O'Reilly logo

CompTIA Network+ N10-005 Authorized Cert Guide by Kevin Wallace

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 12. Securing a Network

Upon completion of this chapter, you will be able to answer the following questions:

• What are the goals of network security, and what sorts of attacks do you need to defend against?

• What best practices can be implemented to defend against security threats?

• What are the characteristics of various remote-access security technologies?

• How can firewalls be used to protect an organization’s internal network, while allowing connectivity to an untrusted network, such as the Internet?

• How can virtual private networks (VPN) be used to secure traffic as that traffic flows over an untrusted network?

• What is the difference between intrusion prevention and intrusion detection systems, and how do they protect an organization ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required