CompTIA Cybersecurity Analyst+: Protecting Network Resources

Cyber Security    |    Intermediate
  • 15 videos | 1h 3m 57s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 23 users Rating 4.6 of 23 users (23)
Authentication controls who gets access to resources. Stronger authentication means greater control over resource access. Discover network protection techniques, including cryptography, biometrics, hashing, and authentication.

WHAT YOU WILL LEARN

  • Recognize how crypto is used to secure data in the enterprise
    Differentiate symmetric from asymmetric encryption
    Differentiate asymmetric from symmetric encryption
    Identify the pki hierarchy
    Request a security certificate from a ca
    Encrypt files on a windows system using efs
    Explain how file integrity can be maintained
    Enable file integrity using linux
  • Enable file integrity using windows
    Recognize authentication methods used to prove one's identity
    Require vpn connections to use mfa
    Recognize how resource access gets authorized
    Configure centralized authentication using radius
    Describe what user provisioning entails
    Describe how identity federation differs from traditional authentication

IN THIS COURSE

  • 4m 39s
    After completing this video, you will be able to recognize how crypto is used to secure data in the enterprise. FREE ACCESS
  • 2m 41s
    During this video, you will learn how to differentiate between symmetric and asymmetric encryption. FREE ACCESS
  • Locked
    3.  Asymmetric Cryptography
    4m 28s
    In this video, learn how to differentiate between asymmetric and symmetric encryption. FREE ACCESS
  • Locked
    4.  Public Key Infrastructure
    5m 57s
    In this video, you will identify the hierarchy of PKI. FREE ACCESS
  • Locked
    5.  Request a PKI Certificate from a Windows CA
    7m 32s
    In this video, find out how to request a security certificate from a certified authority. FREE ACCESS
  • Locked
    6.  Use Windows EFS File Encryption
    5m 40s
    In this video, you will learn how to encrypt files on a Windows system using EFS. FREE ACCESS
  • Locked
    7.  Fingerprinting, Hashing
    2m 54s
    After completing this video, you will be able to explain how file integrity can be maintained. FREE ACCESS
  • Locked
    8.  File Hashing in Linux
    2m 43s
    Learn how to enable file integrity on Linux. FREE ACCESS
  • Locked
    9.  File Hashing in Windows
    3m 1s
    Learn how to enable file integrity using Windows. FREE ACCESS
  • Locked
    10.  Authentication
    3m 54s
    Upon completion of this video, you will be able to recognize authentication methods used to verify one's identity. FREE ACCESS
  • Locked
    11.  Configure MultiFactor Authentication for VPN Clients
    4m 12s
    In this video, you will learn how to require VPN connections to use multi-factor authentication. FREE ACCESS
  • Locked
    12.  Authorization
    2m 37s
    After completing this video, you will be able to recognize how resource access is authorized. FREE ACCESS
  • Locked
    13.  RADIUS, TACACS+
    4m 31s
    In this video, you will configure centralized authentication using RADIUS. FREE ACCESS
  • Locked
    14.  User Provisioning and Deprovisioning
    3m 39s
    Upon completion of this video, you will be able to describe what user provisioning is. FREE ACCESS
  • Locked
    15.  Identity Federation
    5m 31s
    Upon completion of this video, you will be able to describe how identity federation differs from traditional authentication. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 3 users Rating 5.0 of 3 users (3)
Rating 4.6 of 22 users Rating 4.6 of 22 users (22)
Rating 4.6 of 5 users Rating 4.6 of 5 users (5)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.7 of 45 users Rating 4.7 of 45 users (45)
Rating 4.7 of 62 users Rating 4.7 of 62 users (62)
Rating 4.6 of 1929 users Rating 4.6 of 1929 users (1929)