© Ahmed F. Sheikh 2020
A. F. SheikhCompTIA Security+ Certification Study Guidehttps://doi.org/10.1007/978-1-4842-6234-4_13

13. Authentication and Remote Access

Ahmed F. Sheikh1 
(1)
Miami, FL, USA
 

In this chapter you will gain an understanding of authentication and remote access. You will learn about the function and purpose of authentication service, about the best practices relating to authentication, and about the methods and protocols used for remote access to networks.

By the end of this chapter, you will be able to
  1. 1.

    Explain the function and purpose of authentication services.

     
  2. 2.

    Explain the fundamental concepts and best practices related to authentication.

     
  3. 3.

    Identify the methods and protocols used for remote access to networks.

     

Authentication ...

Get CompTIA Security+ Certification Study Guide: Network Security Essentials now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.