Security Devices, Wireless Security, & Access Control
Intermediate
- 15 videos | 1h 41m 21s
- Includes Assessment
- Earns a Badge
Discover how to protect organizational assets, like personnel, devices, and infrastructure. During this course, you will begin by about motion detection and video surveillance, asset tracking, tamper detection, and security risk prevention devices, such as badges, biometrics, smart cards, key fobs, and locks. Next, you will learn when to implement physical security devices. You'll move on to study authentication types, LDAP, certificates, authorization, and accounting features, such as Kerberos, Single Sign-On, auditing, and logging. Other topics include recognizing cyber access control features such as 802.1x, NAC, WPA, WPA2, TKIP-RC4, port security, geofencing, MAC filtering, captive portal, and access control lists. As an exercise, you will review the steps to secure a wireless network
WHAT YOU WILL LEARN
-
Recognize when to implement motion detection and video surveillanceIdentify when to implement asset trackingDescribe the purpose of tamper detectionSummarize the purpose of prevention techniques such as badges, biometrics, smart cards, key fobs, and locksRecognize when to implement physical security devicesDescribe authentication, authorization, and accounting features such as kerberos, single sign-on, auditing, and loggingDescribe additional authentication types including local authentication, ldap, and certificatesDescribe multifactor authentication types
-
Recognize the various access control features such as 802.1x, nac, port security, mac filtering, captive portal, and access control listsImplement access controlImplement wpa and wpa2 in a scenarioImplement tkip-rc4 in a scenarioImplement authentication and authorization features such as eap, peap, eap-fast, eap-tls, shared or open, preshared key, and mac filteringImplement geofencing in a scenarioSecure a wireless network
IN THIS COURSE
-
8m 2sAfter completing this video, you will be able to recognize when to implement motion detection and video surveillance. FREE ACCESS
-
6m 28sDuring this video, you will learn how to identify when to implement asset tracking. FREE ACCESS
-
3m 37sAfter completing this video, you will be able to describe the purpose of tamper detection. FREE ACCESS
-
7m 7sLearn how to summarize the purpose of prevention techniques such as badges, biometrics, smart cards, key fobs, and locks. FREE ACCESS
-
3m 35sAfter completing this video, you will be able to recognize when to implement physical security devices. FREE ACCESS
-
8m 55sUpon completion of this video, you will be able to describe authentication, authorization, and accounting features such as Kerberos, Single Sign-On, auditing, and logging. FREE ACCESS
-
8m 4sUpon completion of this video, you will be able to describe additional authentication types including local authentication, LDAP, and certificates. FREE ACCESS
-
9m 9sAfter completing this video, you will be able to describe the types of multifactor authentication. FREE ACCESS
-
9m 2sAfter completing this video, you will be able to recognize the various access control features, such as 802.1x, NAC, port security, MAC filtering, captive portal, and access control lists. FREE ACCESS
-
5m 33sFind out how to implement access control. FREE ACCESS
-
7m 35sIn this video, you will learn how to implement WPA and WPA2 in a scenario. FREE ACCESS
-
6m 17sIn this video, learn how to implement TKIP-RC4 in a scenario. FREE ACCESS
-
9m 3sIn this video, you will learn how to implement authentication and authorization features such as EAP, PEAP, EAP-FAST, EAP-TLS, shared or open, preshared key, and MAC filtering. FREE ACCESS
-
5m 27sDuring this video, you will learn how to implement geofencing in a scenario. FREE ACCESS
-
3m 28sLearn how to secure a wireless network. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.