5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Professional Curricula     Internet and Network Technologies Solution Area     CompTIA Network+     CompTIA Network+ N10-007
Discover how to protect organizational assets, like personnel, devices, and infrastructure. During this course, you will begin by about motion detection and video surveillance, asset tracking, tamper detection, and security risk prevention devices, such as badges, biometrics, smart cards, key fobs, and locks. Next, you will learn when to implement physical security devices. You'll move on to study authentication types, LDAP, certificates, authorization, and accounting features, such as Kerberos, Single Sign-On, auditing, and logging. Other topics include recognizing cyber access control features such as 802.1x, NAC, WPA, WPA2, TKIP-RC4, port security, geofencing, MAC filtering, captive portal, and access control lists. As an exercise, you will review the steps to secure a wireless network.

Objectives

Physical Security Devices

  • start the course
  • recognize when to implement motion detection and video surveillance
  • identify when to implement asset tracking
  • describe the purpose of tamper detection
  • summarize the purpose of prevention techniques such as badges, biometrics, smart cards, key fobs, and locks

Practice: Implementing Security Devices

  • recognize when to implement physical security devices

Authentication and Access Control

  • describe authentication, authorization, and accounting features such as Kerberos, Single Sign-On, auditing, and logging
  • describe additional authentication types including local authentication, LDAP, and certificates
  • describe multifactor authentication types
  • recognize the various access control features such as 802.1x, NAC, port security, MAC filtering, captive portal, and access control lists

Practice: Implementing Access Control

  • implement access control

Wireless Security

  • implement WPA and WPA2 in a scenario
  • implement TKIP-RC4 in a scenario
  • implement authentication and authorization features such as EAP, PEAP, EAP-FAST, EAP-TLS, shared or open, preshared key, and MAC filtering
  • implement geofencing in a scenario

Practice: Securing a Wireless Network

  • secure a wireless network