From the course: Cisco Network Security: Secure Access
Unlock the full course today
Join today to access over 24,600 courses taught by industry experts.
Next steps - Cisco Tutorial
From the course: Cisco Network Security: Secure Access
Next steps
- [Instructor] Thank you for watching. In this course, I covered the various elements involved in securely accessing resources. Including accessing devices through either in-band, or out-of-band access. As well as network management protocols, such as network time protocol, secure copy protocol, and simple network management protocol. Additionally, I reviewed AAA security, including authentication, authorization, and accounting. I compared RADIUS and TACACs authentication, along with the extended environment network administrators manage, when dealing with Bring Your Own Device, along with the integration of the Internet of Things. If you're interested in learning more, please check out the library, where we add new courses all the time. If you're interested in learning about packet analysis, please check out my courses on Wireshark. My course, "Introduction to Pen Testing for Cybersecurity Professionals", will be well worth your time. You might also want to see what my colleague…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.