CompTIA Network+: Physical Security & Network Hardening

CompTIA    |    Intermediate
  • 22 videos | 2h 18m 31s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 81 users Rating 4.5 of 81 users (81)
Network security is the practice of protecting and preventing unwelcome access attempts to computer networks. In this course, you'll learn about network hardening techniques and best practices. You'll learn to secure networks and about wireless authentication and authorization features You'll examine remote access methods and security considerations, VPN solutions, and the benefits of using virtual network computing and virtual desktop solutions. You'll learn about remote authentication and authorization considerations and how to implement out-of-band management.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline techniques used to harden a network, including securing snmp, port security, private vlans, dhcp snooping, and access control lists
    Recognize how to choose strong passwords and change credentials
    Outline the importance of disabling unused ports, such as ip ports and device ports
    Recognize how explicit and implicit firewall rules can help harden a network
    Describe how to implement wpa and wpa2 in a scenario
    Recognize the steps involved in implementing tkip-rc4 in a given scenario
    Outline the purpose and characteristics of common authentication and authorization features, such as eap, peap, eap-fast, eap-tls, shared or open, preshared key, captive portals, and mac filtering
    Recognize how to implement geofencing in a scenario
    Describe the key wireless security considerations, such as antenna placement, power levels, and wireless client and guest network isolation
    Recognize iot security challenges and outline how to protect iot systems and devices
  • Describe how to use a vpn, including ipsec, ssl/tls/dtls, site-to-site, and client-to-site
    Recognize when and where to use remote desktop protocol (rdp) and remote desktop gateways
    Outline the purpose and features of using ssh when remotely accessing a network
    Describe the benefits of using virtual network computing (vnc) and virtual desktop
    Recognize remote authentication and authorization considerations
    Describe how to use out-of-band management, such as a modem or console router
    Recognize when to implement motion detection and video surveillance
    Describe when to implement asset tracking
    Outline the purpose and features of tamper detection
    Outline the purpose of prevention techniques, such as badges, biometrics, smart cards, key fobs, employee training, access control vestibules, and locks
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 2m 8s
    In this video, you'll learn more about your instructor and the course. In this course, you will learn more about network security, network hardening techniques and best practices, ways to secure a network, remote access methods, VPN solutions, and the benefits of virtual network computing. You'll also learn out-of-band management, the benefits of physical security, and prevention techniques. FREE ACCESS
  • 8m 1s
    In this video, you'll learn more about network hardening techniques. This refers to the process of disabling features that aren’t required and making sure features that are required are only doing what they need to do.  You will learn about SNMP and you'll learn about Router Advertisement Guard. You'll explore Dynamic ARP Inspection, which helps protect against attacks. You'll learn more about control plane policing, private VLANs, default VLANs, DHCP snooping, and patching.  FREE ACCESS
  • Locked
    3.  Credentials and Strong Passwords
    6m 2s
    In this video, you'll learn more about setting up strong passwords. Passwords are one of the main security vulnerabilities in any networking environment. The video presents ideas on how to set up those passwords and how to use password management tools. You will also learn about multifactor authentication and how to be mindful of inactive user accounts.  FREE ACCESS
  • Locked
    4.  Disabling Unused Ports
    9m 13s
    In this video, you'll learn more about disabling unused ports. This includes both physical and virtual ports. The general process is to disable any port that is not being used. Ports that are unused are vulnerable. You can block those ports with a firewall.  FREE ACCESS
  • Locked
    5.  Common Firewall Rules
    6m 3s
    In this video, you'll learn more about basic firewall rules. Basic actions that can be applied to any firewall rule includes allow, deny, bypass, log only, and force allow. You will learn what each of these means, and when they are used. Next, you will learn about basic firewall rule format.  FREE ACCESS
  • Locked
    6.  WPA and WPA2 Wireless Security
    5m 20s
    In this video, you'll learn how to implement WPA and WPA2 in a scenario. You'll learn about Wired Equivalent Protocol, or WEP, and WPA. Wi-Fi Protected Access (WPA). It provides stronger encryption through the Temporal Key Integrity Protocol (TKIP) but it is incompatible with older devices. You'll learn more about WPA2. It offers better security through a new encryption protocol, the Advanced Encryption Standard (AES). FREE ACCESS
  • Locked
    7.  TKIP-RC4 and AES-CCMP Wireless Security
    6m 10s
    In this video, you'll learn more about TKIP-RC4. This is the Temporal Key Integrity Protocol that is considered a standard encryption protocol. It was designed to use with WEP. You'll learn that TKIP uses a suite of algorithms.  Next, you'll learn AES and CCMP. AES is Advanced Encryption Standard and it uses CCMP.  FREE ACCESS
  • Locked
    8.  Wireless Authentication and Authorization
    9m 13s
    In this video, you'll learn authentication. The encryption protocol is used to protect the data which is exchanged. You will learn that the Extensible Authentication Protocol is used to handle and define authentication requests. You will also learn about PEAP, or Protected Extensible Authentication Protocol, which is a version of EAP, and Flexible Authentication.  Next, you'll learn about shared and open authentication, MAC filtering, and captive portals.    FREE ACCESS
  • Locked
    9.  Geofencing Technology
    5m 34s
    In this video, you'll learn about geofencing technology. Geofencing is a process that defines geographical boundaries. These boundaries will trigger alerts when a device enters or exits a boundary.  You'll learn that geofencing can help harden a network. Next, you'll go over some examples of geofencing. FREE ACCESS
  • Locked
    10.  Wireless Security Considerations
    5m 32s
