2.1 – Security Measures
Physical Security
Information technology includes important physical security controls. In this video, you’ll learn about barricades, access control vestibules, badge readers, video surveillance, and more.
Physical Access Security
Most organizations will use many different methods of providing physical access. In this video, you’ll learn about key fobs, smart cards, mobile digital keys, biometrics, and more.
Logical Security
We rely on many different logical security methods to protect our systems. In this video, you’ll learn about least privilege, access control lists (ACLs), zero trust, multifactor authentication, and more.
Authentication and Access
The authentication process is critical for maintaining the security of our data. In this video, you’ll learn about security assertion markup language (SAML), single sign-on (SSO), just-in-time access, mobile device management (MDM), and more.
2.2 – Windows Security
Defender Antivirus
Defender Antivirus is a fully-featured anti-virus application included with the Windows operating system. In this video, you’ll learn how to activate and deactivate Defender and how to keep the Defender signatures updated.
Windows Firewall
The Windows Firewall provides built-in security technology to prevent any unwanted connections. In this video, you’ll learn how to enable and disable Windows Firewall, important configuration options, and additional firewall settings.
Windows Security Settings
Windows includes a number of important security features. In this video, you’ll learn about Windows authentication, users and groups, login options, passwordless authentication, NTFS vs. Share permissions, and more.
Active Directory
Active Directory is the foundation of most business networks. In this video, you’ll learn about Active Directory services, adding a device to a Windows Domain, adding Group Policies, configuring folder redirection, and more.
2.3 – Wireless Security
Wireless Encryption
Our 802.11 wireless network standards include numerous security features. In this video, you’ll learn about wireless authentication, WPA2, WPA3, and AES encryption.
Authentication Methods
Our enterprise networks can choose from many different authentication standards. In this video, you’ll learn about RADIUS (Remote Authentication Dial-in User Service), TACACS (Terminal Access Controller Access-Control System), and Kerberos.
2.4 – Malware
Malware
Malware can be a significant security issue for any network. In this video, you’ll learn about trojan horses, rootkits, spyware, keyloggers, ransomware, and more.
Anti-malware Tools
Security professionals have many tools available to combat malware. In this video, you’ll learn about the Windows Recovery Environment (WinRE), Endpoint Detection and Response (EDR), email gateways, software firewalls, and more.
2.5 – Social Engineering
Social Engineering
Social Engineering can take many different forms. In this video, you’ll learn about phishing, shoulder surfing, tailgating, impersonation, and more.
Denial of Service
A denial of service can cause significant outages and downtime. In this video, you’ll learn about denial of service attacks and distributed denial of service attacks.
On-Path Attacks
Attackers have many different techniques to gain unauthorized access to information. In this video, you’ll learn about on-path attacks, ARP poisoning, and wireless evil twins.