Managing Security - SY0-601 CompTIA Security+ : 2.1

preview_player
Показать описание

- - - - -
There are various security requirements that need to be considered when managing an organization’s data. In this video, you’ll learn about geographical considerations, SSL inspection, hashing, and API security considerations.
- - - - -

FOLLOW PROFESSOR MESSER:
Рекомендации по теме
Комментарии
Автор

No one does it better than Professor Messer. Thank you for the lessons!

HunterBiden
Автор

Thanks! Been struggling with this subject.

oramos
Автор

What a great video Professor Messer. As always, so well spoken and always so so clear. I couldn't ask for a better video to help me study for my sec+. Thanks so much.

maddisyyn
Автор

Besides the fact this is a great video, I want those hash n eggs my good sir.

Youreabumdude
Автор

Since the information regarding the CA and its signature is being sent over the internet, What would be the result if that traffic was intercepted on its way to the Firewall? Would the attacker be able to continue to incept communications and decrypt the data?

palovich
Автор

Great video professor you really helping a lot of us new to the field

cyberwizardhackdbrain
Автор

If I'm understanding this correctly, the SSL/TLS inspection is basically a man-in-the-middle attack.

johnfanjoy
Автор

i don't understand HASHING: if it's a one way trip, and the example is to store passwords - how do i know what the actual password is, without being able to decrypt it?? Can anyone shed light on this?

AndreiMusat-hj
Автор

i have question sir? if network have attack vectors and vulnerability why is the tor network until now is alive like piratebay with out manage by someone?

cyrildiaz