CompTIA Cybersecurity Analyst+: Protecting Network Resources

Cyber Security    |    Intermediate
  • 15 videos | 1h 3m 57s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 23 users Rating 4.6 of 23 users (23)
Authentication controls who gets access to resources. Stronger authentication means greater control over resource access. Discover network protection techniques, including cryptography, biometrics, hashing, and authentication.

WHAT YOU WILL LEARN

  • Recognize how crypto is used to secure data in the enterprise
    Differentiate symmetric from asymmetric encryption
    Differentiate asymmetric from symmetric encryption
    Identify the pki hierarchy
    Request a security certificate from a ca
    Encrypt files on a windows system using efs
    Explain how file integrity can be maintained
    Enable file integrity using linux
  • Enable file integrity using windows
    Recognize authentication methods used to prove one's identity
    Require vpn connections to use mfa
    Recognize how resource access gets authorized
    Configure centralized authentication using radius
    Describe what user provisioning entails
    Describe how identity federation differs from traditional authentication

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 123 users Rating 4.6 of 123 users (123)
Rating 4.4 of 116 users Rating 4.4 of 116 users (116)
Rating 4.6 of 53 users Rating 4.6 of 53 users (53)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 56 users Rating 4.5 of 56 users (56)
Rating 4.7 of 175 users Rating 4.7 of 175 users (175)
Rating 4.6 of 32 users Rating 4.6 of 32 users (32)