Category Archives: Uncategorized
3. Data Classification (OBJ 1.4) Data classification occurs during the data creation stage of your data lifecycle. Now, data classification is the process of applying confidentiality and privacy labels to a given piece of information. I personally find that the best way to think about this is if you think of any kind of military […]
1. Data Security (OBJ 1.4) In this section of the course, we’re going to discuss data security. Now, throughout this section, we’re going to be focused again on domain one security architecture, and specifically objective One four. Given a scenario, you must implement data security techniques for securing enterprise architecture. Now, to secure data in […]
1. Cryptography (OBJ 1.7) In this section of the course, we’re going to discuss cryptography and public key infrastructure. Throughout this section, we’re going to be focused on domain one security architecture, and specifically Objective 1. 7, which states that you must explain how cryptography and public key infrastructure, or PKI, support security objectives and […]
10. Root of Trust (OBJ 1.5) In this lesson we’re going to talk about the concept of a hardware root of trust, or rot. Now, a hardware root of trust is the foundation upon which all secure operations of a computing system are going to depend. It contains the keys used for cryptographic functions and […]
8. Authentication Protocols (OBJ 1.5) There are numerous different authentication protocols in use within our enterprise networks. This includes radius cactus plus diameter. LDAP kerberos eight, two, one, x and EAP. First. We have the radius protocol. The Remote Authentication Dialing User Service Protocol is a network protocol that’s used to authenticate users, authorize them […]
5. Implementing Password Policies (OBJ 1.5) In this lesson, we’re going to jump into the lab and I’m going to show you how to create good group policies for your passwords. We’re going to focus on four key areas. We’re going to talk about complexity length, password reuse and password age. Let’s go ahead and […]
1. Authentication and Authorization (OBJ 1.5) In this section of the course, we’re going to discuss authentication and authorization. Throughout this section, we’re going to be focused on domain one security architecture. Specifically, Objective 1. 5 given a scenario, you must analyze the security requirements and objectives to provide appropriate authentication and authorisation controls. Now, […]
25. ZTP Lab Now I’m going to show you the ZTP process, how this looked like. Let me quickly show you the default configuration that the device is sipped with. So if we go and check showrun system here you can see that the system wide configuration is pointing towards Aztp Viptella. com. And if […]
23. 3.8 iPXE Now we reach to section three eight, that is last. In this particular section we have to learn understand about day zero provisioning methods ipxe, PNP and ZTP. After this video we have three follow up video where we’ll learn more about ZTP and PNP or ZTP and PNP. So let’s understand […]
21. Network Subscription Next important topic we have about the network subscription. Let’s try to understand that how we can subscribe a service and obviously this particular section we have follow up section with the lab. So in the lab we’ll understand more about the subscription and how with the push method the telemetry works. […]