This Lesson provides an overview of the different ways available to authenticate users.
Upon completion of this Lesson, you will be able to:
- understand the importance of controlling access to your network.
- identify vulnerabilities of tools used to manage networks.
- review ways to use tools more securely.