Company Security Policies – CompTIA Network+ N10-006 – 4.8
Companies rely on security policies for their WAN to manage and secure traffic flows. In this video, you’ll learn about traffic blocking policies and traffic throttling technologies.
Companies rely on security policies for their WAN to manage and secure traffic flows. In this video, you’ll learn about traffic blocking policies and traffic throttling technologies.
Our customer premise equipment includes a number of troubleshooting features. In this video, you’ll learn about demarcation points, smartjacks, CSU/DSUs, and copper line drivers.
WAN connections can have signal problems, routing protocol issues, and other challenges. In this video, you’ll learn about troubleshooting interface issues, latency problems, routing table issues, and more.
An organization’s authentication servers are some of the most important services on the network. In this video, you’ll learn about TACACS and RADIUS misconfigurations, domain configurations, default passwords, and backdoors.
You can use a number of techniques to identify malicious users. In this video, you’ll learn about trusted and untrusted users, packet analysis, and banner grabbing.
ICMP and ARP are two of the fundamental protocols used on our networks. In this video, you’ll learn about the “ping of death,” troubleshooting problems with an unreachable default gateway, and using ARP to troubleshoot issues.
A denial of service can be a significant event on any network. In this video, you’ll learn about DoS events, the fundamentals of a distributed DoS, DoS on a wireless network, and the process of troubleshooting a denial of service.
An operating system’s security must be constantly maintained. In this video, you’ll learn about OS patches, updates, and malware attacks.
A firewall is a complex device that can be easily misconfigured. In this video, you’ll learn about connectivity misconfigurations, security policy problems, and misconfigured ACLs or applications.
Many network architectures will use multiple network interface cards in a single device. In this video, you’ll learn about NIC fault tolerance and link aggregation.