Pluralsight is not an official partner or accredited training center of EC-Council. Preventing malware and malicious users from gaining access is the first line of defense to secure your IT environment. In this course, Network Access and Authentication, you'll learn how to control access to your network. First, you'll be introduced to authentication factors and access control models. Next, you'll explore authentication protocols and when they should be used. Finally, you'll discover how to implement network security from authentication through to authorization. By the end of this course, you'll know how to protect your digital assets with secure authentication mechanisms. Software required: Windows Server 2016 and Red Hat Enterprise Linux 7.
Daniel Lachance, CompTIA Security+, CompTIA A+®, CompTIA Network+®, CompTIA Server+, CompTIA Cloud Essentials, MCITP, MCTS, MCSA, is the owner of Lachance IT Consulting Inc. He is the author of the CompTIA Server+ Certification All-in-One Exam Guide, CompTIA Cloud Essentials Certification Study Guide, and co-author of CompTIA Security+ Certification Practice Exams.
Course Overview Hey everyone, I'm Dan Lachance, and welcome to my course Network Access and Authentication. Preventing malware and malicious users from gaining network access is the first line of defense in securing your IT environment. Network access control can use a variety of different authentication protocols that really depend on your security requirements. Access control models then determine access to specific resources. Some of the major topics that we're going to cover include defining authentication, authorization, and accounting. We will talk about authentication protocols and when they should be used. And finally, we'll talk about techniques used to secure network traffic. So by the end of this course, you'll understand how to control network and resource access while protecting communications using techniques like encryption. I hope you'll join me to learn about network access and authentication here at Pluralsight.