Securing a SOHO Network – CompTIA A+ 220-902 – 3.7
Some of our most important networks are in our small offices and home offices. In this video, you’ll learn some of the more common security techniques that we can use to help secure these networks.
Some of our most important networks are in our small offices and home offices. In this video, you’ll learn some of the more common security techniques that we can use to help secure these networks.
Your mobile devices include a number of methods to keep your data safe. In this video, you’ll learn about screen locks, locator applications, remote backup, biometric authentication, and much more!
Digital security can be more important than physical security, especially if your systems access resources across the Internet. In this video, you’ll learn about some of the most important considerations for digital security.
The built-in Windows Firewall is an important part of system security. In this video, you’ll learn how to manage the Windows Firewall and how to use its built-in advanced security features.
The Windows operating systems include a number of performance and usability features. In this video, you’ll learn about User Account Control, BitLocker, Volume Shadow Copy, System Restore, and much more.
The physical connectivity of the network is just as important as the data that flows across it. In this video, you’ll learn about the different devices that we use to build our physical network infrastructures.
A firewall is a complex device that can be easily misconfigured. In this video, you’ll learn about connectivity misconfigurations, security policy problems, and misconfigured ACLs or applications.
The configuration of a firewall can be one of the most complex parts of your security strategy. In this video, you’ll learn about the physical installation, the concept of implicit deny, and the process used for access lists and security rules.
We use many different firewall technologies to secure our computers and networks. In this video, you’ll learn about host-based firewalls, network-based firewalls, application-aware security devices, SOHO firewalls, and unified threat management devices.