Lesson 2: Implementing Secure Management and Monitoring, Downloadable Version
- By Keith Barker
- Published Dec 3, 2012 by Pearson IT Certification. Part of the LiveLessons series.
Downloadable Video
- Sorry, this book is no longer in print.
- About this video
Accessible from your Account page after purchase. Requires the free QuickTime Player software.
Videos can be viewed on: Windows 8, Windows XP, Vista, 7, and all versions of Macintosh OS X including the iPad, and other platforms that support the industry standard h.264 video codec.
- Copyright 2013
- Edition: 1st
- Downloadable Video
- ISBN-10: 0-13-325902-1
- ISBN-13: 978-0-13-325902-5
Accurate and centralized reporting regarding the activities of your network devices is critical, especially when making sense of an attack that effected multiple network devices. Limiting the damage that can be done by a single administrator is good policy. This lesson addresses both of these issues with best practices for monitoring and role based access control
Other Things You Might Like
- In Zero Trust We Trust
- eBook (Watermarked) $24.47
- In Zero Trust We Trust
- Book $35.99