00:00:00 - Hello, my name is Keith Barker.
00:00:02 - And on behalf of the
entire CBT Nuggets family,
00:00:05 - welcome to Security+.
00:00:07 - Let's jump in.
00:00:08 - I wanted to chat
with you, personally,
00:00:10 - just for a moment on how you and
I can get the absolute most out
00:00:13 - of this course.
00:00:14 - The first secret
is to schedule time
00:00:17 - so you can watch the videos.
00:00:18 - The videos are about
30 minutes each,
00:00:20 - so it doesn't take
a lot of time.
00:00:22 - The key is making
some time, and then
00:00:24 - actually watching the videos.
00:00:26 - And as we go to the videos
together there a lot of fun.
00:00:29 - So not only will you be
learning from the videos
00:00:31 - and improving your
knowledge about security,
00:00:33 - you'll also be having fun as
we go through these videos
00:00:35 - together.
00:00:36 - You and I.
00:00:37 - Let me share with you an
insight regarding myself.
00:00:40 - Now I do not consider myself
exceptionally bright, or super
00:00:43 - smart, or anything
like that, but I'll
00:00:44 - tell you what I am-- is
that I am persistent.
00:00:47 - For example, this
week and there's
00:00:49 - this extension cord
I was unraveling
00:00:50 - and I thought to
myself, oh my goodness,
00:00:52 - how am I ever going to
figure all this out?
00:00:54 - And the answer is,
you just start.
00:00:56 - And you start working at
it, and working at it,
00:00:58 - and eventually you're done.
00:01:01 - And I still remember
back in the early '90s
00:01:03 - when I first
learned about a CCIE
00:01:05 - and I read an article about it.
00:01:07 - I thought to myself, wow,
Cisco's, at the time, highest
00:01:10 - certification level.
00:01:11 - And in the early '90s I didn't
know anything about Cisco.
00:01:14 - So what I did was, I got
some material together,
00:01:16 - I started studying, and
then step by step by step,
00:01:19 - now I've got a couple of CCIEs.
00:01:21 - And I've done the same thing
with Check Point, and Juniper,
00:01:23 - and Hewlett Packard,
and other vendors
00:01:25 - in the learning their
technologies is just starting
00:01:28 - off and keep on moving,
just being persistent.
00:01:30 - So together you and I
can master this content.
00:01:34 - Another technique that I
found very, very helpful
00:01:36 - is committing.
00:01:37 - And what I would like you to
do is commit to an exam date--
00:01:39 - the month and year when you're
going to take the CompTS
00:01:43 - Security+ certification exam
to become CompTS Security+
00:01:46 - certified.
00:01:47 - Now making a real
00:01:49 - letting others know about it.
00:01:50 - And what I'd like
you to do is let
00:01:52 - me know about it on
my Facebook page.
00:01:54 - And the best way to
reach me on Facebook
00:01:56 - is on my page at Keith
00:01:59 - And all you have to do is
go to that page and say,
00:02:01 - I commit to Security+ exam,
and then the month and year.
00:02:05 - So maybe it's January,
00:02:09 - the year's going to be.
00:02:10 - Or July of that year.
00:02:12 - And there's some power in that.
00:02:14 - When you commit
publicly, and you
00:02:15 - let me know when you're taking
your certification exam,
00:02:18 - it's going to add additional
motivations for you
00:02:20 - to regularly make sure
you watch those videos.
00:02:22 - Now because it's a
vendor neutral exam,
00:02:25 - there's got to be any
00:02:27 - questions regarding Cisco, or
Juniper, HP, or Check Point.
00:02:31 - It's getting more about applying
the concepts of security
00:02:34 - to a network, or to a system.
00:02:36 - Not the literal
commands to do it,
00:02:37 - but the concepts of how it
would be applied or when would
00:02:40 - you use a certain technology.
00:02:41 - For example, in this network,
if we have Bob at this user PC,
00:02:45 - and Bob is connecting
out to a bank web server,
00:02:48 - and Bob is using his browser.
00:02:49 - What technology
might we implement
00:02:51 - that would use both asymmetrical
and symmetrical keys?
00:02:56 - And which technology
00:02:58 - that type of cryptography
between Bob, the end
00:03:00 - user, and the bank?
00:03:01 - And then based on what we
cover together in these videos,
00:03:03 - we can answer-- Well,
we can use https.
00:03:06 - Which behind the scenes
could either be SSL--
00:03:08 - secure sockets layer,--
or it could be TLS--
00:03:11 - transport layer security.
00:03:12 - Those are all talking
about the basic concept
00:03:14 - of using asymmetrical encryption
to negotiate a session key,
00:03:18 - and then kicking over to
a symmetrical encryption
00:03:20 - algorithm using the session
key that they established.
00:03:23 - And that by the way, is what
https, and the protocols that
00:03:26 - support it, bring to the table.
