Time
33 hours 23 minutes
Difficulty
Beginner
CEU/CPE
33

Video Transcription

00:00
pillow and work about the Sai Buri 2019 cop T A Security plus certification.
00:07
We're going to continue our discussion of margin on the six, which in fact, is domain six and the top of discussions, photography and PKR.
00:16
Interestingly enough, we have a brand new learning object with a 6.3 with specifically states give a scenario and stalling and figure Wallace security settings
00:29
here again on some topics, which encompasses this particular object was just 6.3.
00:36
The first item. Arjuna is a pre assessment quiz,
00:40
and it reads as follows
00:42
You are deploying a guest wireless network for a restaurant.
00:46
The restaurant's legal department requires that your restaurant gets agreed to the restaurants, wildest terms and conditions before being allowed to use the network.
00:56
What should you do should you do eight. Deploy an open wireless network with encryption. Be deplore Wallace. Never with a wife. I protect that set up,
01:07
see a pro, a wireless network with a WP, a enterprise or D, deploy a wireless network with a with a capture porter.
01:19
If you said that you absolutely correct because a captive porter enables you to display the terms and condition rules and other information and require the guest to click. I agree before being allowed on the network.
01:33
Turn attitude toward cryptographic all protocols. A protocol is simply set of rules or instructions that determine how to act or interact in a given situation. A cryptographic protocol designed to allow secure communication
01:48
under a given set of circumstances. Geographical protocols, encryption protocol perform security function using what we call cryptographic algorithms.
02:00
So the 1st 1 to take a look as I would number different crypto graphical protocols the first we're gonna look it's called W P A,
02:07
which stands for WiFi protected access protocol a protection wildest network traffic in transit by implement much of the art. Tripoli It'll to that 11 11 i Standard Deputy uses temporal kee integrity
02:23
to verify the integrity of the packages
02:27
de e p. A. To provide mandatory support for Sisi MP, which is an A as
02:35
what we call base encryption and algorithm advanced encryption algorithm. In other words,
02:40
then we have W P A. Three.
02:43
This new state it uses 128 bit and 102 bit encryption with four secrecy and we're migrate.
02:51
Security issues pose other words or mitigate those security issues posed by weak passwords.
02:58
We have temporal Kee Integrity Protocol was designed to replace the Wallace equivalent privacy without requiring the replacement of legacy hardware.
03:07
Then we have a counter mo Seiple block chaining message authentication. Cold Protocol is designed to address the vulnerabilities and wept. CC MP is an enhanced data cryptographic away encapsulation mechanism used for data companies generally integrity and authentication.
03:28
Continuing discussion of 6.3 where we actually giving us in there were installing and figure wireless network security settings were going. Take a look at some additional authentication protocols ranging from AP all way down to a radius federation.
03:43
We look at dedication protocols basit and provide for the transfer of dedication between two parties, other words, a client and a server.
03:53
The 1st 1 taken extendable authentication protocol AP, which is an indication protocol that is frequently used and wireless networks and point to point connection. AP is not used for white networks.
04:06
Then we have protected extendable authentication. Protocol
04:15
is a version of a P designed to provide more security indication for NATO to that level. Wireless networks then support for NATO to that 11 x port number control. It goes by this by encapsulating the AP traffic within an encryption and authentication TLS type tonal.
04:33
Do you have the what we call the extendable
04:36
R E AP flexible authentication vo Secure Tunneling
04:42
that is opposed replacement for the lightweight extendable protocol at Leak. In other words,
04:47
then we have the AP transport layer
04:50
Security or E A P
04:53
minus TLS this user certificate based mutual dedication, negotiating up the encryption method and encrypted key determination between a client and death indicating server.
05:06
Then we have the A P
05:08
tunnel transport layer
05:11
basis. Similar tip P A P, but further stands or other words. But it does further extends upon TLS with an extended secure tunnel.
05:20
The security indication authenticates that client, using vindication at within the TLS rapper
05:29
continue on without authentication protocol. Tripoli at 2.1
05:33
basis. A stent designed to enhance the security of wireless networks.
05:40
There were radius with stands for remote authentication. Darling Users Service
05:46
Basis, an Internet protocol used for remote access services. A conveys uses authentication and configuration data between a centralized authentication server and a remote access server or radius client. To permit the remote access server to a dedicate request to use its network access points.
06:06
Continue our discussion of 6.3 giving a scenario. We're gonna take a look at some of dish objectives ranging from P S K versus your enterprise versus your open.
06:15
Take a look at de VPs will ask Captain porters as well.
06:19
When you look at the WiFi protected access of dopey A, it provides various methods for authenticate uses.
06:26
These very based on a method of key distribution and encryption protocol.
06:32
PS ***
06:34
basically or appreciate Key method is designed for home or small office networks.
06:42
Enterprise. This method requires radius authentication server. Although dumpy, a enterprise requires enterprise great authentication. The method provides additional security such as protection against dictionary attacks on short pass worth snooping villains signing automatically
06:59
and it supports the network access port protection as well.
07:03
They were open access point Do not require authentication for clients to connect
07:09
de P s stands for WiFi, but technics set up, which is a dedication, key decision method that is intended to simplify and strengthen on network security
07:20
kept. The portal
07:23
is a webpage that shows users a worker message informing them of the condition of access allowed ports liability, and we might require an authentication or some form of payment.
07:34
At this point time, we have our post assessment quiz,
07:38
and what we need to turn without this statement here is either true or false, and it reads as follows. Remote authentication, dahling User service, or radius, is an Internet protocol used for remote access services. It conveys user authentication and configuration data between a centralized authentication server and a remote
07:58
access server. Read its current
08:00
to permit the remote access server to authenticate requests to use its network access point.
08:07
In this case, if you select the true, you're absolutely correct.
08:11
Let's not turn our attention to order key takeaways from this particular presentation. We learned that Love WP a two provides mandatory support for Sisi PMP, which is a
08:20
as based type of other words, advanced encryption, standard based encryption protocol.
08:26
We also learn that the proto simply set of rules or instructions they determine how to act or interface in a given situation.
08:35
A cripple graphical protocol designed to allow secure communication on a given set of circumstances.
08:41
We also learned that remote
08:43
a dedication darling, use the excess service or radius is an Internet protocol used for more access services. A conveys uses of dedication and configuration data between your centralized authentication server and remote access server to permit the remote access server to authenticate requests to use
09:03
if there were access points
09:05
reports. In other words,
09:05
Debbie P. A. Three is a new status, which uses are 128 bit and 109 2 bit encryption were four secrecy, and we're my were, in fact, mitigate security issues posed by your weak passwords
09:20
in the upcoming video will continue on with our next line object, which is 6.4 were simply states, given a scenario, implement public key infrastructure, and again, I look forward to seeing you in the very next video.

Up Next

CompTIA Security+

Interested in the cybersecurity industry? The CompTIA Security+ is the gold standard for those looking to enter the cybersecurity industry. Join thousands of professionals who have gained this certification through this course and launched their careers in information security.

Instructed By

Instructor Profile Image
Jim Hollis
Independent Contractor
Instructor