Identity Controls - SY0-601 CompTIA Security+ : 3.7

preview_player
Показать описание

- - - - -
Verifying the identity of a user is an important step in the authentication process. In this video, you’ll learn about identity providers, certificates, tokens, and SSH keys.
- - - - -

FOLLOW PROFESSOR MESSER:
Рекомендации по теме
Комментарии
Автор

Love the practical example of the ssh-keygen, always good to see these things in effect so that you can really lock it in your mind.

weidup
Автор

This is such a simple explanation of SSH use! currently self studying for my Sy0-601 and your videos are tremendous!!
Thank you Prof. M!!

JB-spoke
Автор

Thank you Professor Messer for this explanation.

seant
Автор

Thanks 🙏 so much .
I am great fan of you man .❤️

adelasran
Автор

thank you for the great info much appreciated

ziminghao
Автор

Is this not less secure than passwords as now all they have to do is get control of your local machine and now have access to the kingdom?

AyearoldARAB
Автор

this may be a stupid question: If a hacker has access to the server, can they create this Key pair to gain constant access to the hacked server? And if so, can they then remove access from the owner?

amylara