CompTIA Security+ Full Course: Identity, Access Management & Password Cracking

preview_player
Показать описание
Identity, Access Management & Password Cracking

Exam blueprint objectives covered in this video:
✅2.4 Summarize authentication and authorization design concepts
✅1.2 Given a scenario, analyze potential indicators to determine the type of attack
✅(partial)3.3 Given a scenario, implement secure network designs
✅3.8 Given a scenario, implement authentication and authorization solutions
✅(partial)4.1 Given a scenario, use the appropriate tool to assess organizational security

My name is Andrei Ciorba and I'm on a mission: to give you access to FREE IT certification training on this channel!
I'm a CCIE (36818), CEH, CCNP, CCDP, CCNA (3 tracks), CompTIA Network+, Security+ and CySA+ certified, along with many other Cisco, Fortinet, VMware, Hashicorp, Microsoft and Docker certifications. So I hope I know enough to teach you something! 😊
________________________________________________________
Ready to pass your CompTIA Security+ exam?
👍 If YES, go and take the exam, what are you waiting for?
☕️ If NOT, then you're in the right place!

This series of FREE trainings for CompTIA Security+ will prepare you for the SY0-601 exam so let's get started!
________________________________________________________

💸 If you like what I do and you wish to contribute at least with one coffee, please do! 😃 💸
My deepest thanks, whichever way you choose to contribute!

#comptia #freecomptia #comptiaexam #certification #security #cybersecurity #securityplus
Рекомендации по теме
Комментарии
Автор

You are the easiest to understand. Thank you very much for your in depth explanations.

beltwaybandits
Автор

bro you got a new subscriber... ❤❤❤.. awesome method of teaching....

mzohaib
Автор

59:49 You seem to have forgotten to mention that TACACS+ is a proprietary protocol for Cisco devices

iSgapetti
Автор

you said pap and chap are used with radius, so are they all protocols or is one the framework . very confused on how these are all used together

kyleharry
Автор

Wow your video format is great and very simple yet informative… You get straight to the core.. Def will be using for my Sec + exam

trezg
Автор

At a little after 16:00 when you are talking about checking passwords you said “you’ll never even get to know the users password” so my question is when you hash the users password how is it that you don’t first see the password before hashing it? Just kinda stuck on that part but it would be cool if someone could explain that to me. Thanks!!

joesauceda