CompTIA Network+: Physical Security & Network Hardening
CompTIA Network+
| Intermediate
- 22 Videos | 2h 18m 31s
- Includes Assessment
- Earns a Badge
Network security is the practice of protecting and preventing unwelcome access attempts to computer networks. In this course, you'll learn about network hardening techniques and best practices. You'll learn to secure networks and about wireless authentication and authorization features You'll examine remote access methods and security considerations, VPN solutions, and the benefits of using virtual network computing and virtual desktop solutions. You'll learn about remote authentication and authorization considerations and how to implement out-of-band management.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this courseoutline techniques used to harden a network, including securing SNMP, port security, private VLANs, DHCP snooping, and access control listsrecognize how to choose strong passwords and change credentialsoutline the importance of disabling unused ports, such as IP ports and device portsrecognize how explicit and implicit firewall rules can help harden a networkdescribe how to implement WPA and WPA2 in a scenariorecognize the steps involved in implementing TKIP-RC4 in a given scenariooutline the purpose and characteristics of common authentication and authorization features, such as EAP, PEAP, EAP-FAST, EAP-TLS, shared or open, preshared key, captive portals, and MAC filteringrecognize how to implement geofencing in a scenariodescribe the key wireless security considerations, such as antenna placement, power levels, and wireless client and guest network isolationrecognize IoT security challenges and outline how to protect IoT systems and devices
-
describe how to use a VPN, including IPsec, SSL/TLS/DTLS, site-to-site, and client-to-siterecognize when and where to use remote desktop protocol (RDP) and remote desktop gatewaysoutline the purpose and features of using SSH when remotely accessing a networkdescribe the benefits of using virtual network computing (VNC) and virtual desktoprecognize remote authentication and authorization considerationsdescribe how to use out-of-band management, such as a modem or console routerrecognize when to implement motion detection and video surveillancedescribe when to implement asset trackingoutline the purpose and features of tamper detectionoutline the purpose of prevention techniques, such as badges, biometrics, smart cards, key fobs, employee training, access control vestibules, and lockssummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview2m 8sUP NEXT
-
2.Network Hardening Techniques8m 1s
-
3.Credentials and Strong Passwords6m 2s
-
4.Disabling Unused Ports9m 13s
-
5.Common Firewall Rules6m 3s
-
6.WPA and WPA2 Wireless Security5m 20s
-
7.TKIP-RC4 and AES-CCMP Wireless Security6m 10s
-
8.Wireless Authentication and Authorization9m 13s
-
9.Geofencing Technology5m 34s
-
10.Wireless Security Considerations5m 32s
-
11.IoT Security Considerations7m 18s
-
12.Virtual Private Networks9m 51s
-
13.Remote Desktop Protocol5m 16s
-
14.Secure Shell4m 51s
-
15.Virtual Network Computing4m 13s
-
16.Remote Authentication and Authorization7m 51s
-
17.Out-of-Band Management4m 52s
-
18.Motion Detection and Video Surveillance8m 54s
-
19.Asset Tracking and Disposal8m 48s
-
20.Tamper Detection4m 20s
-
21.Prevention Techniques7m 48s
-
22.Course Summary1m 14s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.