The network authentication process can take many different forms. In this video, you’ll learn about PAP, CHAP, EAP, PEAP, Kerberos, single sign-on, and multi-factor authentication.
The CHAP and PAP authentication protocols have been a mainstay of network computing. In this video, you’ll learn how PAP and CHAP operates over the network and some of the advantages and disadvantages of using these protocols for authentication.
Virtual Private Networks allow us to take our computers anywhere and still maintain a secure network connection back to our central office. In this video, you’ll learn how VPNs authenticate and tunnel our network traffic into a secure encrypted link.
During a normal day, we are constantly authenticating our user credentials to web sites, file servers, and other network resources. As with most technologies, there’s more than one way to perform these authentications. In this video, you’ll learn what’s happening over the wire and become familiar with PKI, Kerberos, AAA, network access control technologies, CHAP, EAP, and much more.