Secure Network Architecture Snapshots
VDI/VDE and Non-Persistence VMs as Files
Risks Associated with Virtualization Running Kali Linux in a VM
Using Command-Line Tools
Windows Command Line Linux Terminal
Understanding Switches and Getting Help
Understanding Case
Ping
Using Ping to Check Name Resolution Beware of Firewalls Using Ping to Check Security Posture Ipconfig, ifconfig, and ip Netstat Tracert Arp
Chapter 1 Exam Topic Review
Chapter 1 Practice Questions
Chapter 1 Practice Question Answers
Chapter 2 Understanding Identity and Access Management
Exploring Authentication Concepts
Comparing Identification and AAA Comparing Authentication Factors Something You Know Something You Have Something You Are Somewhere You Are
Dual-Factor and Multifactor Authentication Summarizing Identification Methods Troubleshooting Authentication Issues
Comparing Authentication Services
Kerberos
NTLM
LDAP and LDAPS Single Sign-On
Managing Accounts
Least Privilege Need to Know Account Types
Require Administrators to Use Two Accounts Standard Naming Convention Prohibiting Shared and Generic Accounts Disablement Policies Recovering Accounts Time-of-Day Restrictions Expiring Accounts and Recertification Account Maintenance Credential Management
Comparing Access Control Models
Role-Based Access Control Using Roles Based on Jobs and Functions Documenting Roles with a Matrix Establishing Access with Group-Based Privileges Rule-Based Access Control Discretionary Access Control STDs and DACLs The Owner Establishes Access Beware of Trojans Mandatory Access Control Labels and Lattice Establishing Access Attribute-Based Access Control
Chapter 2 Exam Topic Review
Chapter 2 Practice Questions
Chapter 2 Practice Question Answers
Chapter 3 Exploring Network Technologies and Tools
Reviewing Basic Networking Concepts
Basic Networking Protocols Implementing Protocols for Use Cases