CompTIA A+ Core 2: Wireless Security Protocols & Authentication Methods

CompTIA    |    Beginner
  • 10 videos | 45m 5s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 54 users Rating 4.6 of 54 users (54)
There are numerous wireless security protocols and authentication methods available. Technicians must learn how to recommend and potentially implement a wireless security solution depending on the requirements of an organization. In this course, you will start by learning the difference between the Wi-Fi Protected Access 2 (WPA2) and Wi-Fi Protected Access 3 (WPA3) wireless protocols and the features of each. Explore other wireless protocols and encryption options, including Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES). Finally, investigate wireless security authentication solutions, including Remote Authentication Dial-In User Service (RADIUS), Terminal Access Controller Access-Control System (TACACS+), Kerberos, and multi-factor authentication. After completing this course you'll know how to implement wireless security protocols and authentication methods. This course also helps you to prepare for the CompTIA A+ Core 2 (220-1102) certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Provide an overview of the wi-fi protected access 2 (wpa2) wireless protocol
    Recognize key features of the wi-fi protected access 3 (wpa3) wireless protocol
    Identify features of the temporal key integrity protocol (tkip)
    Provide an overview of the advanced encryption standard (aes)
  • Provide an overview of the remote authentication dial-in user service (radius)
    Recognize key features of the terminal access controller access-control system (tacacs+)
    Describe how kerberos can be used as a wireless security authentication solution
    Recognize the benefits of implementing multi-factor authentication
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 52s
  • 4m 59s
    After completing this video, you will be able to provide an overview of the wi-fi protected access 2 (WPA2) wireless protocol . FREE ACCESS
  • Locked
    3.  Wi-Fi Protected Access 3
    5m 13s
    After completing this video, you will be able to recognize key features of the Wi-Fi Protected Access 3 (WPA3) wireless protocol. FREE ACCESS
  • Locked
    4.  Temporal Key Integrity Protocol (TKIP)
    3m 40s
    In this video, learn how to identify features of the temporal key integrity protocol (TKIP). FREE ACCESS
  • Locked
    5.  Advanced Encryption Standard
    5m 15s
    After completing this video, you will be able to provide an overview of the advanced encryption standard (AES). FREE ACCESS
  • Locked
    6.  Remote Authentication Dial-In User Service (RADIUS)
    5m 12s
    After completing this video, you will be able to provide an overview of the remote authentication dial-in user service (RADIUS). FREE ACCESS
  • Locked
    7.  Terminal Access Controller Access-Control System
    5m 2s
    Upon completion of this video, you will be able to recognize key features of the terminal access controller access-control system plus (TACACS+). FREE ACCESS
  • Locked
    8.  Kerberos Solutions
    5m 35s
    After completing this video, you will be able to describe how kerberos can be used as a wireless security authentication solution. FREE ACCESS
  • Locked
    9.  Multi-factor Authentication
    7m 33s
    After completing this video, you will be able to recognize the benefits of implementing multi-factor authentication. FREE ACCESS
  • Locked
    10.  Course Summary
    45s
    0cd260d7-2f5b-435e-9da3-6ff1963eb89a FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 80 users Rating 4.6 of 80 users (80)
Rating 4.5 of 52 users Rating 4.5 of 52 users (52)
Rating 4.6 of 5 users Rating 4.6 of 5 users (5)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 139 users Rating 4.5 of 139 users (139)
Rating 4.3 of 58 users Rating 4.3 of 58 users (58)
Rating 4.6 of 80 users Rating 4.6 of 80 users (80)