CompTIA Network+: Physical Security & Network Hardening

CompTIA Network+    |    Intermediate
  • 22 Videos | 2h 28m 31s
  • Includes Assessment
  • Earns a Badge
Network security is the practice of protecting and preventing unwelcome access attempts to computer networks. In this course, you’ll learn about network hardening techniques and best practices. You’ll learn to secure networks and about wireless authentication and authorization features. You’ll examine remote access methods and security considerations, VPN solutions, and the benefits of using virtual network computing and virtual desktop solutions. You’ll learn about remote authentication and authorization considerations and how to implement out-of-band management.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    outline techniques used to harden a network, including securing SNMP, port security, private VLANs, DHCP snooping, and access control lists
    recognize how to choose strong passwords and change credentials
    outline the importance of disabling unused ports, such as IP ports and device ports
    recognize how explicit and implicit firewall rules can help harden a network
    describe how to implement WPA and WPA2 in a scenario
    recognize the steps involved in implementing TKIP-RC4 in a given scenario
    outline the purpose and characteristics of common authentication and authorization features, such as EAP, PEAP, EAP-FAST, EAP-TLS, shared or open, preshared key, captive portals, and MAC filtering
    recognize how to implement geofencing in a scenario
    describe the key wireless security considerations, such as antenna placement, power levels, and wireless client and guest network isolation
    recognize IoT security challenges and outline how to protect IoT systems and devices
  • describe how to use a VPN, including IPsec, SSL/TLS/DTLS, site-to-site, and client-to-site
    recognize when and where to use remote desktop protocol (RDP) and remote desktop gateways
    outline the purpose and features of using SSH when remotely accessing a network
    describe the benefits of using virtual network computing (VNC) and virtual desktop
    recognize remote authentication and authorization considerations
    describe how to use out-of-band management, such as a modem or console router
    recognize when to implement motion detection and video surveillance
    describe when to implement asset tracking
    outline the purpose and features of tamper detection
    outline the purpose of prevention techniques, such as badges, biometrics, smart cards, key fobs, employee training, access control vestibules, and locks
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    2m 8s
    UP NEXT
  • Playable
    2. 
    Network Hardening Techniques
    8m 1s
  • Locked
    3. 
    Credentials and Strong Passwords
    6m 2s
  • Locked
    4. 
    Disabling Unused Ports
    9m 13s
  • Locked
    5. 
    Common Firewall Rules
    6m 3s
  • Locked
    6. 
    WPA and WPA2 Wireless Security
    5m 20s
  • Locked
    7. 
    TKIP-RC4 and AES-CCMP Wireless Security
    6m 10s
  • Locked
    8. 
    Wireless Authentication and Authorization
    9m 13s
  • Locked
    9. 
    Geofencing Technology
    5m 34s
  • Locked
    10. 
    Wireless Security Considerations
    5m 32s
  • Locked
    11. 
    IoT Security Considerations
    7m 18s
  • Locked
    12. 
    Virtual Private Networks
    9m 51s
  • Locked
    13. 
    Remote Desktop Protocol
    5m 16s
  • Locked
    14. 
    Secure Shell
    4m 51s
  • Locked
    15. 
    Virtual Network Computing
    4m 13s
  • Locked
    16. 
    Remote Authentication and Authorization
    7m 51s