There are several protocol good practices. Lisa Bock reviews the importance of using secure protocols, that can provide encryption of both passwords and data.
- [Instructor] In general, when talking … about protocol good practices, … it's best to use protocols that can provide … encryption and authentication. … Now let's take a look at some of the protocols … that will make your network more secure. … HTTPS is HTTP over secure socket layer, … or transport layer security. … Which effectively creates a VPN between the server, … and the client, encrypting all data. … Secure shell is used to log in for remote administration. … For example, if you need to do a file transfer, … on your web hosting site, or even, … remote administration from your Windows machine, … to a Unix environment. … We can see here is where you can download PuTTY, … and I've downloaded and extracted it, … and now I'm running it, and here you can take a look at it. … Go to help, an introduction to PuTTY, … where you can get a little bit more familiar, … where it says PuTTY is a free SSH telnet … and remote log in client for Windows systems. … Network time protocol is used to provide …
- Define “passphrase.”
- Recall the purpose of multifactor authentication.
- Identify the tool used in today’s Windows operating systems to secure the file system.
- Explain what happens when a file is moved into a folder with permissions.
- Name the authentication protocol used in Active Directory.
- Recognize the location of the audit logs.
- Summarize the purpose of hardening.
- Explain the purpose of cryptographic techniques.
Skill Level Beginner
IT Security Foundations: Core Conceptswith Lisa Bock1h 35m Beginner
IT Security: Key Policies and Resourceswith Gregory Michaelidis23m 44s Intermediate
1. Understand User Authentication
2. Understand Permissions
3. Dissecting Audit Policies
4. Server Protection
5. Providing email protection
6. Understand Encryption
Next steps1m 3s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.