Security Devices, Wireless Security, & Access Control

Intermediate
  • 15 videos | 1h 41m 21s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 91 users Rating 4.7 of 91 users (91)
Discover how to protect organizational assets, like personnel, devices, and infrastructure. During this course, you will begin by about motion detection and video surveillance, asset tracking, tamper detection, and security risk prevention devices, such as badges, biometrics, smart cards, key fobs, and locks. Next, you will learn when to implement physical security devices. You'll move on to study authentication types, LDAP, certificates, authorization, and accounting features, such as Kerberos, Single Sign-On, auditing, and logging. Other topics include recognizing cyber access control features such as 802.1x, NAC, WPA, WPA2, TKIP-RC4, port security, geofencing, MAC filtering, captive portal, and access control lists. As an exercise, you will review the steps to secure a wireless network

WHAT YOU WILL LEARN

  • Recognize when to implement motion detection and video surveillance
    Identify when to implement asset tracking
    Describe the purpose of tamper detection
    Summarize the purpose of prevention techniques such as badges, biometrics, smart cards, key fobs, and locks
    Recognize when to implement physical security devices
    Describe authentication, authorization, and accounting features such as kerberos, single sign-on, auditing, and logging
    Describe additional authentication types including local authentication, ldap, and certificates
    Describe multifactor authentication types
  • Recognize the various access control features such as 802.1x, nac, port security, mac filtering, captive portal, and access control lists
    Implement access control
    Implement wpa and wpa2 in a scenario
    Implement tkip-rc4 in a scenario
    Implement authentication and authorization features such as eap, peap, eap-fast, eap-tls, shared or open, preshared key, and mac filtering
    Implement geofencing in a scenario
    Secure a wireless network

IN THIS COURSE

  • 8m 2s
    After completing this video, you will be able to recognize when to implement motion detection and video surveillance. FREE ACCESS
  • 6m 28s
    During this video, you will learn how to identify when to implement asset tracking. FREE ACCESS
  • Locked
    3.  Tamper Detection
    3m 37s
    After completing this video, you will be able to describe the purpose of tamper detection. FREE ACCESS
  • Locked
    4.  Prevention
    7m 7s
    Learn how to summarize the purpose of prevention techniques such as badges, biometrics, smart cards, key fobs, and locks. FREE ACCESS
  • Locked
    5.  Exercise: Implement Physical Security Devices
    3m 35s
    After completing this video, you will be able to recognize when to implement physical security devices. FREE ACCESS
  • Locked
    6.  Authentication, Authorization, and Accounting
    8m 55s
    Upon completion of this video, you will be able to describe authentication, authorization, and accounting features such as Kerberos, Single Sign-On, auditing, and logging. FREE ACCESS
  • Locked
    7.  Additional Authentication Types
    8m 4s
    Upon completion of this video, you will be able to describe additional authentication types including local authentication, LDAP, and certificates. FREE ACCESS
  • Locked
    8.  Multifactor Authentication
    9m 9s
    After completing this video, you will be able to describe the types of multifactor authentication. FREE ACCESS
  • Locked
    9.  Access Control
    9m 2s
    After completing this video, you will be able to recognize the various access control features, such as 802.1x, NAC, port security, MAC filtering, captive portal, and access control lists. FREE ACCESS
  • Locked
    10.  Exercise: Implement Access Control
    5m 33s
    Find out how to implement access control. FREE ACCESS
  • Locked
    11.  WPA and WPA2
    7m 35s
    In this video, you will learn how to implement WPA and WPA2 in a scenario. FREE ACCESS
  • Locked
    12.  TKIP-RC4 and AES-CCMP
    6m 17s
    In this video, learn how to implement TKIP-RC4 in a scenario. FREE ACCESS
  • Locked
    13.  Authentication and Authorization
    9m 3s
    In this video, you will learn how to implement authentication and authorization features such as EAP, PEAP, EAP-FAST, EAP-TLS, shared or open, preshared key, and MAC filtering. FREE ACCESS
  • Locked
    14.  Geofencing
    5m 27s
    During this video, you will learn how to implement geofencing in a scenario. FREE ACCESS
  • Locked
    15.  Exercise: Secure a Wireless Network
    3m 28s
    Learn how to secure a wireless network. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 4.5 of 33 users Rating 4.5 of 33 users (33)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 1327 users Rating 4.5 of 1327 users (1327)
Rating 4.6 of 2013 users Rating 4.6 of 2013 users (2013)
Rating 3.5 of 302 users Rating 3.5 of 302 users (302)