-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
Python Web Development with Sanic
By :
Implementing network security practices and configurations should be second nature to network engineers. As a professional, it is important that you learn about various Layer 2 threats and how a threat actor can take advantage of vulnerabilities found within various Layer 2 network protocols.
In this chapter, you will learn about the need to use a Defense in Depth approach to secure both your users and devices on a network. Furthermore, you will learn how to identify various Layer 2 threats and attacks that are used to compromise an organization. Lastly, you will gain the knowledge and hands-on experience to implement various Layer 2 security controls to prevent and mitigate such attacks.
This chapter covers Domain 5: Security Fundamentals, objectives 5.7 Configure and verify Layer 2 security features (DHCP snooping, dynamic ARP inspection, and port security), 5.9 Describe wireless security protocols (WPA, WPA2, and WPA3), and 5.10 Configure...