Course details

Information Security: NACs & Gateways

Information Security: NACs & Gateways


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

Learners will discover key features of network access control (NAC), the importance of NAC in a network, various NAC elements, authentication, and its implementation, in this 12-video course. Explore the risks and challenges associated with BYOD—which means "bring your own device"—and IoT, which is Internet of Things. You will begin the course by examining the security risks introduced by BYOD and IoT, along with their preventive measures. You will then explore the major challenges with BYOD in an organization. The next tutorial defines NAC and the importance it has in a network. This leads into examining the NAC architecture; the different features of NAC; and the impact of an improperly configured NAC. You will learn about the various NAC elements; recall the best practices of implementing NAC, and identify the key points for creating an effective checklist for NAC security. In the final tutorial, learners will be asked to list the NAC authentication methods.



Expected Duration (hours)
0.6

Lesson Objectives

Information Security: NACs & Gateways

  • introduce the key concepts of the course
  • identify the security risks introduced by BYOD and IoT along with their preventive measures
  • list the major challenges with BYOD in an organization
  • define NAC and the importance it has in a network
  • illustrate the NAC architecture
  • list the different features of NAC
  • describe the impact of an improperly configured NAC
  • list various NAC elements
  • recall the best practices of implementing NAC
  • identify the key point for creating an effective checklist for NAC Security
  • list the NAC authentication methods
  • summarize the key concepts covered in this course
  • Course Number:
    it_saseandj_02_enus

    Expertise Level
    Beginner