Remove Authentication Remove Backup Remove Linux Remove Windows
article thumbnail

Using Secure Configurations | Standardize Your Security

Linux Academy

For network devices, we should consider using RADIUS/TACACS+ for authentication purposes, not a shared user account. Ansible can help automate the backup, and you can learn more in this month’s how-to video that covers using Ansible to back up a Cisco ASA firewall. Network Device Configurations.

article thumbnail

Learn Azure by Doing with New Azure Training!

Linux Academy

We Azure, just like Microsoft Linux! Linux Academy is the only way to get exam-like training for multiple Microsoft Azure certifications, check out this blog post if you’re wondering where to get started in Azure. Implement authentication. Manage and secure web apps with backup, restore, snapshot, and cloning.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Learn Azure by Doing with New Azure Training!

Linux Academy

Linux Academy is the only way to get exam-like training for multiple Microsoft Azure certifications, check out this blog post if you’re wondering where to get started in Azure. As always, remember that you have a range of content available here at Linux Academy if you have any gaps in prerequisite knowledge.

article thumbnail

Learn Azure by Doing with New Azure Training!

Linux Academy

Linux Academy is the only way to get exam-like training for multiple Microsoft Azure certifications, check out this blog post if you’re wondering where to get started in Azure. As always, remember that you have a range of content available here at Linux Academy if you have any gaps in prerequisite knowledge.

article thumbnail

Passwords and Policies | Roadmap to Securing Your Infrastructure

Linux Academy

Last week, we discussed the use of password managers and multi-factor authentication (MFA). The importance of local and cloud backups. The post Passwords and Policies | Roadmap to Securing Your Infrastructure appeared first on Linux Academy Blog. Check for vulnerabilities in your infrastructure. Patching your network devices.

article thumbnail

The Hacker Mind Podcast: Digital Forensics

ForAllSecure

In addition to her knowledge of Windows, she’s equally versed in Linux and other operating systems as well. Januszkiewicz: Actually we're talking about both of the systems here, a Linux that Windows another world differently. So it's more of that. Of course it's not like a number one trend yet.

article thumbnail

Using Multi-factor Authentication (MFA) | Roadmap to Securing Your Infrastructure

Linux Academy

It also provides a handy browser plugin to fill in credentials for me, once I’ve authenticated to the plugin. Multi-factor authentication (MFA). Now, on to our second point for today: multi-factor authentication (MFA). Now, on to our second point for today: multi-factor authentication (MFA). Where to use MFA.