Security Technology Placement – CompTIA Security+ SY0-501 – 3.2

Security+ Training Course Index:
Professor Messer’s Success Bundle:
Professor Messer’s Course Notes:
Professor Messer’s Practice Exams:
Discount exam vouchers:
– – – – –
Now that you’ve acquired your security technology, you’ll need somewhere to place it in your network. In this video, you’ll learn about some of the best practices for placing sensors, firewalls, SSL concentrators, and other security technologies.
– – – – –
Subscribe to get the latest videos:
Calendar of live events:
Frequently Asked Questions:

Professor Messer website:


  1. Sig Sauer on April 22, 2021 at 10:26 pm

    In a site to site VPN scenario, does the typical deployment model put the VPN appliance safely behind the firewall or facing the internet?

  2. Robert Clithero on April 22, 2021 at 10:36 pm

    Is there a way you could spoof an HTTPS certificate to the SSL Accelerator. If so, how could we prevent this from happening?

  3. Metro Train on April 22, 2021 at 10:58 pm

    In terms of the network tap, I assume the monitor would most likely be getting HTTPS, etc, information of which would be encrypted. Therefore, it would be more difficult to monitor. It is normal to decrypt the traffic too (and then encrypt again) within the tap, or is it more common to simply receive encrypted traffic? Thank you Professor.

Leave a Comment