Network security is the practice of protecting and preventing unwelcome access attempts to computer networks. In this course, you’ll learn about network hardening techniques and best practices. You’ll learn to secure networks and about wireless authentication and authorization features.
You’ll examine remote access methods and security considerations, VPN solutions, and the benefits of using virtual network computing and virtual desktop solutions. You’ll learn about remote authentication and authorization considerations and how to implement out-of-band management.
outline techniques used to harden a network, including securing SNMP, port security, private VLANs, DHCP snooping, and access control lists
recognize how to choose strong passwords and change credentials
outline the importance of disabling unused ports, such as IP ports and device ports
recognize how explicit and implicit firewall rules can help harden a network
describe how to implement WPA and WPA2 in a scenario
recognize the steps involved in implementing TKIP-RC4 in a given scenario
outline the purpose and characteristics of common authentication and authorization features, such as EAP, PEAP, EAP-FAST, EAP-TLS, shared or open, preshared key, captive portals, and MAC filtering
recognize how to implement geofencing in a scenario
describe the key wireless security considerations, such as antenna placement, power levels, and wireless client and guest network isolation
recognize IoT security challenges and outline how to protect IoT systems and devices
describe how to use a VPN, including IPsec, SSL/TLS/DTLS, site-to-site, and client-to-site
recognize when and where to use remote desktop protocol (RDP) and remote desktop gateways
outline the purpose and features of using SSH when remotely accessing a network
describe the benefits of using virtual network computing (VNC) and virtual desktop
recognize remote authentication and authorization considerations
describe how to use out-of-band management, such as a modem or console router
recognize when to implement motion detection and video surveillance
describe when to implement asset tracking
outline the purpose and features of tamper detection
outline the purpose of prevention techniques, such as badges, biometrics, smart cards, key fobs, employee training, access control vestibules, and locks