Time
33 hours 23 minutes
Difficulty
Beginner
CEU/CPE
33

Video Transcription

00:00
Hello and welcome back to Sai Berries. 2019 Comp Tia Security Plus Certification
00:06
Preparation course
00:08
We'll continue our discussion of marginal to
00:11
and the top of discussion will be Domain number two, which is titled Technologies and Tools.
00:18
Our very last objective for this particular domain will be 2.6, which is titled Given a Scenario, Implement Secure Protocols.
00:28
This brings us to our first pre assessment question.
00:31
What you need to do is turn on whether or not this particular statement here
00:34
is either true or is it false?
00:37
And it reasons follows FTP s that uses TCP Port 9 89 last 9 90 can download very large files quickly. Is that true or false?
00:50
If you select the two, you're absolutely correct.
00:54
Let's not take a look again at the
00:57
topics of concern or topics of hot that we need to highlight in regards to this last objective with this title. Given a scenario, implement secure protocols.
01:10
First day we need to begin by first defining exactly what is a protocol. Now, when you think about a protocol, it's a set of rules and guidelines for communicating data.
01:19
Here are some protocols that you need to be a way off
01:23
which we have DNS sick, which is a specifications for securing your DNS information
01:32
s stands for secure shell, which is be invented back in 1992 to replace telling that so they could run command securely. It's common use when you want to perform remote access onto your writers.
01:45
Then we have to secure multi purpose and that male extension which the five they stand about what you can secure to communicate between two or more parties over email.
01:55
Then we have a secure riel time protocol which you see miss it here,
02:00
which again it uses a cure video constant traffic. It normally uses TCP Port
02:05
50 61.
02:07
Then we have the lightweight directory access protocol. Air naps
02:12
basically performed. The same function is their debt. However, it's not secure and could be attacked by L DAP injection, where the attacker tries to gain information from your director services.
02:24
Obviously, we have empty PS, which is basically a secure fire transport protocol, is much fascinating what we call secure file transfer protocol, as it uses to ports 9 89 and 1990 it's used for Donald very large fouls very quickly.
02:44
Next, I don't want to take a look at
02:46
some additional One is S F T P,
02:49
which stands for ssh
02:51
file transfer protocol or secure file transfer protocol. It's a separate protocol packing ssh that works in a similar way over a secure connection.
03:00
Then we have It s in the MPV version three, which is a cure aversion off simple network management protocol that collects reports and statistics from your network devices.
03:12
Then we have ssl slash TLS, which is a transport layer security. And now, obviously the SSL is for the most part, is a legacy type,
03:23
which most nowadays is being replaced by TLS because it much more secure.
03:30
They use a cryptographic protocol designed to provide communications securely over your computer network.
03:36
Https. Which stands were hypertext transport protocol.
03:39
Basically, it's when you use http and Adam to your shopping cart. You were *** being converted to a secure server that uses what we call https so that your session and secure and you condense into your your creditors credit card and so forth.
03:53
Then we have secure pop
03:57
post office protocol and Internet message access protocol protocol used by your email clients. to communicate with your various email servers.
04:09
Continue on with this particular objective here again, we would be turned out teaching toward use cases ranging from voice and video all way down to your subscription services.
04:21
Now be unknown. A general meeting and functionality of the protocol. You need to know the scenarios in which you would applaud him,
04:29
and we're going to highlight some of these in the next video. The first where we need to be aware of is a very important concept called boards and video Voice translates to phone calls while video translate, video calls or video conferences.
04:42
Then we have the time synchronization. Your SIM server relies on times organization from scratch UM zero or atomic clock.
04:49
It's time so so that the time can be synchronized and the events can be put into what we call chronological order
04:57
email and, well, Web mail is a type of email that you access via your Web browser, but desktop or desktop based email programs and mobile email APS are also popular choices as well.
05:10
We also have power transfer, which is a transmission of your computer files. Do a communication channel from one computer system to another
05:17
directors, services or name service. What it does. Essentially, it maps the name your network resource is to their respective what we call your network address.
05:29
Remote access.
05:30
Basically, that means is the ability to access computer or your network remotely through a network connection? DNS. With stands with domain name and services, basically is a process by what your Internet user receives the address of the domain. They're looking for
05:46
routing and switching for routing and switching. There are several protocol to be aware of. Rip
05:50
I. G R P
05:53
Open, Shortest Path first and Be GP, or what we call common examples off routing and switching type that we need to be aware of.
06:00
Then we have a term called network address allocation.
06:04
Basic. This deal with the A si fi or dynamic host configuration protocol is most commonly used. This be works via what we call broadcast traffic initially
06:15
subscription services where you pay a monthly fee and you can download applications opposite in this case immediately.
06:23
This brings us to our post assessment quiz,
06:26
and the question is asked follows what you need to determine whether or not the statement is true. Off balls
06:31
and it reads as follows.
06:33
Post up with protocol and Internet messages, Access protocol or I'm map or protocol used by your email clients. Communicate with your email service. Is that true or false?
06:46
If you said to you absolutely correct.
06:48
Now it's time to turn our attention towards the key takeaways from this particular video presentation
06:55
we learned that FTP s that uses TCP Port 1989 and 19 Ken Doll. Oh, very large files quickly.
07:02
We also discussed S MP version three, which is a secure version of your simple network management protocol that collects reports and statistics from your network devices.
07:13
Domain naming resolution is a process in which the Internet user receives the address of the domain.
07:19
They were looking for
07:21
hypertext transport protocol or a CPS when you using the https. For example, when you engaged in shopping on the Internet
07:30
and adding items in your shopping cart, you would then be diverted to a secure server that uses 80 TVs so that your session is secure and you can then enter your credit card detail information. At that point, time
07:43
and our upcoming video would be taking a look at a brand new domain
07:46
in the next video, Siri's and it's titled Domain three. Architecture and design
07:54
look forward to seeing you in a very next videos.

Up Next

CompTIA Security+

Interested in the cybersecurity industry? The CompTIA Security+ is the gold standard for those looking to enter the cybersecurity industry. Join thousands of professionals who have gained this certification through this course and launched their careers in information security.

Instructed By

Instructor Profile Image
Jim Hollis
Independent Contractor
Instructor