Course info
Nov 7, 2017
1h 34m

Pluralsight is not an official partner or accredited training center of EC-Council. Preventing malware and malicious users from gaining access is the first line of defense to secure your IT environment. In this course, Network Access and Authentication, you'll learn how to control access to your network. First, you'll be introduced to authentication factors and access control models. Next, you'll explore authentication protocols and when they should be used. Finally, you'll discover how to implement network security from authentication through to authorization. By the end of this course, you'll know how to protect your digital assets with secure authentication mechanisms. Software required: Windows Server 2016 and Red Hat Enterprise Linux 7.

About the author
About the author

Daniel Lachance, CompTIA Security+™, CompTIA A+®, CompTIA Network+®, CompTIA Server+, CompTIA Cloud Essentials, MCITP, MCTS, MCSA, is the owner of Lachance IT Consulting Inc. He is the author of the CompTIA Server+ Certification All-in-One Exam Guide, CompTIA Cloud Essentials Certification Study Guide, and co-author of CompTIA Security+ Certification Practice Exams.

More from the author
Managing Microsoft Azure Subscriptions
1h 60m
Jul 16, 2019
Computer Fundamentals: Hardware
2h 43m
Jan 14, 2019
More courses by Daniel Lachance
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hey everyone, I'm Dan Lachance, and welcome to my course Network Access and Authentication. Preventing malware and malicious users from gaining network access is the first line of defense in securing your IT environment. Network access control can use a variety of different authentication protocols that really depend on your security requirements. Access control models then determine access to specific resources. Some of the major topics that we're going to cover include defining authentication, authorization, and accounting. We will talk about authentication protocols and when they should be used. And finally, we'll talk about techniques used to secure network traffic. So by the end of this course, you'll understand how to control network and resource access while protecting communications using techniques like encryption. I hope you'll join me to learn about network access and authentication here at Pluralsight.