5.0 Network Security

5.1 Given a scenario, implement appropriate wireless security measures.

5.2 Explain the methods of network access security.

5.3 Explain methods of user authentication.

5.4 Explain common threats, vulnerabilities, and mitigation techniques.

5.5 Given a scenario, install and configure a basic firewall.

5.6 Categorize different types of network security appliances and methods.