Overview/Description
Discover how to protect organizational assets, like personnel, devices, and infrastructure. During this course, you will begin by about motion detection and video surveillance, asset tracking, tamper detection, and security risk prevention devices, such as badges, biometrics, smart cards, key fobs, and locks. Next, you will learn when to implement physical security devices. You'll move on to study authentication types, LDAP, certificates, authorization, and accounting features, such as Kerberos, Single Sign-On, auditing, and logging. Other topics include recognizing cyber access control features such as 802.1x, NAC, WPA, WPA2, TKIP-RC4, port security, geofencing, MAC filtering, captive portal, and access control lists. As an exercise, you will review the steps to secure a wireless network.
Target Audience
Network administrators, network technicians, network installers, helpdesk technicians, IT cable installers, and any other professionals working with computer networks