CompTIA Network+ N10-007: Security Devices, Wireless Security, & Access Control


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description
Discover how to protect organizational assets, like personnel, devices, and infrastructure. During this course, you will begin by about motion detection and video surveillance, asset tracking, tamper detection, and security risk prevention devices, such as badges, biometrics, smart cards, key fobs, and locks. Next, you will learn when to implement physical security devices. You'll move on to study authentication types, LDAP, certificates, authorization, and accounting features, such as Kerberos, Single Sign-On, auditing, and logging. Other topics include recognizing cyber access control features such as 802.1x, NAC, WPA, WPA2, TKIP-RC4, port security, geofencing, MAC filtering, captive portal, and access control lists. As an exercise, you will review the steps to secure a wireless network.

Target Audience
Network administrators, network technicians, network installers, helpdesk technicians, IT cable installers, and any other professionals working with computer networks

Prerequisites
None

Expected Duration (hours)
1.8

Lesson Objectives

CompTIA Network+ N10-007: Security Devices, Wireless Security, & Access Control

  • start the course
  • recognize when to implement motion detection and video surveillance
  • identify when to implement asset tracking
  • describe the purpose of tamper detection
  • summarize the purpose of prevention techniques such as badges, biometrics, smart cards, key fobs, and locks
  • recognize when to implement physical security devices
  • describe authentication, authorization, and accounting features such as Kerberos, Single Sign-On, auditing, and logging
  • describe additional authentication types including local authentication, LDAP, and certificates
  • describe multifactor authentication types
  • recognize the various access control features such as 802.1x, NAC, port security, MAC filtering, captive portal, and access control lists
  • implement access control
  • implement WPA and WPA2 in a scenario
  • implement TKIP-RC4 in a scenario
  • implement authentication and authorization features such as EAP, PEAP, EAP-FAST, EAP-TLS, shared or open, preshared key, and MAC filtering
  • implement geofencing in a scenario
  • secure a wireless network
  • Course Number:
    cs_ctnp_a10_it_enus

    Expertise Level
    Intermediate