control
CompTIA Network+ N10-005: 4.5 – Change Management
In most organizations, changes to the network are managed through a very specific change control process. In this video, you’ll learn about the change management process and how it can be implemented in an organization.
CompTIA Network+ N10-005: 4.5 – Change Management Read More »
CompTIA Security+ SY0-301: 2.3 – Expenses and Damage Control
Accounting for costs and preventing further damage are important aspects of security forensics. In this video, you’ll learn about expense accounting and methods for limiting the damage of a security event.
CompTIA Security+ SY0-301: 2.3 – Expenses and Damage Control Read More »
CompTIA Security+ SY0-301: 2.1 – Control Types
Different classes of systems require different approaches to security. In this video, you’ll learn about the NIST control types and the organization of those control types into different families.
CompTIA Security+ SY0-301: 1.3 – Network Access Control
Network access control can be a very useful way to secure the access to your network. In this video, you’ll get an overview and learn the security benefits of NAC technology.
CompTIA Security+ SY0-301: 1.3 – Network Access Control Read More »
CompTIA Security+ SY0-301: 1.2 – Access Control Lists
Access control lists are a fundamental security component of many operating systems and security devices. In this video, you’ll learn how to use ACLs to control access to your network resources.
CompTIA Security+ SY0-301: 1.2 – Access Control Lists Read More »
CompTIA Security+ SY0-301: 5.2 – Authorization and Access Control
Once your users login to the network, how do you assign rights and permissions? In this video, you’ll learn about access control and how implicit deny and time-of-day restrictions can be used to add additional access control security.
CompTIA Security+ SY0-301: 5.2 – Authorization and Access Control Read More »
CompTIA Security+ SY0-301: 5.2 – Identification and Authentication
The identification and authentication process is a key aspect of network security. In this video, you’ll learn the difference between identification and authentication, the components of your account login, and important best practices for account enrollment.
CompTIA Security+ SY0-301: 5.2 – Identification and Authentication Read More »
How does Windows XP access imaging devices?
With the introduction of Windows XP, a new method was created for the operating system to communicate to scanners, digital cameras, and other image-based devices. What common method does Windows use to communicate and control these devices?