Information Security: NACs & Gateways
IT Security
| Beginner
- 12 videos | 37m 41s
- Includes Assessment
- Earns a Badge
Learners will discover key features of network access control (NAC), the importance of NAC in a network, various NAC elements, authentication, and its implementation, in this 12-video course. Explore the risks and challenges associated with BYOD-which means "bring your own device"-and IoT, which is Internet of Things. You will begin the course by examining the security risks introduced by BYOD and IoT, along with their preventive measures. You will then explore the major challenges with BYOD in an organization. The next tutorial defines NAC and the importance it has in a network. This leads into examining the NAC architecture; the different features of NAC; and the impact of an improperly configured NAC. You will learn about the various NAC elements; recall the best practices of implementing NAC, and identify the key points for creating an effective checklist for NAC security. In the final tutorial, learners will be asked to list the NAC authentication methods.
WHAT YOU WILL LEARN
-
Introduce the key concepts of the courseIdentify the security risks introduced by byod and iot along with their preventive measuresList the major challenges with byod in an organizationDefine nac and the importance it has in a networkIllustrate the nac architectureList the different features of nac
-
Describe the impact of an improperly configured nacList various nac elementsRecall the best practices of implementing nacIdentify the key point for creating an effective checklist for nac securityList the nac authentication methodsSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 51s
-
7m 15sIn this video, you will learn how to identify the security risks introduced by BYOD and IoT along with their preventive measures. FREE ACCESS
-
3m 9sUpon completion of this video, you will be able to list the major challenges with bring your own device in an organization. FREE ACCESS
-
6m 3sIn this video, you will learn how to define NAC and why it is important for a network. FREE ACCESS
-
2m 2sUpon completion of this video, you will be able to illustrate the NAC architecture. FREE ACCESS
-
3m 25sAfter completing this video, you will be able to list the different features of NAC. FREE ACCESS
-
2m 2sAfter completing this video, you will be able to describe the impact of an NAC that is not configured properly. FREE ACCESS
-
1m 58sUpon completion of this video, you will be able to list various NAC elements. FREE ACCESS
-
3m 21sAfter completing this video, you will be able to recall the best practices for implementing NAC. FREE ACCESS
-
1m 37sIn this video, find out how to identify the key points for creating an effective checklist for NAC Security. FREE ACCESS
-
3m 59sAfter completing this video, you will be able to list the authentication methods for the NAC. FREE ACCESS
-
1m
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.