNext: Disabling Unneeded Services >> One way to maintain a good security posture is to have everyone understanding exactly
Security Policies – CompTIA Network+ N10-006 – 3.3 Read More »
Our network switches often include many different security features. In this video, you’ll learn about DHCP snooping, dynamic ARP inspection, MAC limiting and filtering, and VLAN segmentation.
Switch Port Security – CompTIA Network+ N10-006 – 3.3 Read More »
We use many different technologies to keep the malware from embedding itself in our computers. In this video, you’ll learn about host-based, cloud-based, and network-based anti-malware.
Anti-Malware Software – CompTIA Network+ N10-006 – 3.3 Read More »