
Sign up to save your podcasts
Or


In this episode, we move into the digital layer of defense, exploring logical security techniques that help ensure users access only what they’re authorized to. We start with multi-factor authentication (MFA), detailing its components—something you know, have, or are—and why it’s so effective. Then we look at access control lists (ACLs), which define who can access files, folders, and systems based on roles or permissions.
We also explore physical and virtual security tokens, including USB keys and software apps like Google Authenticator. CompTIA may test your ability to compare authentication methods or choose the best access control mechanism for a given scenario. This episode prepares you to evaluate, implement, and troubleshoot logical security configurations. Brought to you by BareMetalCyber.com.
By Dr. Jason Edwards5
22 ratings
In this episode, we move into the digital layer of defense, exploring logical security techniques that help ensure users access only what they’re authorized to. We start with multi-factor authentication (MFA), detailing its components—something you know, have, or are—and why it’s so effective. Then we look at access control lists (ACLs), which define who can access files, folders, and systems based on roles or permissions.
We also explore physical and virtual security tokens, including USB keys and software apps like Google Authenticator. CompTIA may test your ability to compare authentication methods or choose the best access control mechanism for a given scenario. This episode prepares you to evaluate, implement, and troubleshoot logical security configurations. Brought to you by BareMetalCyber.com.

228,897 Listeners

27,895 Listeners

231 Listeners

6,417 Listeners

8,061 Listeners

368,917 Listeners

45,409 Listeners

1,411 Listeners

20 Listeners

8,023 Listeners

19 Listeners

3 Listeners

5 Listeners

0 Listeners

3 Listeners