CompTIA Network+: Physical Security & Network Hardening
CompTIA
| Intermediate
- 22 videos | 2h 18m 31s
- Includes Assessment
- Earns a Badge
Network security is the practice of protecting and preventing unwelcome access attempts to computer networks. In this course, you'll learn about network hardening techniques and best practices. You'll learn to secure networks and about wireless authentication and authorization features You'll examine remote access methods and security considerations, VPN solutions, and the benefits of using virtual network computing and virtual desktop solutions. You'll learn about remote authentication and authorization considerations and how to implement out-of-band management.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseOutline techniques used to harden a network, including securing snmp, port security, private vlans, dhcp snooping, and access control listsRecognize how to choose strong passwords and change credentialsOutline the importance of disabling unused ports, such as ip ports and device portsRecognize how explicit and implicit firewall rules can help harden a networkDescribe how to implement wpa and wpa2 in a scenarioRecognize the steps involved in implementing tkip-rc4 in a given scenarioOutline the purpose and characteristics of common authentication and authorization features, such as eap, peap, eap-fast, eap-tls, shared or open, preshared key, captive portals, and mac filteringRecognize how to implement geofencing in a scenarioDescribe the key wireless security considerations, such as antenna placement, power levels, and wireless client and guest network isolationRecognize iot security challenges and outline how to protect iot systems and devices
-
Describe how to use a vpn, including ipsec, ssl/tls/dtls, site-to-site, and client-to-siteRecognize when and where to use remote desktop protocol (rdp) and remote desktop gatewaysOutline the purpose and features of using ssh when remotely accessing a networkDescribe the benefits of using virtual network computing (vnc) and virtual desktopRecognize remote authentication and authorization considerationsDescribe how to use out-of-band management, such as a modem or console routerRecognize when to implement motion detection and video surveillanceDescribe when to implement asset trackingOutline the purpose and features of tamper detectionOutline the purpose of prevention techniques, such as badges, biometrics, smart cards, key fobs, employee training, access control vestibules, and locksSummarize the key concepts covered in this course
IN THIS COURSE
-
2m 8sIn this video, you'll learn more about your instructor and the course. In this course, you will learn more about network security, network hardening techniques and best practices, ways to secure a network, remote access methods, VPN solutions, and the benefits of virtual network computing. You'll also learn out-of-band management, the benefits of physical security, and prevention techniques. FREE ACCESS
-
8m 1sIn this video, you'll learn more about network hardening techniques. This refers to the process of disabling features that aren’t required and making sure features that are required are only doing what they need to do. You will learn about SNMP and you'll learn about Router Advertisement Guard. You'll explore Dynamic ARP Inspection, which helps protect against attacks. You'll learn more about control plane policing, private VLANs, default VLANs, DHCP snooping, and patching. FREE ACCESS
-
6m 2sIn this video, you'll learn more about setting up strong passwords. Passwords are one of the main security vulnerabilities in any networking environment. The video presents ideas on how to set up those passwords and how to use password management tools. You will also learn about multifactor authentication and how to be mindful of inactive user accounts. FREE ACCESS
-
9m 13sIn this video, you'll learn more about disabling unused ports. This includes both physical and virtual ports. The general process is to disable any port that is not being used. Ports that are unused are vulnerable. You can block those ports with a firewall. FREE ACCESS
-
6m 3sIn this video, you'll learn more about basic firewall rules. Basic actions that can be applied to any firewall rule includes allow, deny, bypass, log only, and force allow. You will learn what each of these means, and when they are used. Next, you will learn about basic firewall rule format. FREE ACCESS
-
5m 20sIn this video, you'll learn how to implement WPA and WPA2 in a scenario. You'll learn about Wired Equivalent Protocol, or WEP, and WPA. Wi-Fi Protected Access (WPA). It provides stronger encryption through the Temporal Key Integrity Protocol (TKIP) but it is incompatible with older devices. You'll learn more about WPA2. It offers better security through a new encryption protocol, the Advanced Encryption Standard (AES). FREE ACCESS
-
6m 10sIn this video, you'll learn more about TKIP-RC4. This is the Temporal Key Integrity Protocol that is considered a standard encryption protocol. It was designed to use with WEP. You'll learn that TKIP uses a suite of algorithms. Next, you'll learn AES and CCMP. AES is Advanced Encryption Standard and it uses CCMP. FREE ACCESS
-
9m 13sIn this video, you'll learn authentication. The encryption protocol is used to protect the data which is exchanged. You will learn that the Extensible Authentication Protocol is used to handle and define authentication requests. You will also learn about PEAP, or Protected Extensible Authentication Protocol, which is a version of EAP, and Flexible Authentication. Next, you'll learn about shared and open authentication, MAC filtering, and captive portals. FREE ACCESS
-
5m 34sIn this video, you'll learn about geofencing technology. Geofencing is a process that defines geographical boundaries. These boundaries will trigger alerts when a device enters or exits a boundary. You'll learn that geofencing can help harden a network. Next, you'll go over some examples of geofencing. FREE ACCESS
