5.0 Security

5.1 Configure and verify device access control

5.1.a Lines and password protection
5.1.b Authentication and authorization using AAA
5.2 Configure and verify infrastructure security features

5.2.a ACLs
5.2.b CoPP
5.3 Describe REST API security

5.4 Configure and verify wireless security features

5.4.a EAP
5.4.b WebAuth
5.4.c PSK
5.5 Describe the components of network security design

5.5.a Threat defense
5.5.b Endpoint security
5.5.c Next-generation firewall
5.5.d TrustSec, MACsec
5.5.e Network access control with 802.1X, MAB, and WebAuth