The foundation of access control is based on the three major tenants of identification, authentication, and authorization. In this video, you’ll learn how each of these is used to maintain the security of our networks.
One of the challenges of security incidents is recognizing that one has occurred. In this video, you’ll learn about some techniques that can help you detect incidents and attacks.
The identification and authentication process is a key aspect of network security. In this video, you’ll learn the difference between identification and authentication, the components of your account login, and important best practices for account enrollment.