CompTIA Cybersecurity Analyst+: Protecting Network Resources
Cyber Security
| Intermediate
- 15 Videos | 1h 3m 57s
- Includes Assessment
- Earns a Badge
Authentication controls who gets access to resources. Stronger authentication means greater control over resource access. Discover network protection techniques, including cryptography, biometrics, hashing, and authentication.
WHAT YOU WILL LEARN
-
recognize how crypto is used to secure data in the enterprisedifferentiate symmetric from asymmetric encryptiondifferentiate asymmetric from symmetric encryptionidentify the PKI hierarchyrequest a security certificate from a CAencrypt files on a Windows system using EFSexplain how file integrity can be maintainedenable file integrity using Linux
-
enable file integrity using Windowsrecognize authentication methods used to prove one's identityrequire VPN connections to use MFArecognize how resource access gets authorizedconfigure centralized authentication using RADIUSdescribe what user provisioning entailsdescribe how identity federation differs from traditional authentication
IN THIS COURSE
-
1.Cryptography Primer4m 39sUP NEXT
-
2.Symmetric Cryptography2m 41s
-
3.Asymmetric Cryptography4m 28s
-
4.Public Key Infrastructure5m 57s
-
5.Request a PKI Certificate from a Windows CA7m 32s
-
6.Use Windows EFS File Encryption5m 40s
-
7.Fingerprinting, Hashing2m 54s
-
8.File Hashing in Linux2m 43s
-
9.File Hashing in Windows3m 1s
-
10.Authentication3m 54s
-
11.Configure MultiFactor Authentication for VPN Clients4m 12s
-
12.Authorization2m 37s
-
13.RADIUS, TACACS+4m 31s
-
14.User Provisioning and Deprovisioning3m 39s
-
15.Identity Federation5m 31s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.