- [Instructor] In the last video,…you learned how computer systems…offer many different authentication techniques…that allow users to prove their identity.…These include something you know such as a password,…something you are such as a fingerprint,…something you have such as a smartphone,…somewhere you are such as inside a secure building,…and something you do such as your typing rhythm.…When used alone, any one of these techniques…provide some security for systems.…However, they each have their own drawbacks.…
For example, an attacker might steal a user's password…through a phishing attack.…Once they have the password,…they can then use it to assume the user's identity.…Other authentication factors aren't foolproof either.…If you use smart card authentication…to implement something you have,…the user may lose the smart card.…Someone coming across it may then impersonate the user.…The solution to this problem…is to combine authentication techniques…from multiple factors…such as combining something you know…with something you have.…
Author
Released
10/23/2017Instructor Mike Chapple has designed the training around the most recent version of CompTIA Security+, SY0-501, which expands coverage of mobile and cloud technologies. By learning about the topics in this course, you'll be prepared to answer questions from the latest exam—and strengthen your own organization's systems and defenses. To join one of Mike's free study groups, visit certmike.com.
We are a CompTIA Partner. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.
- Identification methods
- Authentication factors
- Multifactor authentication
- Single sign-on
- Authorization and access controls
- Account management
Skill Level Beginner
Duration
Views
Related Courses
-
Insights from a Cybersecurity Professional
with Mike Chapple32m 15s Intermediate
-
Introduction
-
Welcome1m 30s
-
-
1. Identification
-
Usernames and access cards3m 27s
-
Biometrics2m 35s
-
2. Authentication
-
Authentication factors3m 30s
-
Multifactor authentication2m 41s
-
Something you have3m 15s
-
RADIUS and TACACS3m 37s
-
Kerberos and LDAP5m 24s
-
SAML2m 38s
-
OAUTH and OpenID Connect3m 16s
-
-
3. Authorization
-
Understanding authorization4m 11s
-
Mandatory access controls3m 58s
-
Access control lists5m 14s
-
Database access control5m 2s
-
-
4. Account Management
-
Account types4m 30s
-
Account policies3m 35s
-
Password policy4m 50s
-
Managing roles3m 56s
-
Account monitoring2m 14s
-
Conclusion
-
Next steps37s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Multifactor authentication