Define key security concepts (threats, vulnerabilities, exploits, and mitigation techniques)
Describe security program elements (user awareness, training, and physical access control)
Configure device access control using local passwords
Describe security password policies elements, such as management, complexity, and password alternatives
Describe remote access and site-to-site VPNs
Configure and verify access control lists
Configure Layer 2 security features (DHCP snooping, dynamic ARP inspection, and port security)
Differentiate authentication, authorization, and accounting concepts
Describe wireless security protocols (WPA, WPA2, and WPA3)
Configure WLAN using WPA2 PSK using the GUI