Security Technology Placement – CompTIA Security+ SY0-501 – 3.2

Security+ Training Course Index: https://professormesser.link/sy0501
Professor Messer’s Success Bundle: https://professormesser.link/501success
Professor Messer’s Course Notes: https://professormesser.link/501cn
Professor Messer’s Practice Exams: https://professormesser.link/501ytpe
Discount exam vouchers: https://professormesser.com/vouchers/
– – – – –
Now that you’ve acquired your security technology, you’ll need somewhere to place it in your network. In this video, you’ll learn about some of the best practices for placing sensors, firewalls, SSL concentrators, and other security technologies.
– – – – –
Subscribe to get the latest videos: https://professormesser.link/yt
Calendar of live events: https://professormesser.com/calendar/
Frequently Asked Questions: https://professormesser.link/faq

FOLLOW PROFESSOR MESSER:
Professor Messer website: https://professormesser.com/
Twitter: https://professormesser.com/twitter
Facebook: https://professormesser.com/facebook
Instagram: https://professormesser.com/instagram
LinkedIn: https://professormesser.com/linkedin

3 Comments

  1. Sig Sauer on April 22, 2021 at 10:26 pm

    In a site to site VPN scenario, does the typical deployment model put the VPN appliance safely behind the firewall or facing the internet?

  2. Robert Clithero on April 22, 2021 at 10:36 pm

    Is there a way you could spoof an HTTPS certificate to the SSL Accelerator. If so, how could we prevent this from happening?

  3. Metro Train on April 22, 2021 at 10:58 pm

    In terms of the network tap, I assume the monitor would most likely be getting HTTPS, etc, information of which would be encrypted. Therefore, it would be more difficult to monitor. It is normal to decrypt the traffic too (and then encrypt again) within the tap, or is it more common to simply receive encrypted traffic? Thank you Professor.

Leave a Comment