CompTIA Security + 2008: Authentication Methods

MD Capacitación & Sistemas
A Distancia

$ 160
¿Preferís llamar ya al centro?
47062... Ver más

Información importante

  • Curso
  • A distancia
  • 2 horas de dedicación
Descripción

This course introduces the learner to the concepts of AAA, hashing, multi-factor authentication, Kerberos, and domain security. This course is one of a series in the SkillSoft learning path that covers the objectives for the CompTIA Security+ (2008 Edition) certification exam.
Dirigido a: Organizations involved in IT services or training that need to have personnel qualified for onwards delivery of IT support or training; businesses that will need up-to-date Security+ training for their own internal networking support purposes; individuals who are personally interested in establishing credentials for the benefit of their own career prospects

Información importante

Preguntas Frecuentes

· Requisitos

Although not a prerequisite, it is recommended that CompTIA Security+ candidates have at least two years on-the-job networking experience with an emphasis on security. The CompTIA Network+ certification is also recommended.

Opiniones

Todavía no hay opiniones de este curso

Temario

Lesson Objectives

CompTIA Security+ 2008: Authentication Methods

  • recognize key considerations when creating strong passwords
  • identify the components of authentication
  • recognize examples appropriate to authentication factors
  • recognize key functions of a protocol analyzer
  • recognize key functions of Active Directory Domain Services
  • recognize key aspects of Kerberos v5, NTLM, and LM
  • recognize password cracking techniques
  • identify the components of authentication
  • assess security measures appropriate to one, two, and three-factor authentication
  • recognize password cracking tools
  • recognize examples of identity proofing
  • distinguish between when to use CHAP, EAP, PAP, and mutual authentication
  • recognize the Kerberos authentication process
  • recognize the security weaknesses of Kerberos
  • discuss scenarios appropriate to CHAP and Kerberos authentication, and to mutual authentication