The network authentication process can take many different forms. In this video, you’ll learn about PAP, CHAP, EAP, PEAP, Kerberos, single sign-on, and multi-factor authentication.
This month; IP address classes, the depletion of IPv4 addresses, wireless SSID security, CSMA/CD vs. CSMA/CA, understanding EAP, and preparing for practical application questions.
The EAP framework is used in many of our modern technologies to provide standardized authentication. In this video, you’ll learn about EAP and some of the ways it can be used to authenticate your users.
Because wireless networks can be accessed without any type of restriction, the authentication method is very important. In this video, you’ll learn about the EAP, LEAP, and PEAP wireless authentication protocols.
Virtual Private Networks allow us to take our computers anywhere and still maintain a secure network connection back to our central office. In this video, you’ll learn how VPNs authenticate and tunnel our network traffic into a secure encrypted link.
During a normal day, we are constantly authenticating our user credentials to web sites, file servers, and other network resources. As with most technologies, there’s more than one way to perform these authentications. In this video, you’ll learn what’s happening over the wire and become familiar with PKI, Kerberos, AAA, network access control technologies, CHAP, EAP, and much more.