Security Devices, Wireless Security, & Access Control

Intermediate
  • 15 Videos | 1h 41m 21s
  • Includes Assessment
  • Earns a Badge
Likes 37 Likes 37
Discover how to protect organizational assets, like personnel, devices, and infrastructure. During this course, you will begin by about motion detection and video surveillance, asset tracking, tamper detection, and security risk prevention devices, such as badges, biometrics, smart cards, key fobs, and locks. Next, you will learn when to implement physical security devices. You'll move on to study authentication types, LDAP, certificates, authorization, and accounting features, such as Kerberos, Single Sign-On, auditing, and logging. Other topics include recognizing cyber access control features such as 802.1x, NAC, WPA, WPA2, TKIP-RC4, port security, geofencing, MAC filtering, captive portal, and access control lists. As an exercise, you will review the steps to secure a wireless network

WHAT YOU WILL LEARN

  • recognize when to implement motion detection and video surveillance
    identify when to implement asset tracking
    describe the purpose of tamper detection
    summarize the purpose of prevention techniques such as badges, biometrics, smart cards, key fobs, and locks
    recognize when to implement physical security devices
    describe authentication, authorization, and accounting features such as Kerberos, Single Sign-On, auditing, and logging
    describe additional authentication types including local authentication, LDAP, and certificates
    describe multifactor authentication types
  • recognize the various access control features such as 802.1x, NAC, port security, MAC filtering, captive portal, and access control lists
    implement access control
    implement WPA and WPA2 in a scenario
    implement TKIP-RC4 in a scenario
    implement authentication and authorization features such as EAP, PEAP, EAP-FAST, EAP-TLS, shared or open, preshared key, and MAC filtering
    implement geofencing in a scenario
    secure a wireless network

IN THIS COURSE

  • Playable
    1. 
    Motion Detection and Video Surveillance
    8m 2s
    UP NEXT
  • Playable
    2. 
    Asset Tracking
    6m 28s
  • Locked
    3. 
    Tamper Detection
    3m 37s
  • Locked
    4. 
    Prevention
    7m 7s
  • Locked
    5. 
    Exercise: Implement Physical Security Devices
    3m 35s
  • Locked
    6. 
    Authentication, Authorization, and Accounting
    8m 55s
  • Locked
    7. 
    Additional Authentication Types
    8m 4s
  • Locked
    8. 
    Multifactor Authentication
    9m 9s
  • Locked
    9. 
    Access Control
    9m 2s
  • Locked
    10. 
    Exercise: Implement Access Control
    5m 33s
  • Locked
    11. 
    WPA and WPA2
    7m 35s
  • Locked
    12. 
    TKIP-RC4 and AES-CCMP
    6m 17s
  • Locked
    13. 
    Authentication and Authorization
    9m 3s
  • Locked
    14. 
    Geofencing
    5m 27s
  • Locked
    15. 
    Exercise: Secure a Wireless Network
    3m 28s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.