Course DescriptionExploiting or disabling a network device can impact a significant portion of the network. So it is imperative that you implement well-designed authentication, authorization, and accounting for all engineer, administrative, and root level access to network devices. In this course, you will learn about network hardening. This will include limiting and controlling remote access, implementing network management, minimizing unnecessary protocols, and using physical security to protect a network. You will also learn about wireless networks, and the security issues related to Wi-Fi.
- A solid understanding of TCP/IP protocols and how they work
- A strong foundation in basic networking concepts
James Michael Stewart
Michael has over 30 years experience with computers and technology with a focus on security, certification, and various operating systems. He has been teaching job skills and certification courses on topics like CISSP, ethical hacking and penetration testing, computer forensics, and Security Plus for over 20 years. He is also the primary author of two books and holds a variety of certifications including CISSP, CEH, CHFI, ECSA, and Security Plus.