March 2026
Intermediate to advanced
400 pages
15h 45m
English
The key to applying security in any network, large or small, is to allow authorized users to go about their business unhindered yet prevent unauthorized access to network resources. To achieve this, mechanisms must be in place to control access to the network. Furthermore, there must be a way to authenticate a user’s identity and then apply authorization rules and access controls to users, data, and other assets. This is termed authentication, authorization, and accounting (AAA).
Access to a network regardless of the device or technology, whether a fixed desktop or mobile wireless device, requires authentication, authorization, and accounting, defined as follows:
Read now
Unlock full access