00:03:28 - So going back to
the commitment part,
00:03:29 - please take a moment right now
and I think to yourself-- OK,
00:03:32 - what's a reasonable time that
I can have these videos done
00:03:35 - and take the certification exam?
00:03:37 - And come up to Keith Barker
Networking on Facebook,
00:03:39 - and please post a
comment to commit
00:03:41 - of when you're going
to take that exam.
00:03:43 - And my friend you will benefit
by making that commitment.
00:03:47 - Another huge tip
that we can leverage
00:03:49 - as we go through this course
together, is to take notes.
00:03:52 - Now that could be
00:03:53 - or it can be on paper.
00:03:55 - And the key is, the
more senses that we
00:03:57 - used to learn the
00:03:59 - going to use our eyes
and our ears, obviously.
00:04:01 - But if we also
write out our notes,
00:04:03 - that additional method is going
to help us learn even better.
00:04:06 - Sometimes I'll
make a lot of notes
00:04:08 - and I'll never even go
back to those notes,
00:04:10 - but I do know this--
writing out those notes
00:04:12 - has assisted me in
internalizing that information
00:04:15 - and learning it
that much better.
00:04:16 - And the benefit of
learning the information
00:04:18 - and really knowing
it has two benefits.
00:04:20 - One primarily in a
00:04:23 - we can implement it and
use those technologies
00:04:26 - to make a more secure
network, a more secure system.
00:04:29 - And secondly, for those who
are pursuing certification,
00:04:32 - by taking those notes
and having a better
00:04:34 - recollection of
the details, it's
00:04:36 - going to help in that
00:04:38 - as well.
00:04:39 - Another great technique
that you and I can use
00:04:41 - is the concept of
00:04:43 - Now why does this work?
00:04:44 - Well, let's say
that you and I are
00:04:45 - going through a
video, for example,
00:04:47 - on threats and vulnerabilities.
00:04:49 - And let's say for example, we're
looking at a syn-flood attack.
00:04:52 - And looking at the
details of how that works,
00:04:54 - and why it works.
00:04:55 - And what techniques we might
use to mitigate, or reduce
00:04:58 - the risk of, a syn-flood attack.
00:05:00 - Well if you and I are going
through this together,
00:05:02 - and you know that you're
going to turn around
00:05:04 - at dinner, or at the
next break, and you're
00:05:06 - going to actually
teach that to somebody
00:05:08 - else-- like a spouse, or
sister, or brother, or friend,
00:05:11 - or coworker-- chances
are you're going
00:05:13 - to pay more attention
as we study it,
00:05:16 - because you know you 're
going to have to teach it.
00:05:18 - The second thing this
is going to do for us,
00:05:20 - as you do share this with
other friends and individuals,
00:05:23 - is that as you discuss
the topics that we're
00:05:25 - learning together-- such as
a syn-flood attack or any
00:05:28 - of the other hundreds
of topics that we're
00:05:30 - going to be covering
in this course
00:05:31 - together-- as you explain the
concept to somebody else that
00:05:34 - may help identify for
yourself some of the areas
00:05:37 - where you need to go back
and maybe revisit that topic.
00:05:40 - So it's a win-win situation
when you teach somebody else.
00:05:46 - Because they'll get
to learn about it,
00:05:48 - you'll reinforce those
concepts in your mind,
00:05:50 - as well as help
00:05:52 - you need to go back and do
a little bit more research
00:05:54 - or study to make sure that
you can clearly explain
00:05:57 - that concept or topic
to another person.
00:05:59 - And the reason this all
matters is because we really
00:06:02 - do, in the 21st century, we need
to build a fortress of security
00:06:06 - for our systems and networks.
00:06:08 - Because it's critical for
governments and businesses
00:06:11 - to have secure networks
that have clearly
00:06:13 - identified the risks,
and then taken the steps
00:06:16 - to mitigate those risks by
putting in countermeasures.
00:06:19 - Which is another way of saying
putting in controls that
00:06:22 - help reduce the risk, or
reduce the effectiveness
00:06:25 - of the threats against our
networks and our systems.
00:06:28 - I had a lot of fun in
putting this course together
00:06:30 - in every single Nugget.
00:06:31 - In fact I finished the
last one this morning.
00:06:33 - So it's all wrapped
up and ready to go.
00:06:35 - And every video, while
I was creating it,
00:06:37 - I was doing it as if I'm
talking to you personally,
00:06:40 - with you in mind.
00:06:42 - So I am asking you for the
opportunity for allowing me
00:06:45 - to be your tour guide and coach
through this journey through
00:06:48 - the world of Security+.
00:06:49 - And I've kept this
intro fairly short,
00:06:51 - so we can get right
to the content, which
00:06:53 - starts in the very next video.
00:06:55 - And until then, I hope this
has been informative for you.
00:06:58 - And I'd like to thank
you for viewing.