The network authentication process can take many different forms. In this video, you’ll learn about PAP, CHAP, EAP, PEAP, Kerberos, single sign-on, and multi-factor authentication.
Wireless authentication is handled using one of the EAP family of protocols. In this video, you’ll learn the differences between the EAP, LEAP, and PEAP authentication protocols.
Because wireless networks can be accessed without any type of restriction, the authentication method is very important. In this video, you’ll learn about the EAP, LEAP, and PEAP wireless authentication protocols.
Virtual Private Networks allow us to take our computers anywhere and still maintain a secure network connection back to our central office. In this video, you’ll learn how VPNs authenticate and tunnel our network traffic into a secure encrypted link.