Course description
This courses discusses the importance of layer 2 security to the integrity of your network. Topics include: best practices, rogue devices, port security and ARP Spoofing.
Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.
This is part 7 in the series.
Kenneth Mayer
As a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.
Video Runtime
99 Minutes
Time to complete
119 Minutes
Course Outline
Security
Security Best Practices (21:13)
Port Security (32:45)
RADIUS and TACACS (22:16)
DHCP Spoofing (23:39)