Section outline

    • Summarize the purposes of physical security devices.
    • Explain authentication and access controls.
    • Given a scenario, secure a basic wireless network.
    • Summarize common networking attacks.
    • Given a scenario, implement network device hardening.
    • Explain common mitigation techniques and their purposes.

    • Resources