CompTIA Cybersecurity Analyst+: Protecting Network Resources
Cyber Security
| Intermediate
- 15 videos | 1h 3m 57s
- Includes Assessment
- Earns a Badge
Authentication controls who gets access to resources. Stronger authentication means greater control over resource access. Discover network protection techniques, including cryptography, biometrics, hashing, and authentication.
WHAT YOU WILL LEARN
-
Recognize how crypto is used to secure data in the enterpriseDifferentiate symmetric from asymmetric encryptionDifferentiate asymmetric from symmetric encryptionIdentify the pki hierarchyRequest a security certificate from a caEncrypt files on a windows system using efsExplain how file integrity can be maintainedEnable file integrity using linux
-
Enable file integrity using windowsRecognize authentication methods used to prove one's identityRequire vpn connections to use mfaRecognize how resource access gets authorizedConfigure centralized authentication using radiusDescribe what user provisioning entailsDescribe how identity federation differs from traditional authentication
IN THIS COURSE
-
4m 39sAfter completing this video, you will be able to recognize how crypto is used to secure data in the enterprise. FREE ACCESS
-
2m 41sDuring this video, you will learn how to differentiate between symmetric and asymmetric encryption. FREE ACCESS
-
4m 28sIn this video, learn how to differentiate between asymmetric and symmetric encryption. FREE ACCESS
-
5m 57sIn this video, you will identify the hierarchy of PKI. FREE ACCESS
-
7m 32sIn this video, find out how to request a security certificate from a certified authority. FREE ACCESS
-
5m 40sIn this video, you will learn how to encrypt files on a Windows system using EFS. FREE ACCESS
-
2m 54sAfter completing this video, you will be able to explain how file integrity can be maintained. FREE ACCESS
-
2m 43sLearn how to enable file integrity on Linux. FREE ACCESS
-
3m 1sLearn how to enable file integrity using Windows. FREE ACCESS
-
3m 54sUpon completion of this video, you will be able to recognize authentication methods used to verify one's identity. FREE ACCESS
-
4m 12sIn this video, you will learn how to require VPN connections to use multi-factor authentication. FREE ACCESS
-
2m 37sAfter completing this video, you will be able to recognize how resource access is authorized. FREE ACCESS
-
4m 31sIn this video, you will configure centralized authentication using RADIUS. FREE ACCESS
-
3m 39sUpon completion of this video, you will be able to describe what user provisioning is. FREE ACCESS
-
5m 31sUpon completion of this video, you will be able to describe how identity federation differs from traditional authentication. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.