Vulnerability scans can provide you with a wealth of information about your network security. In this video, you’ll learn about different scan types, how to identify vulnerability, and how to interpret scan results.
As a security professional, you need assessment tools to help keep your network secure. In this video, you’ll learn about active vs. passive tools, protocol analyzers, honeypots, and more.
If you’re planning to maintain uptime and availability of your computing resources, then you’ll almost certainly need to implement redundant systems. In this video, you’ll learn about redundancy, fault tolerant systems, and high availability infrastructures.
How can you maintain uptime, even when your hardware fails? In this video, you’ll learn about high availability, redundancy and fault tolerance, hard drive RAID technologies, and server clustering.