Kurs 14909 - IBM Wireless LAN Security Part 1 – Specifications and Standards

Mehr Information

Kurs 14909 - IBM Wireless LAN Security Part 1 – Specifications and Standards

  • Ziele - To match wireless network security definitions with their features. - To identify features of wireless technology that are beneficial to business. - To match wireless technology categories with their descriptions. - To identify reasons why security is important in a wireless network. - To match attack types with their descriptions. - To identify business risks associated with data transmission. - To identify features of electromagnetism. - To identify features of Radio Frequency (RF) bands. - To identify characteristics of the Institute of Electrical and Electronics Engineers (IEEE) 802 Working Group.
  • Anforderungen Experienced network professionals involved in the evaluation, design, planning, installation and management of WLAN.
  • Titel Kurs 14909 - IBM Wireless LAN Security Part 1 – Specifications and Standards
  • Inhalt Deployment Options

    Self-Study

    Objectives

    Unit 1: Security Overview - 3 hours

    - Match wireless network security definitions with their features.
    - Identify features of wireless technology that are beneficial to business.
    - Match wireless technology categories with their descriptions.
    - Identify characteristics of security in business.
    - Identify characteristics of the Security-Privacy-Trust concept.
    - Identify features of Extensible Authentication Protocol (EAP).
    - Identify features of Institute of Electrical and Electronics Engineers (IEEE) 802.1x.
    - Identify characteristics of 802.1x at work with Extensible Authentication Protocol (EAP) and Remote Authentication Dial-In User Service (RADIUS).
    - Identify key features of encryption.
    - Identify key features of symmetrical encryption.
    - Identify key features of asymmetrical encryption.
    - Identify key features of hashing technology.
    - Identify responsibilities of Public Key Infrastructure (PKI).
    - Identify features of authentication.
    - Match wireless network security definitions with their features.
    - Match authentication server protocols with their descriptions.

    Unit 2: Wireless Specifics - 2 hours

    - Identify reasons why security is important in a wireless network.
    - Match attack types with their descriptions.
    - Identify business risks associated with data transmission.
    - Identify issues affecting wireless security management.
    - Identify techniques for protecting a Wireless Local Area Network (WLAN) from intruders.
    - Identify issues related to the security of an enterprise network.
    - Identify benefits of deploying a Wireless Local Area Network (WLAN).

    Unit 3: Standards - 3 hours

    - Identify features of electromagnetism.
    - Identify features of Radio Frequency (RF) bands.
    - Identify characteristics of the Institute of Electrical and Electronics Engineers (IEEE) 802 Working Group.
    - Identify characteristics of physical standards.
    - Identify features of the role of the Trusted Computing Platform Alliance (TCPA).
    - Identify features of Common Criteria (CC) certification.
    - Identify features of the IBM Embedded Security Subsystem (ESS) mobile solution.
    - Identify characteristics of the Diffie-Hellman key exchange.
    - Identify key characteristics of hashing algorithms.
    - Identify characteristics of tunneling protocols.
    - Identify steps in the process of establishing a tunnel.
    - Identify features of Wired Equivalent Privacy (WEP).
    - Identify characteristics of Internet Protocol Security (IPSec) in the network layer.
    - Identify characteristics of the Institute of Electrical and Electronics Engineers (IEEE) 802.1x standard.
    - Identify features of the Remote Authentication Dial-In User Service (RADIUS) authentication server.
    - Sequence the stages involved in roaming with 802.1x.
    - Identify features of the Wi-Fi Alliance.
    - Identify reasons why interoperability problems may occur in a wireless environment.

    Course Access

    Each student has access to the course for a period of 6 months from the day of enrollment in the course.

Ähnliche angebote die in bezug zu ihrer anfrage "informations netzwerk" stehen

  • Kurs Support-System für Anwender

  • Bildungszentren: Irmler It Solucions
  • Mehr Information
  • Master Informationstechnik

  • Bildungszentren: Fachhochschule Wiener Neustadt für Wirtschaft und Technik
  • Mehr Information
  • Master Intelligent Transport Systems

  • Bildungszentren: Fachhochschule Technikum Wien
  • Mehr Information
  • Master Medieninformatik

  • Bildungszentren: Universität Wien
  • Mehr Information
  • Master Scientific Computing

  • Bildungszentren: Universität Wien
  • Mehr Information
  • Bachelor Informatik

  • Bildungszentren: Universität Wien
  • Mehr Information
  • Bachelor Wirtschaftsinformatik

  • Bildungszentren: Wirtschaftsuniversität Wien
  • Mehr Information