Security professionals use cryptography for several different reasons. Explore those reasons using the four goals of cryptography. In this video, learn how cryptographers work to achieve the four major goals of cryptography: confidentiality, integrity, authentication, and non-repudiation.
- [Instructor] Data centers contain a wide variety … of electronic equipment that is very sensitive … to its operating environment. … One of the major risks to this equipment … comes in the form of an environmental threats. … These threats exist if equipment is not operated … in an appropriately controlled facility. … Data center environmental controls … seek to maintain a stable environment … that's friendly for electronic equipment. … The first environmental characteristic … that data center engineers worry about … is the air temperature. … Electronic equipment generates a significant amount of heat. … And, if a data center doesn't have … appropriate cooling equipment … the facility can become extremely hot. … Excessive heat can dramatically reduce … the expected life of servers and other electronic equipment. … So data center facility managers invest heavily … in maintaining a temperature … that's friendly for that equipment. … That investment requires massive cooling systems … such as the one shown here on a data center roof. …
Author
Released
10/29/2020We are a CompTIA Partner. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.
Skill Level Beginner
Duration
Views
Related Courses
-
Learning Threat Modeling for Security Professionals
with Adam Shostack41m 41s Intermediate -
Transitioning to a Career in Cybersecurity
with Marc Menninger1h 10m Intermediate -
Cybersecurity Foundations
with Malcolm Shore1h 59m Intermediate
-
Introduction
-
Study resources1m 42s
-
1. Data Center Protection
-
Site and facility design2m 47s
-
Physical access control4m 56s
-
Visitor management1m 30s
-
Physical security personnel2m 12s
-
-
2. Hardware and Data Security
-
Data lifecycle4m 28s
-
Hardware physical security4m 18s
-
-
3. Business Continuity
-
Business continuity planning3m 10s
-
Business continuity controls3m 32s
-
-
4. Disaster Recovery
-
Disaster recovery4m 24s
-
Backups4m 6s
-
Restoring backups2m 11s
-
Disaster recovery sites3m 22s
-
Testing BC/DR plans3m 3s
-
After action reports2m 39s
-
-
Conclusion
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Data center environmental controls