authentication
Troubleshooting Authentication Issues – CompTIA Network+ N10-006 – 4.7
An organization’s authentication servers are some of the most important services on the network. In this video, you’ll learn about TACACS and RADIUS misconfigurations, domain configurations, default passwords, and backdoors.
User Authentication – CompTIA Network+ N10-006 – 3.3
The network authentication process can take many different forms. In this video, you’ll learn about PAP, CHAP, EAP, PEAP, Kerberos, single sign-on, and multi-factor authentication.
Switch Management – CompTIA Network+ N10-006 – 2.6
Switches can be managed in many different ways. In this video, you’ll learn about unmanaged vs. managed switches, console connections, virtual terminals, in-band vs. out-of-band communication, and methods of authenticating administrators.
Cryptography Overview – CompTIA Security+ SY0-401: 6.1
Our modern applications make extensive use of cryptography. In this video, you’ll learn the basics of cryptography and some of the history of ciphers and secrecy.
CHAP and PAP – CompTIA Security+ SY0-401: 5.2
The CHAP and PAP authentication protocols have been a mainstay of network computing. In this video, you’ll learn how PAP and CHAP operates over the network and some of the advantages and disadvantages of using these protocols for authentication.
Multi-factor Authentication – CompTIA Security+ SY0-401: 5.2
If you want to secure your authentication process, then you’ll probably implement some form of multi-factor authentication. In this video, you’ll learn how to secure your authentication by using something you are, something you have, something you know, something you are, and something you do.
Single-factor Authentication – CompTIA Security+ SY0-401: 5.2
Most of our day-to-day authentication uses a single-factor to provide access. In this video, you’ll learn about the different factors of authentication and some of the challenges around using single-factor authentication.
Identification, Authentication, and Authorization – CompTIA Security+ SY0-401: 5.2
The foundation of access control is based on the three major tenants of identification, authentication, and authorization. In this video, you’ll learn how each of these is used to maintain the security of our networks.
SAML – CompTIA Security+ SY0-401: 5.1
You’ve probably visited a web site that provided authentication using a 3rd-party service, and it may have been using the Security Association Markup Language (SAML) to accomplish this. In this video, you’ll learn how SAML can be used to authenticate to one set of resources by using a completely different authentication provider.