CompTIA Network+ 2012: Network Security Part 1

This course is included in our On-demand training solution.

Overview

A network’s security is only as strong as the security of its individual systems. Before connecting individual computers to the network, you need to ensure that the computers are secured using proper security mechanisms. This level of security will help you overcome any potential issues that might occur otherwise. Unsecured systems can result in compromised data and, ultimately, lost revenue. Identifying the appropriate steps and measures you can implement to protect your systems and keeping your resources and revenue safe from potential attacks is a key aspect of securing systems on your network. This course explores security in wired and wireless environments. This course prepares the learner for the CompTIA Network+ 2012 certification exam N10-005. Network+ is sometimes referred to as N+ or Net+.

Target Audience

The audience for CompTIA Network+ 2012 training will comprise IT personnel with at least nine to 12 months of IT networking experience. Good computer literacy along with a sound technical acumen should be present. This learning path is also suitable for students looking to acquire job skills, and to be trained specifically to pass the associated CompTIA Network+ (2012 Edition) certification exam. It is recommended, but not required, that candidates for the CompTIA Network+ 2012 exam obtain the CompTIA A+ certification or equivalent knowledge.

Prerequisites

Expected Duration

90 min.

Course Objectives

Wireless Security

  • define the encryption protocols used in wireless networks
  • describe other measures to secure wireless networks
  • Tunneling and Filtering Security

  • recognize the different ways access controls are used
  • match the type of VPN to its correct description
  • describe VPN encryption and VPN connection models
  • Remote Access

  • describe remote access
  • Encryption

  • describe encryption components and additional encryption protocols
  • User Authentication

  • recognize the different types of authentication
  • recognize examples of authentication protocols and services
  • sequence the steps to authenticate a remote session connection
  • User Security and Access Methods

    SUBSCRIPTION COST



     

    NEED HELP OR NOT SURE?