This Lesson provides an overview of the different ways available to authenticate users.

Upon completion of this Lesson, you will be able to:

  • understand the importance of controlling access to your network.
  • identify vulnerabilities of tools used to manage networks.
  • review ways to use tools more securely.