In most organizations, changes to the network are managed through a very specific change control process. In this video, you’ll learn about the change management process and how it can be implemented in an organization.
Accounting for costs and preventing further damage are important aspects of security forensics. In this video, you’ll learn about expense accounting and methods for limiting the damage of a security event.
Different classes of systems require different approaches to security. In this video, you’ll learn about the NIST control types and the organization of those control types into different families.
Network access control can be a very useful way to secure the access to your network. In this video, you’ll get an overview and learn the security benefits of NAC technology.
Access control lists are a fundamental security component of many operating systems and security devices. In this video, you’ll learn how to use ACLs to control access to your network resources.
Once your users login to the network, how do you assign rights and permissions? In this video, you’ll learn about access control and how implicit deny and time-of-day restrictions can be used to add additional access control security.
The identification and authentication process is a key aspect of network security. In this video, you’ll learn the difference between identification and authentication, the components of your account login, and important best practices for account enrollment.
With the introduction of Windows XP, a new method was created for the operating system to communicate to scanners, digital cameras, and other image-based devices. What common method does Windows use to communicate and control these devices?