Are your workstations secure? In this video, you’ll learn about password guidelines, desktop security, user permissions, account lockouts, data encryption, and more.
SOHO wireless routers may be the most common network devices in the world, so it’s important that you understand some of the more detailed configuration settings. In this video, you’ll learn about wireless channels, encryption, NAT, port forwarding, port triggering, IP addressing, DMZ ports, QoS, and more.
The configuration of your wireless access point can have a dramatic impact on throughput and performance. In this video, you’ll learn about SSID configurations, encryption settings, power levels, LWAPP, environmental factors, and issues with wireless standards.
We relay on wireless security technologies to keep our network communication secure. In this video, you’ll learn about WEP, WPA, WPA2, and MAC filtering.
Which of these wireless encryption types include centralized authentication?
Which of these ports commonly transfers encrypted data?
Which of these would be the best encryption type to use on a wireless network?
The speed of symmetric encryption makes it a good choice for our high-speed networks. In this video, you’ll learn about RC4, DES, 3DES, AES, Blowfish, and Twofish.
When a web server uses a single private key to encrypt all communication, then all communication can potentially be decrypted afterwards with this single bit of data. In this video, you’ll learn how perfect forward secrecy can be used to create encryption keys dynamically for every encrypted session.
The creation and use of cryptography has also included new ways to keep our data private. In this video, you’ll learn about the use of elliptic curves to create encryption keys and how quantum cryptography can be used for spy-proof secure channels.