Passed my A+ Core 1 and Core 2 today.. back to back! Did one in the morning and one in the afternoon! Many thanks to Professor, your content helped me a lot along with Mike Mayer's notes! A
Studying all day everyday on headphones while at work. You are an amazing human being Professor Messer. Stuck in pest control for 5 years. Brutal summers and harsh winters. You are helping me change my life for the better. God bless you sir!
I like the way you sprinkle back in things you taught us before, like DNS and DHCP. It helps a lot to get a reminder every so often about things you already touched on. You are a really great teacher, I'm so thankful I found your materials.
This lesson is one of my favorites because concepts that were brought up earlier (DNS , DHCP, FILE SERVERS) are all things you brought up previously, but I didn't fully grasp them (you were moreso telling us the ports they are on) but now I'm getting to see their purpose in action
Just so you know, you decided to put a tree log on the SEIM part so I've put the same picture in my Onenote revision notes. I thought if you've put it there for a reason then it must be of some importance. I hope one day I figure out the importance of this log I shall name "Graham".
Great video, but again I have another question revolving around the all-in-one security appliance: or "Unified Threat Management" appliance. I do wonder if places all your "eggs in one basket" so to speak, is really a good idea, because if that appliance was attacked by malware that somehow infected the application, it would make all the other features in that box vulnerable as well. Unless of course there's a secondary device that will "flip" should the primary fail. I can understand the benefits of an all-in-one device, but who guards the guards so to speak? (sorry for the long-winded post)
This is an ongoing conversation in the security community. All-in-one devices have proven to be effective and secure, and they provide significant initial and ongoing cost advantages. The most recent iteration of these, the next-generation firewall, is probably the best example of how integration of these different security tasks creates a much stronger security posture. If you don't want to combine them, you can always buy separate devices and deal with the issues associated with multiple vendors and the lack of integration with your security logs.
@@professormesser I wanted to know if you can maybe discuss SASE as a replacement for "all" these hardware devices in the near future? This will address the above mentioned issues eg: one vendor for full security stack and SD networking, real time security, Multiple fail-overs over cloud etc... thanks for the content, you are really helping me a lot.
if a UTM can provide the functionality of a router, switch, and other security components, why dont people people use it for their SOHOs? Is it because of cost? Or are modern routers pretty much a UTM?
Would an example of a static web page be like.... Google's home page? And a dynamic would be, like a page for a bank account after you login? It would have to dynamically generate the HTML for your account info and financial info, right?
Just wondering is a SIEM a common enough type of server in a typical setup. It's the first I have ever heard of such a server or is it the same item that network devices communicate with via trap messages etc.. ?
Passed my A+ Core 1 and Core 2 today.. back to back! Did one in the morning and one in the afternoon! Many thanks to Professor, your content helped me a lot along with Mike Mayer's notes! A
congrats!
Congrats Kirumira!
Studying all day everyday on headphones while at work. You are an amazing human being Professor Messer. Stuck in pest control for 5 years. Brutal summers and harsh winters. You are helping me change my life for the better. God bless you sir!
I like the way you sprinkle back in things you taught us before, like DNS and DHCP. It helps a lot to get a reminder every so often about things you already touched on. You are a really great teacher, I'm so thankful I found your materials.
This lesson is one of my favorites because concepts that were brought up earlier (DNS , DHCP, FILE SERVERS) are all things you brought up previously, but I didn't fully grasp them (you were moreso telling us the ports they are on) but now I'm getting to see their purpose in action
It took me a second to understand why there was a log of wood representing SIEMs. Solid dad joke Professor.
Thank you Professor Messor
the background picture of your video is in Lisbon city center (Portugal) :) - excelent choice @Professor Messer
Just so you know, you decided to put a tree log on the SEIM part so I've put the same picture in my Onenote revision notes. I thought if you've put it there for a reason then it must be of some importance. I hope one day I figure out the importance of this log I shall name "Graham".
its an obscure Twin Peaks reference
because it is the logging of security events and information! lol
Great video, but again I have another question revolving around the all-in-one security appliance: or "Unified Threat Management" appliance. I do wonder if places all your "eggs in one basket" so to speak, is really a good idea, because if that appliance was attacked by malware that somehow infected the application, it would make all the other features in that box vulnerable as well. Unless of course there's a secondary device that will "flip" should the primary fail.
I can understand the benefits of an all-in-one device, but who guards the guards so to speak? (sorry for the long-winded post)
This is an ongoing conversation in the security community. All-in-one devices have proven to be effective and secure, and they provide significant initial and ongoing cost advantages. The most recent iteration of these, the next-generation firewall, is probably the best example of how integration of these different security tasks creates a much stronger security posture.
If you don't want to combine them, you can always buy separate devices and deal with the issues associated with multiple vendors and the lack of integration with your security logs.
@@professormesser I wanted to know if you can maybe discuss SASE as a replacement for "all" these hardware devices in the near future? This will address the above mentioned issues eg: one vendor for full security stack and SD networking, real time security, Multiple fail-overs over cloud etc... thanks for the content, you are really helping me a lot.
if a UTM can provide the functionality of a router, switch, and other security components, why dont people people use it for their SOHOs? Is it because of cost? Or are modern routers pretty much a UTM?
i wont buy it because why you would need it?
Great teacher, thank you 👌
5:40 chuckled at the literal log
these are so helpful
Would an example of a static web page be like.... Google's home page? And a dynamic would be, like a page for a bank account after you login? It would have to dynamically generate the HTML for your account info and financial info, right?
yes it uses javascript for that purpose
Just wondering is a SIEM a common enough type of server in a typical setup. It's the first I have ever heard of such a server or is it the same item that network devices communicate with via trap messages etc.. ?
A SIEM is a very common server type. The device that manages devices via SNMP and SNMP traps is an NMS (Network Management System).
What is the difference between Proxy Server's URL filtering functionality and the UTM's web filter functionality?
Thanks for us
I lost it when I saw the log!!!! hahaha xD
thanks
Are UTMs and SOHOs interchangeable? Seems like they have alot of the same functionality 🤔
It's common to use multifuction devices in a SOHO.