CompTIA Cybersecurity Analyst+: Protecting Network Resources
Cyber Security
| Intermediate
- 15 videos | 1h 3m 57s
- Includes Assessment
- Earns a Badge
Authentication controls who gets access to resources. Stronger authentication means greater control over resource access. Discover network protection techniques, including cryptography, biometrics, hashing, and authentication.
WHAT YOU WILL LEARN
-
Recognize how crypto is used to secure data in the enterpriseDifferentiate symmetric from asymmetric encryptionDifferentiate asymmetric from symmetric encryptionIdentify the pki hierarchyRequest a security certificate from a caEncrypt files on a windows system using efsExplain how file integrity can be maintainedEnable file integrity using linux
-
Enable file integrity using windowsRecognize authentication methods used to prove one's identityRequire vpn connections to use mfaRecognize how resource access gets authorizedConfigure centralized authentication using radiusDescribe what user provisioning entailsDescribe how identity federation differs from traditional authentication
IN THIS COURSE
-
4m 39s
-
2m 41s
-
4m 28s
-
5m 57s
-
7m 32s
-
5m 40s
-
2m 54s
-
2m 43s
-
3m 1s
-
3m 54s
-
4m 12s
-
2m 37s
-
4m 31s
-
3m 39s
-
5m 31s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.