2.1 – Security Measures

Physical Security

Information technology includes important physical security controls. In this video, you’ll learn about barricades, access control vestibules, badge readers, video surveillance, and more.

Physical Access Security

Most organizations will use many different methods of providing physical access. In this video, you’ll learn about key fobs, smart cards, mobile digital keys, biometrics, and more.

Logical Security

We rely on many different logical security methods to protect our systems. In this video, you’ll learn about least privilege, access control lists (ACLs), zero trust, multifactor authentication, and more.

Authentication and Access

The authentication process is critical for maintaining the security of our data. In this video, you’ll learn about security assertion markup language (SAML), single sign-on (SSO), just-in-time access, mobile device management (MDM), and more.

2.2 – Windows Security

Defender Antivirus

Defender Antivirus is a fully-featured anti-virus application included with the Windows operating system. In this video, you’ll learn how to activate and deactivate Defender and how to keep the Defender signatures updated.

Windows Firewall

The Windows Firewall provides built-in security technology to prevent any unwanted connections. In this video, you’ll learn how to enable and disable Windows Firewall, important configuration options, and additional firewall settings.

Windows Security Settings

Windows includes a number of important security features. In this video, you’ll learn about Windows authentication, users and groups, login options, passwordless authentication, NTFS vs. Share permissions, and more.

Active Directory

Active Directory is the foundation of most business networks. In this video, you’ll learn about Active Directory services, adding a device to a Windows Domain, adding Group Policies, configuring folder redirection, and more.

2.3 – Wireless Security

Wireless Encryption

Our 802.11 wireless network standards include numerous security features. In this video, you’ll learn about wireless authentication, WPA2, WPA3, and AES encryption.

Authentication Methods

Our enterprise networks can choose from many different authentication standards. In this video, you’ll learn about RADIUS (Remote Authentication Dial-in User Service), TACACS (Terminal Access Controller Access-Control System), and Kerberos.

2.4 – Malware

Malware

Malware can be a significant security issue for any network. In this video, you’ll learn about trojan horses, rootkits, spyware, keyloggers, ransomware, and more.

Anti-malware Tools

Security professionals have many tools available to combat malware. In this video, you’ll learn about the Windows Recovery Environment (WinRE), Endpoint Detection and Response (EDR), email gateways, software firewalls, and more.

2.5 – Social Engineering

Social Engineering

Social Engineering can take many different forms. In this video, you’ll learn about phishing, shoulder surfing, tailgating, impersonation, and more.

Denial of Service

A denial of service can cause significant outages and downtime. In this video, you’ll learn about denial of service attacks and distributed denial of service attacks.

On-Path Attacks

Attackers have many different techniques to gain unauthorized access to information. In this video, you’ll learn about on-path attacks, ARP poisoning, and wireless evil twins.