Security does not stop at the user interface. Software relies on network protocols that could be vulnerable. This course will help you better understand your system’s vulnerabilities and empower you to know and configure the mechanisms necessary to protect your network protocols.
Who should take this course?
This course is designed for the intermediate level OnBase System Administrator. It is recommended that you have completed System Administration (ILT) or you have comparable on-the-job experience with OnBase administrative functions.
2 hrs 25 mins
Available with Premium Subscription
Please login to begin this course.
There are no prerequisites for this course.
- Network Vulnerabilities
- Packet sniffers or protocol analyzers
- Modern Encryption
- RSA and AES Encryption
- Transport Layer Security (TLS)
- Public Key Infrastructure (PKI)
- Digital Certificates
- HTTP Encryption
- Encrypting File-Access on Network Shares
- Distributed Disk Services
- Encrypted Alpha Keywords
- Default Accounts Best Practices
- User Group Rights
- Override Privileges
- Security Keywords