Exploiting or disabling a network device can impact a significant portion of the network. So it is imperative that you implement well-designed authentication, authorization, and accounting for all engineer, administrative, and root level access to network devices. In this course, you will learn about network hardening. This will include limiting and controlling remote access, implementing network management, minimizing unnecessary protocols, and using physical security to protect a network. You will also learn about wireless networks, and the security issues related to Wi-Fi.
- A solid understanding of TCP/IP protocols and how they work
- A strong foundation in basic networking concepts