    In this video, you'll learn about the key wireless security considerations. These include antenna placement, power levels, and wireless client and guest network isolation. You'll learn about checking your access points to ensure you’re not broadcasting too far.  Next, you'll learn how to set up your access points. You will also learn about wireless client isolation. This helps prevent wireless clients from communicating with each other. You'll talk more about wireless security tips.    FREE ACCESS
  • Locked
    11.  IoT Security Considerations
    7m 18s
    In this video, you'll learn about the IoT, or the Internet of Things. This refers to the range of devices that are able to communicate with each other over the internet.  You'll also learn about mobile devices and the biometrics they now utilize for security. Finally, you'll learn about encryption, updates, and disabling unused features to improve security.    FREE ACCESS
  • Locked
    12.  Virtual Private Networks
    9m 51s
    In this video, you'll learn how to use a VPN. The VPN, or virtual private network, is used to provide secure connectivity across an unsecured network.  You'll learn that VPNs are used to access a business network remotely. Next, you'll learn about IPsec, or Internet Protocol Security. This is a set of protocols used to secure network communication while protecting data exchanged between a remote host and a gateway.  FREE ACCESS
  • Locked
    13.  Remote Desktop Protocol
    5m 16s
    In this video, you'll learn about remote desktop protocol. This is a proprietary protocol from Microsoft. It provides users with access to a remote desktop from anywhere over a network connection. You will learn about remote management and its benefits and features. RDP helps with encryption, smart card authentication, bandwidth reduction, and resource sharing. RDP also provides remote assistance. This allows you to connect to an existing Windows session to provide support.  FREE ACCESS
  • Locked
    14.  Secure Shell
    4m 51s
    In this video, you will learn about the features of the secure shell, or SSH. SSH is a remote protocol. It provides a secure way to access a desktop remotely, and it establishes authenticated, secure encrypted data communications.  You'll also learn how SSH can be used and why you might want to use it. SSH features include a client/server model and availability for most operating systems.  FREE ACCESS
  • Locked
    15.  Virtual Network Computing
    4m 13s
    In this video, you will learn the benefits of a VNC, or virtual network computing. This is another remote access protocol. It offers many of the same features and benefits, but VNC is an open-source application.  You'll learn that VNC functionality includes configure, troubleshoot, update, and training. FREE ACCESS
  • Locked
    16.  Remote Authentication and Authorization
    7m 51s
    In this video, you will learn to implement remote access authentication. You'll learn about Password Authentication Protocol, or PAP. This is an old protocol, and is not really used today.  You'll also learn about CHAP, which is more secure than PAP, as it challenges the client. The client must respond with the correct hashing algorithm.  Finally, you'll learn about the Radius server which provides a centralized authentication database.  FREE ACCESS
  • Locked
    17.  Out-of-Band Management
    4m 52s
    In this video, you will learn how to use out-of-band management. This management uses dedicated communication channels and requires dedicated devices and power.  Next, you'll talk about console servers that can be used to provide reliable access. These servers also provide centralized management for any connected devices. These servers can be accessed using multiple methods.   You'll learn that you need to consider access and how much data you'll need when considering an out-of-band management system.  FREE ACCESS
  • Locked
    18.  Motion Detection and Video Surveillance
    8m 54s
    In this video, you will learn when to implement motion detection and video surveillance. You'll take a look at a security control center. Here, we are talking about physical presence, rather than an online presence. The video discusses a CCTV system that includes cameras, audio recordings, and a monitoring station. You'll learn about the uses of these systems.  Next, you'll discuss motion detectors, both basic and advanced. You'll learn how these might be used.  FREE ACCESS
  • Locked
    19.  Asset Tracking and Disposal
    8m 48s
    In this video, you will learn when to implement asset tracking. Asset tracking is maintaining asset inventory records. Assets vary by organization. This typically includes hardware and software. This tracking will also include inventory records, software asset management, and hardware asset management.  FREE ACCESS
  • Locked
    20.  Tamper Detection
    4m 20s
    In this video, you will learn more about tamper detection. Tamper detection, with respect to security cameras, looks at how physical devices can be tampered with. This talks more about tampering with the camera rather than the data. However, it can refer to both.  You'll learn about things like blockage, redirecting, defocusing, spray-painting, and more. FREE ACCESS
  • Locked
    21.  Prevention Techniques
    7m 48s
    In this video, you will learn more about prevention techniques. You'll look at different methods of implementing prevention when it comes to security. You'll learn about control types, which include administration, technical controls, and operational. You will also learn about physical security such as badges or security cards. Plus, you'll explore biometrics, smart cards, keypads, key fobs, locks, and more.  Finally, you'll explore user education with respect to social engineering attacks.  FREE ACCESS
  • Locked
    22.  Course Summary
    1m 14s
    In this video, you will summarize what you've learned in the course. You've covered network hardening techniques and the importance of proper credentials and strong passwords. You discovered the importance of disabling unused ports and common firewall rules. You learned about wireless encryption protocols, wireless authentication and authorization as well as geofencing. You also learned about wireless and IoT considerations, where to use VPNs, RDH, SSH, and VNC. You learned about remote authentication and authorization and out-of-band management. The course also covered using motion detection, video surveillance, asset tracking, and tamper detection.  FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 27 users Rating 4.4 of 27 users (27)
Rating 4.6 of 80 users Rating 4.6 of 80 users (80)
Rating 4.8 of 52 users Rating 4.8 of 52 users (52)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 153 users Rating 4.5 of 153 users (153)
Rating 4.5 of 94 users Rating 4.5 of 94 users (94)
Rating 4.4 of 102 users Rating 4.4 of 102 users (102)