CompTIA Cybersecurity Analyst+: Protecting Network Resources

Cyber Security    |    Intermediate
  • 15 Videos | 1h 11m 27s
  • Includes Assessment
  • Earns a Badge
Likes 32 Likes 32
Authentication controls who gets access to resources. Stronger authentication means greater control over resource access. Discover network protection techniques, including cryptography, biometrics, hashing, and authentication.

WHAT YOU WILL LEARN

  • recognize how crypto is used to secure data in the enterprise
    differentiate symmetric from asymmetric encryption
    differentiate asymmetric from symmetric encryption
    identify the PKI hierarchy
    request a security certificate from a CA
    encrypt files on a Windows system using EFS
    explain how file integrity can be maintained
    enable file integrity using Linux
  • enable file integrity using Windows
    recognize authentication methods used to prove one's identity
    require VPN connections to use MFA
    recognize how resource access gets authorized
    configure centralized authentication using RADIUS
    describe what user provisioning entails
    describe how identity federation differs from traditional authentication

IN THIS COURSE

  • Playable
    1. 
    Cryptography Primer
    4m 39s
    UP NEXT
  • Playable
    2. 
    Symmetric Cryptography
    2m 41s
  • Locked
    3. 
    Asymmetric Cryptography
    4m 28s
  • Locked
    4. 
    Public Key Infrastructure
    5m 57s
  • Locked
    5. 
    Request a PKI Certificate from a Windows CA
    7m 32s
  • Locked
    6. 
    Use Windows EFS File Encryption
    5m 40s
  • Locked
    7. 
    Fingerprinting, Hashing
    2m 54s
  • Locked
    8. 
    File Hashing in Linux
    2m 43s
  • Locked
    9. 
    File Hashing in Windows
    3m 1s
  • Locked
    10. 
    Authentication
    3m 54s
  • Locked
    11. 
    Configure MultiFactor Authentication for VPN Clients
    4m 12s
  • Locked
    12. 
    Authorization
    2m 37s
  • Locked
    13. 
    RADIUS, TACACS+
    4m 31s
  • Locked
    14. 
    User Provisioning and Deprovisioning
    3m 39s
  • Locked
    15. 
    Identity Federation
    5m 31s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE