Learn your way! Get started

CompTIA NET+ Cert, Part 08 of 17: System Security

with Patrick Loner


Watch trailer


Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack

Release date 5/12/2014
Level Intermediate
Runtime 1h 13m
Closed captioning Included
Transcript Included
eBooks / courseware Included
Hands-on labs N/A
Sample code N/A
Exams Included


Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

Information security is of the utmost importance regardless of the size of an organization. As a network technician security might not be your primary responsibility but you still will deal with it and will be held accountable for security breaches under your watch. In this course we are going to go through a number of security fundamentals, principles, devices, and configurations. You’ll be able to identify key procedures such as authentication and authorization, discuss and implement encryption technologies, and utilize security tools.

Prerequisites

This course assumes the user has some experience with computer hardware, software, and understands the concept of a computer network. The user should have also viewed CompTIA NET+ Cert: Remote Networking course before viewing this course.

Learning Paths

This course will help you prepare for the following certification and exam:
CompTIA Net+ Certification
N10-006: CompTIA Net+ Certification

Meet the

Patrick Loner Patrick Loner has certifications for MCSA, MCSE, MCITP, A+, Network+, Security+, and more. He has been working as a Microsoft Certified Trainer, network administrator, and network consultant for over ten years. He has over a decade of experience working with and teaching about Windows networks with client and server operating systems. He has guided many students toward Microsoft and CompTIA certifications. Most recently, he has worked as a freelance trainer and network consultant specializing in Windows Server 2008 and Microsoft Exchange 2007 and Exchange 2010 implementations, design, and upgrades. Patrick continues to branch out now working with and training on Windows Server 2012, Windows 8, Exchange 2013, and System Center Configuration Manager 2012.


Course outline



System Security

Security Basics (28:50)
  • Introduction (00:19)
  • Security Factors (01:34)
  • Least Privilege (01:08)
  • Non-Repudiation (01:21)
  • Threats (01:33)
  • Vulnerabilities (02:31)
  • Attacks (01:41)
  • Risks (02:03)
  • Unauthorized Access (01:21)
  • Data Theft (01:19)
  • Hackers and Attackers (01:49)
  • Permissions (01:36)
  • NTFS Permissions (02:06)
  • Group Policy (01:35)
  • Demo: Sharing (01:39)
  • Demo: NTFS Permissions (04:45)
  • Summary (00:21)
Authentication Methods (21:15)
  • Introduction (00:24)
  • Authentication (01:48)
  • User Name/Password Auth (00:59)
  • Strong Passwords (02:58)
  • Tokens (01:30)
  • Biometrics (01:25)
  • Multi-Factor Authentication (00:47)
  • Mutual Authentication (01:02)
  • SSO (01:30)
  • EAP (01:44)
  • Kerberos (02:08)
  • WirelessAuthenticationMethods (01:12)
  • Wireless Authentication (Cont) (03:15)
  • Summary (00:25)
Encryption Methods (23:33)
  • Introduction (00:26)
  • Encryption (01:48)
  • Encryption & Security Goals (01:36)
  • Key-Based Encyption (01:09)
  • Key-Based Encryption (Cont) (02:33)
  • WEP (01:13)
  • WPA/WPA2 (01:41)
  • Digital Certificates (01:44)
  • Certificate Encryption (01:09)
  • PKI (01:46)
  • Certificate Authentication (01:57)
  • DES (01:10)
  • Encryption Devices (01:23)
  • SSL (01:04)
  • Encryption Using SSL (00:47)
  • TLS (01:35)
  • Summary (00:25)