CompTIA Security+ 2008: Authentication Methods


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number



Overview/Description
Developing authentication methods that ensure that a user is who they claim to be has been a challenge for administrators since shared networking was first introduced. There are many authentication models and strategies available today. This course introduces the learner to the concepts of AAA, hashing, multi-factor authentication, Kerberos, and domain security. This course is one of a series in the SkillSoft learning path that covers the objectives for the CompTIA Security+ (2008 Edition) certification exam.

Target Audience
Organizations involved in IT services or training that need to have personnel qualified for onwards delivery of IT support or training; businesses that will need up-to-date Security+ training for their own internal networking support purposes; individuals who are personally interested in establishing credentials for the benefit of their own career prospects.

Prerequisites
Although not a prerequisite, it is recommended that CompTIA Security+ candidates have at least two years on-the-job networking experience with an emphasis on security. The CompTIA Network+ certification is also recommended.

Expected Duration (hours)
2.0

Lesson Objectives

CompTIA Security+ 2008: Authentication Methods

  • recognize key considerations when creating strong passwords
  • identify the components of authentication
  • recognize examples appropriate to authentication factors
  • recognize key functions of a protocol analyzer
  • recognize key functions of Active Directory Domain Services
  • recognize key aspects of Kerberos v5, NTLM, and LM
  • recognize password cracking techniques
  • identify the components of authentication
  • assess security measures appropriate to one, two, and three-factor authentication
  • recognize password cracking tools
  • recognize examples of identity proofing
  • distinguish between when to use CHAP, EAP, PAP, and mutual authentication
  • recognize the Kerberos authentication process
  • recognize the security weaknesses of Kerberos
  • discuss scenarios appropriate to CHAP and Kerberos authentication, and to mutual authentication
  • Course Number:
    cs_sety_a03_it_enus