Unit 7: Authentication Methods and Requirements
Design appropriate authentication solutions throughout an IT infrastructure based on user types and data classification standards.
Different users and their authentication requirements
Remote Authentication Dial In User Service (RADIUS) and Terminal Access Controller Access Control System Plus (TACACS+) authentication server deployments
Authentication requirements for the Institute of Electrical and Electronics Engineers (IEEE) 802.11 wireless local area networks (WLANs) infrastructure
Best practices for private and public sector authentication
Ballad, Ballad, and Banks, Chapter 10: Access Control in the Enterprise.
Use the following keywords to search for additional materials to support your work:
Data Classification Standards
IEEE 802.11 WLAN Infrastructures
Private Sector and Public Sector Authentication
Remote Access for Employees Through Public Internet
Remote Access for Employees of City, Country, State, and Federal Governments
TACACS+ Multi-factor Authentication
Unit 7 Assignment 1: Implementation of Authentication Process
Learning Objectives and Outcomes
Design and document a secure wireless local area network (WLAN) authentication process.
Other than the Internet, probably no aspect of technology will have more impact on the classroom than the wireless local area network (WLAN), which may soon become as indispensable to the educational mission as chalkboards and textbooks. In the 21st century, technological literacy will be a primary determinant of whether a student succeeds or fails later in life. The ability to access and work with a wide range of information technology (IT) applications will be critical to ensuring this literacy. The benefits of a...