CompTIA IT Fundamentals: Authentication & Disaster Recovery
IT Fundamentals
| Beginner
- 17 videos | 1h 51m 4s
- Includes Assessment
- Earns a Badge
Accessing information is something we all do in our professional and private lives. Regardless of the purpose for accessing this information, the information must be secure and capable of being recovered should a disastrous situation arise. In this course, you will learn about authentication and disaster recovery concepts, beginning with the AAA framework and authentication, authorization, and accounting. Then you'll discover important methods used to protect access to information, including passwords, PINs, multi-factor authentication (MFA), and biometrics. Finally, you'll explore fault tolerance, high availability, and the importance of storage location, contingency planning, and disaster recovery. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseProvide an overview of the aaa framework and its importanceOutline authentication and its role in the aaa frameworkIdentify various authentication methods and their importanceOutline the use of passwords and pins to protect devices and informationCompare and contrast software and hardware tokens and their usesIdentify the role and features of biometrics in protecting informationProvide an overview of authorization and its role in the aaa frameworkProvide an overview of accounting and its role in the aaa framework
-
Provide an overview of non-repudiation and the role it plays in protecting informationProvide an overview fault tolerance and the role it plays in protecting informationCompare and contrast high availability and fault tolerance respective to their role in protecting informationOutline the role of fault tolerance and data activities in protecting informationIdentify the role and purpose of data storage location and contingency planning in protecting informationRecognize the role and features of disaster recovery in computing environmentsOutline methods for recovering information in the wake of disaster situationsSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 16sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
9m 41sAfter completing this video, you will be able to provide an overview of the AAA framework and its importance. FREE ACCESS
-
5m 42sUpon completion of this video, you will be able to outline authentication and its role in the AAA framework. FREE ACCESS
-
6m 47sAfter completing this video, you will be able to identify various authentication methods and their importance. FREE ACCESS
-
6m 21sUpon completion of this video, you will be able to outline the use of passwords and PINs to protect devices and information. FREE ACCESS
-
5m 25sAfter completing this video, you will be able to compare and contrast software and hardware tokens and their uses. FREE ACCESS
-
4m 56sUpon completion of this video, you will be able to identify the role and features of biometrics in protecting information. FREE ACCESS
-
9m 43sAfter completing this video, you will be able to provide an overview of authorization and its role in the AAA framework. FREE ACCESS
-
4m 47sUpon completion of this video, you will be able to provide an overview of accounting and its role in the AAA framework. FREE ACCESS
-
7m 9sAfter completing this video, you will be able to provide an overview of non-repudiation and the role it plays in protecting information. FREE ACCESS
-
9m 57sUpon completion of this video, you will be able to provide an overview of fault tolerance and the role it plays in protecting information. FREE ACCESS
-
8m 53sAfter completing this video, you will be able to compare and contrast high availability and fault tolerance respective to their role in protecting information. FREE ACCESS
-
10m 41sUpon completion of this video, you will be able to outline the role of fault tolerance and data activities in protecting information. FREE ACCESS
-
6m 37sAfter completing this video, you will be able to identify the role and purpose of data storage location and contingency planning in protecting information. FREE ACCESS
-
6m 48sUpon completion of this video, you will be able to recognize the role and features of disaster recovery in computing environments. FREE ACCESS
-
5m 32sAfter completing this video, you will be able to outline methods for recovering information in the wake of disaster situations. FREE ACCESS
-
47sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.