The network authentication process can take many different forms. In this video, you’ll learn about PAP, CHAP, EAP, PEAP, Kerberos, single sign-on, and multi-factor authentication.
The CHAP and PAP authentication protocols have been a mainstay of network computing. In this video, you’ll learn how PAP and CHAP operates over the network and some of the advantages and disadvantages of using these protocols for authentication.
PAP and CHAP are some of the oldest methods of authenticating users. In this video, you’ll learn about CHAP and MS-CHAP and how we use these technologies for authentication.
Without authentication protocols, we wouldn’t be able to connect to any of our remote devices or log into our network. In this video, you’ll hear about the history of this technology and you’ll learn the differences between PAP, CHAP, and NTLM.
Virtual Private Networks allow us to take our computers anywhere and still maintain a secure network connection back to our central office. In this video, you’ll learn how VPNs authenticate and tunnel our network traffic into a secure encrypted link.