O'Reilly logo

Security+ Training Guide by Todd King

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter Summary

This chapter examined the process of managing security. We discussed privilege management, focusing first on users, groups, and roles for maintaining and assigning privileges. We also discussed the concept of single sign-on and its benefits in the complexity of the modern network environment. Centralized and decentralized network management principles and concepts were also discussed, and we highlighted the fact that centralized networks tend to be more secure but less scalable and that decentralized networks are the opposite. Finally, we examined privilege management and the idea of auditing users and their use of privilege. In each case, where appropriate, we illustrated how to accomplish the tasks with step-by-step instructions. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required