O'Reilly logo

CompTIA® Network+® 2009 In Depth by Tamara Dean

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 12. Network Security

After reading this chapter and completing the exercises, you will be able to:

  • Identify security risks in LANs and WANs and design security policies that minimize risks

  • Explain how physical security contributes to network security

  • Discuss hardware- and design-based security techniques

  • Understand methods of encryption, such as SSL and IPSec, that can secure data in storage and in transit

  • Describe how popular authentication protocols, such as RADIUS, TACACS, Kerberos, PAP, CHAP, and MS-CHAP, function

  • Use network operating system techniques to provide basic security

  • Understand wireless security protocols, such as WEP, WPA, and 802.11i

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required