5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Skills     Networks and Telecommunications     Networking Fundamentals     CompTIA Network+ N10-008

Network security is the practice of protecting and preventing unwelcome access attempts to computer networks. In this course, you’ll learn about network hardening techniques and best practices. You’ll learn to secure networks and about wireless authentication and authorization features.


You’ll examine remote access methods and security considerations, VPN solutions, and the benefits of using virtual network computing and virtual desktop solutions. You’ll learn about remote authentication and authorization considerations and how to implement out-of-band management.



Objectives

CompTIA Network+ N10-008: Physical Security & Network Hardening

  • discover the key concepts covered in this course
  • outline techniques used to harden a network, including securing SNMP, port security, private VLANs, DHCP snooping, and access control lists
  • recognize how to choose strong passwords and change credentials
  • outline the importance of disabling unused ports, such as IP ports and device ports
  • recognize how explicit and implicit firewall rules can help harden a network
  • describe how to implement WPA and WPA2 in a scenario
  • recognize the steps involved in implementing TKIP-RC4 in a given scenario
  • outline the purpose and characteristics of common authentication and authorization features, such as EAP, PEAP, EAP-FAST, EAP-TLS, shared or open, preshared key, captive portals, and MAC filtering
  • recognize how to implement geofencing in a scenario
  • describe the key wireless security considerations, such as antenna placement, power levels, and wireless client and guest network isolation
  • recognize IoT security challenges and outline how to protect IoT systems and devices
  • describe how to use a VPN, including IPsec, SSL/TLS/DTLS, site-to-site, and client-to-site
  • recognize when and where to use remote desktop protocol (RDP) and remote desktop gateways
  • outline the purpose and features of using SSH when remotely accessing a network
  • describe the benefits of using virtual network computing (VNC) and virtual desktop
  • recognize remote authentication and authorization considerations
  • describe how to use out-of-band management, such as a modem or console router
  • recognize when to implement motion detection and video surveillance
  • describe when to implement asset tracking
  • outline the purpose and features of tamper detection
  • outline the purpose of prevention techniques, such as badges, biometrics, smart cards, key fobs, employee training, access control vestibules, and locks
  • summarize the key concepts covered in this course