CompTIA Network+: Physical Security & Network Hardening

CompTIA Network+
  • 22 Videos | 2h 19m 37s
  • Includes Assessment
  • Earns a Badge
Network security is the practice of protecting and preventing unwelcome access attempts to computer networks. In this course, you’ll learn about network hardening techniques and best practices. You’ll learn to secure networks and about wireless authentication and authorization features. You’ll examine remote access methods and security considerations, VPN solutions, and the benefits of using virtual network computing and virtual desktop solutions. You’ll learn about remote authentication and authorization considerations and how to implement out-of-band management.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    outline techniques used to harden a network, including securing SNMP, port security, private VLANs, DHCP snooping, and access control lists
    recognize how to choose strong passwords and change credentials
    outline the importance of disabling unused ports, such as IP ports and device ports
    recognize how explicit and implicit firewall rules can help harden a network
    describe how to implement WPA and WPA2 in a scenario
    recognize the steps involved in implementing TKIP-RC4 in a given scenario
    outline the purpose and characteristics of common authentication and authorization features, such as EAP, PEAP, EAP-FAST, EAP-TLS, shared or open, preshared key, captive portals, and MAC filtering
    recognize how to implement geofencing in a scenario
    describe the key wireless security considerations, such as antenna placement, power levels, and wireless client and guest network isolation
    recognize IoT security challenges and outline how to protect IoT systems and devices
  • describe how to use a VPN, including IPsec, SSL/TLS/DTLS, site-to-site, and client-to-site
    recognize when and where to use remote desktop protocol (RDP) and remote desktop gateways
    outline the purpose and features of using SSH when remotely accessing a network
    describe the benefits of using virtual network computing (VNC) and virtual desktop
    recognize remote authentication and authorization considerations
    describe how to use out-of-band management, such as a modem or console router
    recognize when to implement motion detection and video surveillance
    describe when to implement asset tracking
    outline the purpose and features of tamper detection
    outline the purpose of prevention techniques, such as badges, biometrics, smart cards, key fobs, employee training, access control vestibules, and locks
    summarize the key concepts covered in this course

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE