444 Copyright Goodheart-Willcox Co., Inc. Learning Outcomes Diff erentiate between types of hackers. Give examples of common network security breaches and vulnerabilities. Explain the diff erence between an intrusion detection system and an intrusion prevention system. Provide examples of security methods and protocols. Describe methods for securing a wireless network. Compare RADIUS, Diameter, and TACACS+. List authentication methods. Compare authentication protocols. Summarize various methods of security implementation. Recall the purpose of various computer and network security tools. Give examples of security compliance requirements. Network Security 15 Network+ Certifi cation Exam Objectives Th e Network Security domain of the CompTIA Network+ Exam objectives has been expanded in recent years to include many of the latest security technologies. While an in-depth knowledge of any particular security technology is not required, you should be familiar with all of the objectives in the Network Security domain. It should be noted that each new version of Network+ has not only updated, but expanded the role of network security. Th is fact makes this chapter a pivotal chapter in your knowledge of networking. Objectives 1.1: Protocols and Ports—SSH 22, SFTP 22 1.3: Segmentation and Interface Properties— DMZ Access Control Lists 2.2: Firewall 2.3: Explain the Purposes and Use Cases for Advanced Networking Devices 3.2: Recover—Backups 3.4: VPN, SSH, VNC, HTTPS/Management URL Remote File Access—SFTP 3.5: Identify Policies and Best Practices 4.1: Detection, Prevention 4.2: Authorization, Authentication, and Accounting—RADIUS, TACACS+, Kerberos, Single Sign-On, Local Authentication, Certifi cates, Auditing and Logging Multifactor Authentication, Access Control 4.3: Given a Scenario, Secure a Basic Wireless Network CHAPTER 4.4: Summarize Common Networking Attacks 4.5: Given a Scenario, Implement Network Device Hardening 4.6: Explain Common Mitigation Techniques and Th eir Purposes Switch Port Protection—Flood Guard, DHCP Snooping 5.2: Software Tools—Packet Sniff er, Protocol Analyzer, WiFi Analyzer, Command Line (netstat) 5.4: Security Type Mismatch
Previous Page Next Page