In this video you will learn about network policies & best practices such as: privileged user agreements, password policies, onboarding & off-boarding procedures, licensing restrictions,...
In this video you will learn about physical security devices such as: motion detectors, video surveillance, asset tracking tags, tamper detection, badges, biometrics, smart cards,...
In this video you will learn about authentication & access controls such as: RADIUS, TACACS+, kerberos, SSO, local authentication, LDAP, certificates, auditing & logging, multi-factor...
In this video you are going to learn about the basics of a wireless network such as: WPA, WPA2, TKIP, CCMP, EAP, & geofencing. WPA...
In this video you will learn about networking attacks such as: DoS, social engineering, insider threats, logic bombs, rogue access points, evil twins, war-driving, phishing,...
In this video you will learn about network device hardening best practices such as: changing default credentials, avoiding common passwords, upgrading firmware, patching & updating,...
In this video you will learn about network mitigation techniques such as: signature management, changing native VLANs, switch port protection, network segmentation, privileged user account,...
In this video you will learn how to identify a problem; establish a theory of probable cause; test the theory to determine the cause; establish...
In this video you will learn about various hardware and software networking tools in addition to various command line interface tools. Hardware Tools Crimper A...
In this video you will learn about wired network troubleshooting as it relates to bad cables or connectors, bad ports, opens & shorts, splitting pairs...