
Sign up to save your podcasts
Or


In this episode, we move into the digital layer of defense, exploring logical security techniques that help ensure users access only what they’re authorized to. We start with multi-factor authentication (MFA), detailing its components—something you know, have, or are—and why it’s so effective. Then we look at access control lists (ACLs), which define who can access files, folders, and systems based on roles or permissions.
We also explore physical and virtual security tokens, including USB keys and software apps like Google Authenticator. CompTIA may test your ability to compare authentication methods or choose the best access control mechanism for a given scenario. This episode prepares you to evaluate, implement, and troubleshoot logical security configurations. Brought to you by BareMetalCyber.com.
By Dr. Jason Edwards5
22 ratings
In this episode, we move into the digital layer of defense, exploring logical security techniques that help ensure users access only what they’re authorized to. We start with multi-factor authentication (MFA), detailing its components—something you know, have, or are—and why it’s so effective. Then we look at access control lists (ACLs), which define who can access files, folders, and systems based on roles or permissions.
We also explore physical and virtual security tokens, including USB keys and software apps like Google Authenticator. CompTIA may test your ability to compare authentication methods or choose the best access control mechanism for a given scenario. This episode prepares you to evaluate, implement, and troubleshoot logical security configurations. Brought to you by BareMetalCyber.com.

229,674 Listeners

27,989 Listeners

232 Listeners

6,416 Listeners

8,077 Listeners

369,956 Listeners

46,368 Listeners

1,435 Listeners

20 Listeners

8,391 Listeners

21 Listeners

3 Listeners

5 Listeners

0 Listeners

3 Listeners