log
An Overview of the Linux Boot Log Files – CompTIA Linux+ LX0-101: 101.2
When you start a Linux desktop, hundreds of log entries are stored on the computer. In this video, you’ll learn how to search through the kernel ring buffer and identify the areas of the operating system that store application and boot log files.
An Overview of the Linux Boot Log Files – CompTIA Linux+ LX0-101: 101.2 Read More »
CompTIA Security+ SY0-301: 2.3 – Network Traffic
The information traversing the network can be a valuable source of forensic data. In this video, you’ll learn about some common data gathering techniques for network traffic data.
CompTIA Security+ SY0-301: 2.3 – Network Traffic Read More »
CompTIA Security+ SY0-301: 1.3 – Remote Access
One of the more challenging aspects of network security is keeping your data and users safe when they are outside of the building. In this video, you’ll learn about remote access requirements and how to use enhanced features to keep your remove access secure.
CompTIA Security+ SY0-301: 1.2 – Log Analysis
Every network and security device creates logs, and analyzing the log can often provide important security information. In this video, you’ll learn about the log creation process and the tools you can use to analyze security logs.
CompTIA Security+ SY0-301: 3.6 – Monitoring System Logs
Your logs contain valuable information, if you know where to look. In this video, you’ll learn about log monitoring, the use of security baselines and thresholds, and the importance of securing your log information.
CompTIA Security+ SY0-301: 3.6 – Monitoring System Logs Read More »
Microsoft 70-680: 7.4 – Monitoring Windows 7
It’s easy to monitor the performance of your Windows 7 desktop, but what options are available to constantly monitor the performance of every desktop in your enterprise? In this video, you’ll learn about event log configurations and filters, event subscriptions, data collector sets, and creating a system diagnostics report.
Microsoft 70-680: 6.5 – Remote Connections – Part 2
Now that your remote VPN connection is running, you can take advantage of some Windows 7 technologies to make the most of your limited bandwidth. In this video, you’ll learn about Windows’ NAP technology, the process for auditing your remote connections, and how to publish individual applications using Remote Desktop’s RemoteApp feature.
Microsoft 70-680: 6.5 – Remote Connections – Part 2 Read More »