Home > Kurse - Seminare > Informations Netzwerk > Online > Kurs 14402 - IBM Understanding Wireless Solutions Part 3: WWANs and Wireless Security - Online

Kurs 14402 - IBM Understanding Wireless Solutions Part 3: WWANs and Wireless Security - Online

Unverbindlich in kontakt treten Zentraler Informatikdienst

Um die Anfrage zu senden, müssen sie die Datenschutzpolitik akzeptieren

Informationen über Kurs 14402 - IBM Understanding Wireless Solutions Part 3: WWANs and Wireless Security - Online

  • Ziele
    - To identify key features of Wireless Wide Area Networks (WWANs) - To identify issues that affect selection of a Wireless Wide Area Network (WWAN) solution - To identify the elements required to build a successful Wireless Wide Area Network (WWAN) solution - To identify considerations for maintaining a secure wireless network - To identify types of security attacks to which wireless networks are vulnerable - To distinguish between authentication and privacy
  • Anforderungen
    The Understanding Wireless Solutions curriculum addresses the rapidly developing and growing marketplace of wireless networking. It is targeted at network professionals who are new to or not familiar with wireless technologies. The audience will include network designers, system engineers, administrators, application developers, and individuals needing instant skills for projects using wireless networking solutions. Basic network engineering knowledge is a pre-requisite for this course.
  • Titel
    Kurs 14402 - IBM Understanding Wireless Solutions Part 3: WWANs and Wireless Security
  • Inhalt
    Course Overview

    The third course in the curriculum focuses on the third of the three wireless networks - WWANS. It firstly covers the types of WWAN solutions available and guidelines on making a selection. It then covers the history of this technology in detail, looking at First Generation through to Third Generation Wireless. It also looks at technologies that are evolving in this area and covers the principal technologies that exist in the fixed wireless area. The second half of the course focuses on the issue of wireless security, looking at the types of security risks that exist, elements of cryptography and the principal wireless security protocols.

    Deployment Options

    Self-Study

    Accreditation

    NASBA credits: 4 CPE Credits
    CEU credits: 0.70 CEUs

    Total Learning Time

    6 to 8 hours

    Objectives

    Unit 1: WWANs 3 - 4 hours

    - Identify key features of Wireless Wide Area Networks (WWANs)
    - Identify issues that affect selection of a Wireless Wide Area Network (WWAN) solution
    - Identify the elements required to build a successful Wireless Wide Area Network (WWAN) solution
    - Match mobile device categories with their features
    - Identify features of First Generation (1G) technology
    - Identify ways in which Global System for Mobile Communications (GSM) technology contributed to the worldwide deployment of Second Generation (2G) networks
    - Identify features of Second Generation (2G) technology
    - Identify features of Web phones
    - Identify features of 2.5 Generation (2.5G) technology
    - Identify features of Third Generation (3G) technology
    - Identify benefits of roaming between wireless technologies
    - Identify benefits of location-based services (LBS)
    - Identify features of Multichannel Multipoint Distribution Service (MMDS) technology
    - Identify features of Local Multipoint Distribution Service (LMDS) technology
    - Identify features of terrestrial-based microwave wireless
    - Identify features of satellite-based microwave wireless

    Unit 2: Wireless Security 3 - 4 hours

    - Identify considerations for maintaining a secure wireless network
    - Identify types of security attacks to which wireless networks are vulnerable
    - Distinguish between authentication and privacy
    - Identify guidelines for developing a network security policy
    - Identify key features of encryption
    - Identify key features of symmetrical encryption
    - Identify key features of asymmetrical encryption
    - Identify key features of hashing technology
    - Identify responsibilities of Public Key Infrastructures (PKIs)
    - Identify features of IEEE 802.1X
    - Identify features of EAP
    - Identify features of Media Access Control (MAC) filters
    - Identify features of Wired Equivalent Privacy (WEP)
    - Identify features of AES

    Course Access

    Each student has access to the course for a period of 6 months from the day of enrollment in the course.

Ähnliche Angebote die in Bezug zu Ihrer Anfrage "Informations Netzwerk" stehen

Diese Webseite verwendet Cookies. Wenn Sie weiterhin navigieren, verstehen wir das Sie der Nutzung einverstanden sind. Vehr sehen  |