- Firewalls are a critical part of the defense of all PCs and networks. Firewalls can be either software- or hardware-based, but all firewalls are intended to restrict the connections and types of connection into and out of a host or network. Firewalls can't be the only defense used to guard against the increasing number of threats to computers and networks. Additional security appliances and programs, such as IPS and IDS, port and network scanners, as well as a variety of vulnerability assessment tools should be deployed to ensure that as many precautions as possible are taken. This course discusses many of these security measures and explains the properties and operations of firewalls. This course prepares the learner for the CompTIA Network+ 2012 certification exam N10-005. Network+ is sometimes referred to as N+ or Net+.
- Virtualization has become more and more prevalent in modern networks as
IT staff seek to increase availability, without increasing hardware and
bandwidth costs. This course examines what virtualization is and the
technologies that can be used to accomplish virtualization. This course
also examines different types of virtualization technologies, the SNIA
virtualization taxonomy, block-level and file-level virtualization
technologies, virtual provisioning, and different types of LUNs.
Finally, this course examines EMC Invista and Rainfinity, and how they
can be used to implement a virtualization environment. This course helps
to prepare the learner for the E20-001 Information Storage and
- Security mechanisms and account management are important parts of creating a secure networking environment. This course examines different authentication services and protocols along with biometric security mechanisms and other access security mechanisms such as tokens and smart cards. This course also examines how LDAP can be used to create security in an environment along with risk reduction mechanisms such as policies for mandatory vacations, job rotation and separation of duties. This course helps prepares the learner to write the CompTIA Security+ Certification SYO-301.
- Guaranteeing end-to-end security in communication, document, and database infrastructures is incredibly important in internetworking environments. This course examines cryptography and the different algorithms, ciphers and tools that can be used to secure information, and to protect against attacks. Symmetric and asymmetric algorithms are examined, along with block and stream ciphers, one-time pads, and steganography. This course also examines message authentication, digital signatures, Public Key Infrastructures and certification authorization and revocation. This course helps prepares the learner to write the CompTIA Security+ Certification SYO-301.
- Security and networking are important in the computer world. This trend has only increased as the average person's interaction on the Internet continues to grow. This course examines security concepts and technologies, such as encryption, authentication, firewalls, and malicious content scanners while also examining malicious content types and the preventative measures that can be taken to guard against them. This course also examines network connectivity, including wired and wireless, and the components and communication mechanisms, such as cables, protocols and devices, used in order to allow two or two million computers to communicate with each other and to share information. This course is one of a series in the SkillSoft learning path that covers the objectives for the CompTIA 220-701: A+ Essentials exam which is half of the requirement necessary to acquire the CompTIA A+ certification.