SBN

CompTIA Network+ Domain 4: Network Security

Introduction

The COMPTIA Network+ certification can help launch your career to the next level and is a strong professional asset to have on your side. To earn this certification, you have to pass the Network+ certification exam. This exam covers five different Domains of knowledge that certification candidates will need to master.

This article will detail Domain 4.0 — Network Security, complete with its different objectives and what you will need to cover. Please note that this article should not serve as your sole means of preparing for the Network+ certification exam, but rather as a general review or an outline foundation.

Network Security Outline

The following subtopics can be expected to be tested in the Network Security section of the Network+ exam:

  • 4.1 Physical security devices and their purposes
  • 4.2 Authentication and access controls
  • 4.3 Securing basic wireless networks — scenario-based
  • 4.4 Common networking attacks
  • 4.5 Implement network device hardening — scenario-based
  • 4.6 Common mitigation techniques

Physical Security Devices and Their Purposes

Physical security is a taken-for-granted network security measure. It would not make sense to invest time and money into network security if important network devices are left unlocked for anyone to steal or modify. This subtopic will examine the essential physical security of security devices and their purposes.

Detection

The first layer of physical security this Domain will examine is detection. There are several different technologies that can detect physical intrusion and comprise:

  • Motion detection
  • Video surveillance
  • Asset tracking tags
  • Tamper detection

Prevention

Physical detection is not the only safeguard you should take for your network. “An ounce of prevention is worth a pound of cure” applies to this situation, because sometimes all it takes is proper prevention to stop an intruder — which is more than millions invested into (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Greg Belding. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/5rwCR-AnTIo/

Secure Guardrails