CompTIA IT Fundamentals: Authentication & Disaster Recovery

IT Fundamentals    |    Beginner
  • 17 videos | 1h 51m 4s
  • Includes Assessment
  • Earns a Badge
Rating 4.8 of 24 users Rating 4.8 of 24 users (24)
Accessing information is something we all do in our professional and private lives. Regardless of the purpose for accessing this information, the information must be secure and capable of being recovered should a disastrous situation arise. In this course, you will learn about authentication and disaster recovery concepts, beginning with the AAA framework and authentication, authorization, and accounting. Then you'll discover important methods used to protect access to information, including passwords, PINs, multi-factor authentication (MFA), and biometrics. Finally, you'll explore fault tolerance, high availability, and the importance of storage location, contingency planning, and disaster recovery. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Provide an overview of the aaa framework and its importance
    Outline authentication and its role in the aaa framework
    Identify various authentication methods and their importance
    Outline the use of passwords and pins to protect devices and information
    Compare and contrast software and hardware tokens and their uses
    Identify the role and features of biometrics in protecting information
    Provide an overview of authorization and its role in the aaa framework
    Provide an overview of accounting and its role in the aaa framework
  • Provide an overview of non-repudiation and the role it plays in protecting information
    Provide an overview fault tolerance and the role it plays in protecting information
    Compare and contrast high availability and fault tolerance respective to their role in protecting information
    Outline the role of fault tolerance and data activities in protecting information
    Identify the role and purpose of data storage location and contingency planning in protecting information
    Recognize the role and features of disaster recovery in computing environments
    Outline methods for recovering information in the wake of disaster situations
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 16s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 9m 41s
    After completing this video, you will be able to provide an overview of the AAA framework and its importance. FREE ACCESS
  • Locked
    3.  Role of Authentication
    5m 42s
    Upon completion of this video, you will be able to outline authentication and its role in the AAA framework. FREE ACCESS
  • Locked
    4.  Authentication Methods
    6m 47s
    After completing this video, you will be able to identify various authentication methods and their importance. FREE ACCESS
  • Locked
    5.  Passwords and PINs
    6m 21s
    Upon completion of this video, you will be able to outline the use of passwords and PINs to protect devices and information. FREE ACCESS
  • Locked
    6.  Software vs. Hardware Tokens
    5m 25s
    After completing this video, you will be able to compare and contrast software and hardware tokens and their uses. FREE ACCESS
  • Locked
    7.  Biometrics
    4m 56s
    Upon completion of this video, you will be able to identify the role and features of biometrics in protecting information. FREE ACCESS
  • Locked
    8.  Role of Authorization
    9m 43s
    After completing this video, you will be able to provide an overview of authorization and its role in the AAA framework. FREE ACCESS
  • Locked
    9.  Role of Accounting
    4m 47s
    Upon completion of this video, you will be able to provide an overview of accounting and its role in the AAA framework. FREE ACCESS
  • Locked
    10.  Non-repudiation
    7m 9s
    After completing this video, you will be able to provide an overview of non-repudiation and the role it plays in protecting information. FREE ACCESS
  • Locked
    11.  Role of Fault Tolerance
    9m 57s
    Upon completion of this video, you will be able to provide an overview of fault tolerance and the role it plays in protecting information. FREE ACCESS
  • Locked
    12.  High Availability vs. Fault Tolerance
    8m 53s
    After completing this video, you will be able to compare and contrast high availability and fault tolerance respective to their role in protecting information. FREE ACCESS
  • Locked
    13.  Fault Tolerance and Data Activities
    10m 41s
    Upon completion of this video, you will be able to outline the role of fault tolerance and data activities in protecting information. FREE ACCESS
  • Locked
    14.  Storage Location and Contingency Planning
    6m 37s
    After completing this video, you will be able to identify the role and purpose of data storage location and contingency planning in protecting information. FREE ACCESS
  • Locked
    15.  Role of Disaster Recover
    6m 48s
    Upon completion of this video, you will be able to recognize the role and features of disaster recovery in computing environments. FREE ACCESS
  • Locked
    16.  Disaster Recovery Methods
    5m 32s
    After completing this video, you will be able to outline methods for recovering information in the wake of disaster situations. FREE ACCESS
  • Locked
    17.  Course Summary
    47s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 7 users Rating 4.7 of 7 users (7)
Rating 4.7 of 114 users Rating 4.7 of 114 users (114)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 320 users Rating 4.6 of 320 users (320)
Rating 4.6 of 369 users Rating 4.6 of 369 users (369)
Rating 4.8 of 66 users Rating 4.8 of 66 users (66)