- Packet Tracer
- Compare in-band and out-of-band management
- Configuring SNMP
- Securing Copy Protocol
- AAA security: authentication, authorization, and accounting
- RADIUS and TACACS+
- BYOD architecture
- MDM and IoT security
Skill Level Intermediate
- [Instructor] What happens when you sign in and want to access resources on a network? You will most likely go through a series of steps, as gaining secure access to a network has many elements that include granting, limiting, preventing, and revoking access. Hello, my name is Lisa Bock and I'm a security ambassador. In this course, I'll cover the many elements of secure access, that includes management, secure device access, and protocols, such as Network Time Protocol, Secure Copy Protocol, and Simple Network Management Protocol.
I'll cover AAA security, including authentication, authorization, and accounting. I'll compare RADIUS and TACACS+ authentication along with the extended environment network administrators manage today in dealing with Bring Your Own Device, mobile device management, and integration of the Internet of Things. I am super excited to bring you this series on CCNA security and this section on secure access, so that you can improve your skills and configuration, and maintenance of CISCO devices.
Are you ready? Let's get started.