CompTIA Security+ 2008: Authentication Methods

This course is included in our On-demand training solution.


Developing authentication methods that ensure that a user is who they claim to be has been a challenge for administrators since shared networking was first introduced. There are many authentication models and strategies available today. This course introduces the learner to the concepts of AAA, hashing, multi-factor authentication, Kerberos, and domain security. This course is one of a series in the SkillSoft learning path that covers the objectives for the CompTIA Security+ (2008 Edition) certification exam.

Target Audience

Organizations involved in IT services or training that need to have personnel qualified for onwards delivery of IT support or training; businesses that will need up-to-date Security+ training for their own internal networking support purposes; individuals who are personally interested in establishing credentials for the benefit of their own career prospects.


Although not a prerequisite, it is recommended that CompTIA Security+ candidates have at least two years on-the-job networking experience with an emphasis on security. The CompTIA Network+ certification is also recommended.

Expected Duration

120 min.

Course Objectives

Authentication, Authorization, and Accounting

  • recognize key considerations when creating strong passwords
  • identify the components of authentication
  • recognize examples appropriate to authentication factors
  • Monitoring and Domains

  • recognize key functions of a protocol analyzer
  • recognize key functions of Active Directory Domain Services
  • Hashing Protocols and Password Cracking

  • recognize key aspects of Kerberos v5, NTLM, and LM
  • recognize password cracking techniques
  • Authenticating Users and Cracking Passwords

    Authentication Methods

  • recognize examples of identity proofing
  • distinguish between when to use CHAP, EAP, PAP, and mutual authentication
  • Kerberos

  • recognize the Kerberos authentication process
  • recognize the security weaknesses of Kerberos
  • Using Authentication Methods