CompTIA Security + 2008: Authentication Methods

MD Capacitación & Sistemas

Curso

A Distancia

$ 160 IVA inc.

Descripción

  • Tipología

    Curso

  • Metodología

    A distancia

  • Horas lectivas

    2h

This course introduces the learner to the concepts of AAA, hashing, multi-factor authentication, Kerberos, and domain security. This course is one of a series in the SkillSoft learning path that covers the objectives for the CompTIA Security+ (2008 Edition) certification exam. Dirigido a: Organizations involved in IT services or training that need to have personnel qualified for onwards delivery of IT support or training; businesses that will need up-to-date Security+ training for their own internal networking support purposes; individuals who are personally interested in establishing credentials for the benefit of their own career prospects

Información relevante sobre el curso

Although not a prerequisite, it is recommended that CompTIA Security+ candidates have at least two years on-the-job networking experience with an emphasis on security. The CompTIA Network+ certification is also recommended.

Preguntas & Respuestas

Añadí tu pregunta

Nuestros asesores y otros usuarios podrán responderte

¿Quién querés que te responda?

Dejanos tus datos para recibir respuesta

Sólo publicaremos tu nombre y pregunta

Opiniones

Plan de estudios

Lesson Objectives

CompTIA Security+ 2008: Authentication Methods

  • recognize key considerations when creating strong passwords
  • identify the components of authentication
  • recognize examples appropriate to authentication factors
  • recognize key functions of a protocol analyzer
  • recognize key functions of Active Directory Domain Services
  • recognize key aspects of Kerberos v5, NTLM, and LM
  • recognize password cracking techniques
  • identify the components of authentication
  • assess security measures appropriate to one, two, and three-factor authentication
  • recognize password cracking tools
  • recognize examples of identity proofing
  • distinguish between when to use CHAP, EAP, PAP, and mutual authentication
  • recognize the Kerberos authentication process
  • recognize the security weaknesses of Kerberos
  • discuss scenarios appropriate to CHAP and Kerberos authentication, and to mutual authentication
  • CompTIA Security + 2008: Authentication Methods

    $ 160 IVA inc.