From the course: CompTIA A+ Core 1 (220-1201) Cert Prep
Unlock this course with a free trial
Join today to access over 24,900 courses taught by industry experts.
Physical security
From the course: CompTIA A+ Core 1 (220-1201) Cert Prep
Physical security
- Years ago, I had this buddy who had set up a web server that he was convinced was totally unhackable, and he's like, "Mike, I'll pay you X number of dollars." Well, it was a lot. "If you can get to this computer." And I mean he really did have it set up pretty good, really robust firewalling, all kinds of stuff. And I couldn't get into it. But what I could do is I put on a janitorial costume and I walked into his offices, walked up to the server room, and I physically removed the server and took it home. That's a true story, and I won that bet. So in this episode, what I want to talk about is physical security. Now we've been talking about shells. Let's talk about the three shells of physical security. We tend to draw physical security as a big circle around all of our stuff, and that's a fine way to start, but that's actually a little bit inaccurate. So what we have is what we call perimeter security, and this is stuff to keep people from even getting on the property to keep them…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
(Locked)
USB standards9m 53s
-
(Locked)
Understanding USB10m 31s
-
(Locked)
Configuring USB7m 3s
-
(Locked)
Thunder and lightning5m 4s
-
(Locked)
Optical media17m 44s
-
(Locked)
Readers and scanners6m 27s
-
(Locked)
Common peripherals8m 37s
-
(Locked)
Webcams and video conferencing3m 32s
-
(Locked)
Installing and troubleshooting expansion cards5m 27s
-
(Locked)
-
-
(Locked)
Understanding DNS10m 42s
-
(Locked)
Working with DNS6m 56s
-
(Locked)
Windows naming5m 54s
-
(Locked)
Working with workgroups7m 18s
-
(Locked)
Windows sharing with macOS and Linux6m 58s
-
(Locked)
Routers11m 56s
-
(Locked)
Basic router configuration11m 42s
-
(Locked)
Firewall configuration10m 31s
-
(Locked)
Windows Firewall7m 37s
-
(Locked)
Port forwarding7m 5s
-
(Locked)
Advanced router configuration7m 44s
-
(Locked)
Virtual LANs (VLANs)7m 48s
-
(Locked)
Network troubleshooting7m 45s
-
(Locked)
-
-
(Locked)
Beyond the LAN4m 26s
-
(Locked)
Internet tiers5m 41s
-
(Locked)
Broadband connections11m 4s
-
(Locked)
Firewalls and servers5m 56s
-
Telnet and SSH6m 39s
-
(Locked)
Remote desktop connections5m
-
(Locked)
The World Wide Web8m 47s
-
(Locked)
File Transfer Protocol (FTP)6m 49s
-
(Locked)
Email7m 23s
-
(Locked)
Proxy servers7m 27s
-
(Locked)
Virtual private networks (VPNs)7m 41s
-
(Locked)
Internet of Things (IoT)3m 28s
-
(Locked)
Troubleshooting internet connections6m 39s
-
(Locked)
-
-
Laser printers12m 19s
-
(Locked)
Inkjet printers7m 39s
-
(Locked)
Impact printers3m 49s
-
(Locked)
Thermal printers3m 19s
-
(Locked)
Installing a local printer16m 20s
-
(Locked)
Sharing printers9m 46s
-
(Locked)
Installing wireless and cloud printers10m 50s
-
(Locked)
Social engineering13m 17s
-
(Locked)
3D printing6m 19s
-