Information Security: NACs & Gateways

IT Security    |    Beginner
  • 12 videos | 37m 41s
  • Includes Assessment
  • Earns a Badge
Rating 4.3 of 12 users Rating 4.3 of 12 users (12)
Learners will discover key features of network access control (NAC), the importance of NAC in a network, various NAC elements, authentication, and its implementation, in this 12-video course. Explore the risks and challenges associated with BYOD-which means "bring your own device"-and IoT, which is Internet of Things. You will begin the course by examining the security risks introduced by BYOD and IoT, along with their preventive measures. You will then explore the major challenges with BYOD in an organization. The next tutorial defines NAC and the importance it has in a network. This leads into examining the NAC architecture; the different features of NAC; and the impact of an improperly configured NAC. You will learn about the various NAC elements; recall the best practices of implementing NAC, and identify the key points for creating an effective checklist for NAC security. In the final tutorial, learners will be asked to list the NAC authentication methods.

WHAT YOU WILL LEARN

  • Introduce the key concepts of the course
    Identify the security risks introduced by byod and iot along with their preventive measures
    List the major challenges with byod in an organization
    Define nac and the importance it has in a network
    Illustrate the nac architecture
    List the different features of nac
  • Describe the impact of an improperly configured nac
    List various nac elements
    Recall the best practices of implementing nac
    Identify the key point for creating an effective checklist for nac security
    List the nac authentication methods
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 51s
  • 7m 15s
    In this video, you will learn how to identify the security risks introduced by BYOD and IoT along with their preventive measures. FREE ACCESS
  • Locked
    3.  Challenges with BYOD
    3m 9s
    Upon completion of this video, you will be able to list the major challenges with bring your own device in an organization. FREE ACCESS
  • Locked
    4.  NAC and Its Importance
    6m 3s
    In this video, you will learn how to define NAC and why it is important for a network. FREE ACCESS
  • Locked
    5.  NAC Architecture
    2m 2s
    Upon completion of this video, you will be able to illustrate the NAC architecture. FREE ACCESS
  • Locked
    6.  Features of NAC
    3m 25s
    After completing this video, you will be able to list the different features of NAC. FREE ACCESS
  • Locked
    7.  Impact of Improperly Configured NAC
    2m 2s
    After completing this video, you will be able to describe the impact of an NAC that is not configured properly. FREE ACCESS
  • Locked
    8.  NAC Elements
    1m 58s
    Upon completion of this video, you will be able to list various NAC elements. FREE ACCESS
  • Locked
    9.  Best Practices of Implementing NAC
    3m 21s
    After completing this video, you will be able to recall the best practices for implementing NAC. FREE ACCESS
  • Locked
    10.  NAC Security Checklist
    1m 37s
    In this video, find out how to identify the key points for creating an effective checklist for NAC Security. FREE ACCESS
  • Locked
    11.  NAC Authentication Methods
    3m 59s
    After completing this video, you will be able to list the authentication methods for the NAC. FREE ACCESS
  • Locked
    12.  Course Summary
    1m

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.9 of 8 users Rating 4.9 of 8 users (8)
Rating 4.3 of 16 users Rating 4.3 of 16 users (16)
Rating 4.2 of 19 users Rating 4.2 of 19 users (19)