Free
Course

CompTIA IT Fundamentals: Authentication & Disaster Recovery

Ace ITF+ with proficiency in AAA framework, disaster recovery, fault tolerance, PINs, MFA, and biometrics. Understand authentication and high availability.

  • Skill level

    Beginner
  • Time to complete

    Approx. 2 hours
  • Certificate of completion

    Yes
  • Prerequisites

    None

About this course

Accessing information is something we all do in our professional and private lives. Regardless of the purpose for accessing this information, the information must be secure and capable of being recovered should a disastrous situation arise. In this course, you will learn about authentication and disaster recovery concepts, beginning with the AAA framework and authentication, authorization, and accounting. Then you'll discover important methods used to protect access to information, including passwords, PINs, multi-factor authentication (MFA), and biometrics. Finally, you'll explore fault tolerance, high availability, and the importance of storage location, contingency planning, and disaster recovery. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.

Learning objectives

  • Discover the key concepts covered in this course
  • Provide an overview of the aaa framework and its importance
  • Outline authentication and its role in the aaa framework

How it works

Expert-led videos

In this course, you'll watch videos created by industry-leading experts for some of the biggest tech companies in the world. They'll cover key concepts, go through sample applications, prepare you for industry certifications, and more. Watch on any device — whenever and wherever you want — to learn at your own pace.

Reviews from learners

  • Very well put together as usual. I learn so much from each experience with Codecademy. I can't explain how satisfied I am with this institution.
    David W
    Verified Learner
  • Everything Codecademy offers is useful for all software developers.
    Fidan M
    Verified Learner
  • I thought that I would never be able to learn to code but Codecademy has made it very easy. I just love it!
    Adyan H
    Verified Learner

Our learners work at

  • Google Logo
  • Meta Logo
  • Apple Logo
  • EA Logo
  • Amazon Logo
  • IBM Logo
  • Microsoft Logo
  • Reddit Logo
  • Spotify Logo
  • Uber Logo
  • YouTube Logo
  • Instagram Logo

8 Noteworthy Security Breaches That Prove Cybersecurity is Important

Cory Stieg
Aug 14, 2024

Stories and news reports about cyberattacks and cyber incidents often sound more action-packed than fiction. But it’s true: Malicious actors and cyber criminals are becoming increasingly innovative and sophisticated in their attacks. With each data breach or malware attack, there’s an opportunity to learn how to prevent the next one.  

Understanding the vulnerabilities and mistakes that led to previous cyber incidents is a big part of being an informed cybersecurity pro. Studying the past can help you recognize similar weaknesses in current systems and prevent them from being exploited again. Everything from the methods and techniques that attackers use to the effectiveness of incident response plans can influence how you anticipate, prevent, and respond to threats. 

We recently added over 30 video-based cybersecurity courses to our catalog. These free courses can help you develop foundational expertise to pursue popular cybersecurity certifications. Regardless of your field, our new cybersecurity curriculum teaches you how to protect yourself (and your organization) online — an invaluable skill for technologists today. Read on to learn about some major cyber incidents, data breaches, and cyberattacks throughout internet history. 

Continue reading

Join over 50 million learners and start CompTIA IT Fundamentals: Authentication & Disaster Recovery today!

Start

Unlock additional features with a paid plan

  • Portfolio projects

    Create professional projects you can share with recruiters to showcase your skills and experience.
  • Job-readiness checker

    Evaluate how well you meet the requirements for any job description based on your skills and experience.
  • Certificate of completion

    Earn a document you can share with your network to prove that you’ve completed this course.