From the course: Cisco Network Security: Secure Access

Unlock the full course today

Join today to access over 24,600 courses taught by industry experts.

Next steps

Next steps

- [Instructor] Thank you for watching. In this course, I covered the various elements involved in securely accessing resources. Including accessing devices through either in-band, or out-of-band access. As well as network management protocols, such as network time protocol, secure copy protocol, and simple network management protocol. Additionally, I reviewed AAA security, including authentication, authorization, and accounting. I compared RADIUS and TACACs authentication, along with the extended environment network administrators manage, when dealing with Bring Your Own Device, along with the integration of the Internet of Things. If you're interested in learning more, please check out the library, where we add new courses all the time. If you're interested in learning about packet analysis, please check out my courses on Wireshark. My course, "Introduction to Pen Testing for Cybersecurity Professionals", will be well worth your time. You might also want to see what my colleague…

Contents