-
5m 32sIn this video, you'll learn about the key wireless security considerations. These include antenna placement, power levels, and wireless client and guest network isolation. You'll learn about checking your access points to ensure you’re not broadcasting too far. Next, you'll learn how to set up your access points. You will also learn about wireless client isolation. This helps prevent wireless clients from communicating with each other. You'll talk more about wireless security tips. FREE ACCESS
-
7m 18sIn this video, you'll learn about the IoT, or the Internet of Things. This refers to the range of devices that are able to communicate with each other over the internet. You'll also learn about mobile devices and the biometrics they now utilize for security. Finally, you'll learn about encryption, updates, and disabling unused features to improve security. FREE ACCESS
-
9m 51sIn this video, you'll learn how to use a VPN. The VPN, or virtual private network, is used to provide secure connectivity across an unsecured network. You'll learn that VPNs are used to access a business network remotely. Next, you'll learn about IPsec, or Internet Protocol Security. This is a set of protocols used to secure network communication while protecting data exchanged between a remote host and a gateway. FREE ACCESS
-
5m 16sIn this video, you'll learn about remote desktop protocol. This is a proprietary protocol from Microsoft. It provides users with access to a remote desktop from anywhere over a network connection. You will learn about remote management and its benefits and features. RDP helps with encryption, smart card authentication, bandwidth reduction, and resource sharing. RDP also provides remote assistance. This allows you to connect to an existing Windows session to provide support. FREE ACCESS
-
4m 51sIn this video, you will learn about the features of the secure shell, or SSH. SSH is a remote protocol. It provides a secure way to access a desktop remotely, and it establishes authenticated, secure encrypted data communications. You'll also learn how SSH can be used and why you might want to use it. SSH features include a client/server model and availability for most operating systems. FREE ACCESS
-
4m 13sIn this video, you will learn the benefits of a VNC, or virtual network computing. This is another remote access protocol. It offers many of the same features and benefits, but VNC is an open-source application. You'll learn that VNC functionality includes configure, troubleshoot, update, and training. FREE ACCESS
-
7m 51sIn this video, you will learn to implement remote access authentication. You'll learn about Password Authentication Protocol, or PAP. This is an old protocol, and is not really used today. You'll also learn about CHAP, which is more secure than PAP, as it challenges the client. The client must respond with the correct hashing algorithm. Finally, you'll learn about the Radius server which provides a centralized authentication database. FREE ACCESS
-
4m 52sIn this video, you will learn how to use out-of-band management. This management uses dedicated communication channels and requires dedicated devices and power. Next, you'll talk about console servers that can be used to provide reliable access. These servers also provide centralized management for any connected devices. These servers can be accessed using multiple methods. You'll learn that you need to consider access and how much data you'll need when considering an out-of-band management system. FREE ACCESS
-
8m 54sIn this video, you will learn when to implement motion detection and video surveillance. You'll take a look at a security control center. Here, we are talking about physical presence, rather than an online presence. The video discusses a CCTV system that includes cameras, audio recordings, and a monitoring station. You'll learn about the uses of these systems. Next, you'll discuss motion detectors, both basic and advanced. You'll learn how these might be used. FREE ACCESS
-
8m 48sIn this video, you will learn when to implement asset tracking. Asset tracking is maintaining asset inventory records. Assets vary by organization. This typically includes hardware and software. This tracking will also include inventory records, software asset management, and hardware asset management. FREE ACCESS
-
4m 20sIn this video, you will learn more about tamper detection. Tamper detection, with respect to security cameras, looks at how physical devices can be tampered with. This talks more about tampering with the camera rather than the data. However, it can refer to both. You'll learn about things like blockage, redirecting, defocusing, spray-painting, and more. FREE ACCESS
-
7m 48sIn this video, you will learn more about prevention techniques. You'll look at different methods of implementing prevention when it comes to security. You'll learn about control types, which include administration, technical controls, and operational. You will also learn about physical security such as badges or security cards. Plus, you'll explore biometrics, smart cards, keypads, key fobs, locks, and more. Finally, you'll explore user education with respect to social engineering attacks. FREE ACCESS
-
1m 14sIn this video, you will summarize what you've learned in the course. You've covered network hardening techniques and the importance of proper credentials and strong passwords. You discovered the importance of disabling unused ports and common firewall rules. You learned about wireless encryption protocols, wireless authentication and authorization as well as geofencing. You also learned about wireless and IoT considerations, where to use VPNs, RDH, SSH, and VNC. You learned about remote authentication and authorization and out-of-band management. The course also covered using motion detection, video surveillance, asset tracking, and tamper detection. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.