Taking my 701 on the 8th wish my luck yall!🙏🏾update no luck guys got a 700 out of 750! At least I get a retry before I have to pay to take the exam again lol… update 08/15/24 took the exam again and passed with a 780!
@JacobCMayer4 ай бұрын
Good luck!
@zeevibeztv4 ай бұрын
Let me know how it goes man I take mine in three weeks
@shaylewis944 ай бұрын
Good luck!
@davone_ward4 ай бұрын
@@zeevibeztv I will!
@andrewdurham2014 ай бұрын
Good Luck brodie!!
@stellabello98359 ай бұрын
Thank you Professor. May God blessed you .
@elimessan610510 ай бұрын
Thanks Professor, love you fr my boy
@gre3kg0dmm1.5-pr7ev6 ай бұрын
Love listening to these on the way to work
@Unknownlifters4 ай бұрын
Did you pass?
@jacquelinetiongco8088 Жыл бұрын
thanks Professor Messer!
@CyberJuke55 ай бұрын
5:00 is there a way to falsify the CA signature when creating a new certificate?
@lucidful7 ай бұрын
do you have any quizzes or brain refreshers for the topics you go over?
@HIDNotfound3 ай бұрын
The PC image used in this video is for sure an eMachine from the 90's. Pentium II baby!!
@SupaMan2122Ай бұрын
I had one 😂
@DomRyanFilms5 ай бұрын
This is sooo much simpler than the o2o program for security+ at Syracuse.
@ToluDavids7 ай бұрын
Thank you Professor. Is it possible for the device to be in the wrong hands and this individual tries to log into the company's network. If yes, how is this fixed since the device is authorized to log into the network, and wouldn't that be permitting an intruder ?
@Not-Your-Content-Creator7 ай бұрын
Isn't that where passwords would come in? Sure they have the device, but if they don't have an account or someone else's account details, they can't log in. That's also where Two Factor Authentication would come in, requiring maybe a password and access to a phone or email to verify Authentication.
@TheDwilliams10002 ай бұрын
Also, if that company is able to know that that specifi device is missing, they could possibly remote wipe the device. Yet, I believe that the two factor method should be able to stop a potential bad guy from infiltrating a company network.
@AngelyMoreno-gd1of7 ай бұрын
👏👏👏👏 thank you!!!
@elizabethcogley22707 ай бұрын
So could you not fixed this problem though by making one admin account for all those individuals? They would all get the same Username and password. Then to make it more serious, you use a deterrent control type, as in threating to be fired if you give out this info to anyone who is not shipping? Or am I dumb and not understanding what an Abstraction is?
@Not-Your-Content-Creator7 ай бұрын
You definitely would not want to just give everyone an admin account. 1, Not every person needs every permission. They should only have the permissions required to to their job. 2, Having every single person share the same account is a gross violation of any non-repudiation countermeasures. Non-Repudiation means we can verify who did what. If 100 people share one admin account, and taht admin account deletes an important file, for example, we cannot know for sure who deleted that file.
@timothygorden76897 ай бұрын
if everyone shares the same account it would be hard to tell who did what. If someone orders the wrong items, how would you tell who it was? Another reason not do have one admin account is that if someone gains unauthorised access to it, they basically hold the master key to everything.
@valentinrafael92017 ай бұрын
Unless they use the same account at different times, so you could know that, between 9am to 5pm, it had to be person A, you can't really tell who did what otherwise.
@jakeforaker78596 ай бұрын
I mean your idea of condensing down access is correct, but just implemented in the wrong area. What if one of the users with the admin access becomes disgruntled and decides to sabotage the data? We need to track any breaches, errors, or data leaks to those users so we dont want to limit our data coming from them and their devices. So, instead we put in a authorization model like prof. Messer explains to condense down authorization roles to the hundreds, or thousands of users in the work environment. That way we can track exactly who attempted to access what data, and also so those users who are authorized can access all the data from the companies internal servers. Its a bridge of authentication, authorization, and the accounting part is for security officials to monitor and patch the bridge :)