CompTIA A+ Core 2: Wireless Security Protocols & Authentication Methods
CompTIA
| Beginner
- 10 videos | 45m 5s
- Includes Assessment
- Earns a Badge
There are numerous wireless security protocols and authentication methods available. Technicians must learn how to recommend and potentially implement a wireless security solution depending on the requirements of an organization. In this course, you will start by learning the difference between the Wi-Fi Protected Access 2 (WPA2) and Wi-Fi Protected Access 3 (WPA3) wireless protocols and the features of each. Explore other wireless protocols and encryption options, including Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES). Finally, investigate wireless security authentication solutions, including Remote Authentication Dial-In User Service (RADIUS), Terminal Access Controller Access-Control System (TACACS+), Kerberos, and multi-factor authentication. After completing this course you'll know how to implement wireless security protocols and authentication methods. This course also helps you to prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseProvide an overview of the wi-fi protected access 2 (wpa2) wireless protocolRecognize key features of the wi-fi protected access 3 (wpa3) wireless protocolIdentify features of the temporal key integrity protocol (tkip)Provide an overview of the advanced encryption standard (aes)
-
Provide an overview of the remote authentication dial-in user service (radius)Recognize key features of the terminal access controller access-control system (tacacs+)Describe how kerberos can be used as a wireless security authentication solutionRecognize the benefits of implementing multi-factor authenticationSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 52s
-
4m 59sAfter completing this video, you will be able to provide an overview of the wi-fi protected access 2 (WPA2) wireless protocol . FREE ACCESS
-
5m 13sAfter completing this video, you will be able to recognize key features of the Wi-Fi Protected Access 3 (WPA3) wireless protocol. FREE ACCESS
-
3m 40sIn this video, learn how to identify features of the temporal key integrity protocol (TKIP). FREE ACCESS
-
5m 15sAfter completing this video, you will be able to provide an overview of the advanced encryption standard (AES). FREE ACCESS
-
5m 12sAfter completing this video, you will be able to provide an overview of the remote authentication dial-in user service (RADIUS). FREE ACCESS
-
5m 2sUpon completion of this video, you will be able to recognize key features of the terminal access controller access-control system plus (TACACS+). FREE ACCESS
-
5m 35sAfter completing this video, you will be able to describe how kerberos can be used as a wireless security authentication solution. FREE ACCESS
-
7m 33sAfter completing this video, you will be able to recognize the benefits of implementing multi-factor authentication. FREE ACCESS
-
45s0cd260d7-2f5b-435e-9da3-6ff1963eb89a FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.