CompTIA Security+ SY0-601 – 3.9 Implement public key infrastructure. Part 1

Introduction to PKI In this video, I’m going to be talking about the public key infrastructure. What exactly is it, where do we use it, and what you need to know about it for your exam. So let’s get started. So before I get into this, I want to just quickly remind you where we left off in the topic of hybrid cryptography. So remember, hybrid cryptography was when we used symmetric and asymmetric in order to pass data. So what you were doing was that you were encrypting data…

CompTIA Security+ SY0-601 – 3.8 Implement authentication and authorization solutions. Part 2

Access control schemes In this video, I’m going to be talking about Access Control schemes. Access Control is basically, by its definition, access Control is controlling the access between subjects and objects, ensuring that the subject meets the object’s access requirement. Hey, what does all that mean? All that what means is that the subject being the users. So subjects are basically users and people that you want to access. Your resources and objects are things you’re trying to access. File servers, folders, databases, email, those are the objects on…

CompTIA Security+ SY0-601 – 3.8 Implement authentication and authorization solutions. Part 1

Authentication management In this video, I’m going to be talking about authentication management and some things we can do in managing authentication. So before we get into this, don’t forget there is identification and authentication. Identification is basically your username saying, hey, I’m Bob, but authentication is being able to prove that you really are Bob. Generally with a password or a smartphone smart card or certificate or some kind of biometrics. Let’s take a look at some terms here. So, the first thing I have up is password keys…

CompTIA Security+ SY0-601 – 3.6 Apply cybersecurity solutions to the cloud

Cloud Solutions controls In this video, we’re going to be talking about some solutions when managing cloud platforms. Let’s get into it. So, a couple of things here. When using cloud platforms in order to host application or data, one of the good things to get is called a CASB, a cloud access security broker. Here’s an example of one. Once in McAfee, a cloud access security broker. Now what this is, a cloud access security broker is basically a middle piece of software that sits between your users and…

CompTIA Security+ SY0-601 – 3.7 Implement identity and account management controls.

Identity and account types In this video we’re going to be talking about identity and account types. So when you’re thinking of identity, what comes to mind? Your probably username comes to mind. That’s what comes to my mind right away. How do I identify myself to a computer? That’s generally done with a username. But there are other ways to identify yourself to a computer. Let’s take, take a look at some terms that we need to understand. The first thing we have is what is known as an…

CompTIA Security+ SY0-601 – 3.5 Implement secure mobile solutions. Given

Mobile Connection methods and receivers In this video, we’re going to be talking about mobile device connection methods and how to receive data. So this here quick video. You guys should be familiar with everything I’m about to tell you here. Just something in the objective. Let’s just get through this pretty quickly. What we’re talking about here. How does mobile devices connect to your network? Well, you guys already know a bunch of them. Number one, your cellular networks. So LTE connections, four G, five G connections that we…

CompTIA Security+ SY0-601 – 3.4 Install and configure wireless security settings

Wireless Security In this video, I’m going to be talking about wireless security and a whole lot of it. Now, wireless security is basic, simple configurations on your wireless devices. So we’re going to be taking a look at my sonic wall to configure its wireless security. I’m going to show you guys how to configure it using both homebase method, which is going to be more of a pre shared key, and then we’ll take a look at how to do it, more of an enterprise way, and a…

CompTIA Security+ SY0-601 – 3.3 Implement secure network designs. Part 4

Jump and Proxy servers In this video I’m going to be talking about a jumpservice and proxy service. Let’s get started. Quick video, nothing complex. The first thing I will talk about is something called a jump server. Now all you need to know for your exam is a jump server is basically a server that connects this similar security zones. So take for example this diagram I have here. I have my land and I have my DMZ. So if I want to connect, if I want to have…

CompTIA Security+ SY0-601 – 3.3 Implement secure network designs. Part 3

Firewalls In this video I’m going to be talking about one of the most basic network devices out there and that every computer and network should have is a firewall. Let’s get into it. First of all, what is the most basic function of a firewall that will be to block ports coming in. So firewall is a wall. Basically walls have two sides to it. It your firewall is connected to your internet, your Wang side, and it also has a connection to your land side. So it’s always…

CompTIA Security+ SY0-601 – 3.3 Implement secure network designs. Part 2

VLAN’s and Port Security In this video, I’m going to be talking about VLANs and securing of switches, also known as port security. We’ll take a look at some ways to configure a switch. Now, before I get into this video, I’m going to be doing some hands on with you guys. I’m going to show you guys how to configure VLANs on a Cisco switch using a command line. This is not going to replace a CCNA class. I’m just going to give you an introduction to it. If…

img