Which of these network types uses independent authentication databases on each device?
An organization’s authentication servers are some of the most important services on the network. In this video, you’ll learn about TACACS and RADIUS misconfigurations, domain configurations, default passwords, and backdoors.
The network authentication process can take many different forms. In this video, you’ll learn about PAP, CHAP, EAP, PEAP, Kerberos, single sign-on, and multi-factor authentication.
Switches can be managed in many different ways. In this video, you’ll learn about unmanaged vs. managed switches, console connections, virtual terminals, in-band vs. out-of-band communication, and methods of authenticating administrators.
Our modern applications make extensive use of cryptography. In this video, you’ll learn the basics of cryptography and some of the history of ciphers and secrecy.
The CHAP and PAP authentication protocols have been a mainstay of network computing. In this video, you’ll learn how PAP and CHAP operates over the network and some of the advantages and disadvantages of using these protocols for authentication.
If you want to secure your authentication process, then you’ll probably implement some form of multi-factor authentication. In this video, you’ll learn how to secure your authentication by using something you are, something you have, something you know, something you are, and something you do.
Most of our day-to-day authentication uses a single-factor to provide access. In this video, you’ll learn about the different factors of authentication and some of the challenges around using single-factor authentication.
The foundation of access control is based on the three major tenants of identification, authentication, and authorization. In this video, you’ll learn how each of these is used to maintain the security of our networks.
You’ve probably visited a web site that provided authentication using a 3rd-party service, and it may have been using the Security Association Markup Language (SAML) to accomplish this. In this video, you’ll learn how SAML can be used to authenticate to one set of resources by using a completely different authentication provider.