After completing these courses, you can …
- distinguish between different types of access control,
- explain the steps of access authorization.
- get an overview (biometrics, RFID, Barcode, Magnetic Stripes, Bluetooth, NFC, and RCID) and distinguish media technology used in the EAD environment,
- identify the most important components and services of a network and explain their tasks,
- list the most important differences between IPv4 and IPv6.