O'Reilly logo

CompTIA® Network+® N10-005 In Depth by Tamara Dean

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

chapter 11

Network Security

After reading this chapter and completing the exercises, you will be able to:

• Identify security threats and vulnerabilities in LANs and WANs and design security policies that minimize risks

• Explain security measures for network hardware and design, including firewalls, intrusion detection systems, and scanning tools

• Understand methods of encryption, such as SSL and IPSec, that can secure data in storage and in transit

• Describe how user authentication protocols, such as PKI, RADIUS, TACACS+, Kerberos, CHAP, MS-CHAP, and EAP function

• Use network operating system techniques to provide basic security

• Understand wireless security protocols, such as WEP, WPA, and 802.11i

On the Job

Security often involves synthesizing ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required