Logical Security - CompTIA A+ 220-1002 - 2.2

preview_player
Показать описание
- - - - -
There are many different ways to layer security in the enterprise. In this video, you’ll learn about Active Directory’s Group Policy feature, VPN connectivity, data loss prevention, and more.
- - - - -

FOLLOW PROFESSOR MESSER:
Рекомендации по теме
Комментарии
Автор

Thank god for this guy. This information will literally put food on your table when you learn, interview and get hired. This man is a saint.

TheAnalystradioprogram
Автор

A+ certified now. Thanks for all the help!

insanebrobot
Автор

These videos you have done are literally better and more high quality then the ones I was given on a course I paid for.... Literally learning more via these too. Thank you so much

marikishtar
Автор

Lol nice I see you using the blizzard Authenticator as an example cuz most of us have used it. You know your audience!

ZombieHunter
Автор

God bless you, Professor. You're a good man for giving us these videos and the other content and services you provide.

arekgalang
Автор

Not only do the videos teach you about IT, but the comment section is ripe with "what if" scenarios that are answered by the professor himself. Good stuff

TheMaxxbiff
Автор

Are VPN tunnels vulnerable to attack while the tunnel is initially forming? Can someone simply capture the packets to and from the VPN concentrator during tunnel formation and end up with the encryption key?

danielmorrison
Автор

Thank you very much for your videos. I'm currently already applying for IT jobs and I've already gotten a few interviews, your videos have helped immensely. Hopefully I can take the tests for the A+ soon, pass those, and move onto specializing more into the cybersecurity industry..

SURPRISEURBAD
Автор

"1 2 3 4 5? That's amazing! I have the same combination on my luggage!"

amundjones
Автор

How do both the user device and authentication device know the same code if it changes constantly? Does it get transmitted? Or do the devices both have a key that generates numbers based on the key, and the synchronized
time?


Would it be correct to say "Gateway" instead of ingress or egress of an interface?

hackingmongoose