Home>Kurse - Seminare>Informations Netzwerk>Online>Innere Stadt>Kurs 14402 - IBM Understanding Wireless Solutions Part 3: WWANs and Wireless Security - Online
 

Kurs 14402 - IBM Understanding Wireless Solutions Part 3: WWANs and Wireless Security - Online

Bildungszentren: Zentraler Informatikdienst
()
Methode: Online
Bildungsart: Kurse - Seminare
Loading...

Unverbindlich in Kontakt treten
Zentraler Informatikdienst

Kurs 14402 - IBM Understanding Wireless Solutions Part 3: WWANs and Wireless Security - Online

Vorname
Nachname
Email
Telefon
Bundesland
Stadt
Um die Anfrage zu senden, müssen Sie die Datenschutzpolitik akzeptieren
* Pflichtfelder

In Kürze wird sich die zuständige Kontaktperson des Anbieters Zentraler Informatikdienst mit Ihnen in Kontakt setzen um Sie bestmöglichst zu informieren.
Bitte füllen Sie alle Felder korrekt aus
Kurs 14402 - IBM Understanding Wireless Solutions Part 3: WWANs and Wireless Security - Online Informationen über Kurs 14402 - IBM Understanding Wireless Solutions Part 3: WWANs and Wireless Security - Online
Ziele:
- To identify key features of Wireless Wide Area Networks (WWANs) - To identify issues that affect selection of a Wireless Wide Area Network (WWAN) solution - To identify the elements required to build a successful Wireless Wide Area Network (WWAN) solution - To identify considerations for maintaining a secure wireless network - To identify types of security attacks to which wireless networks are vulnerable - To distinguish between authentication and privacy
Anforderungen:
The Understanding Wireless Solutions curriculum addresses the rapidly developing and growing marketplace of wireless networking. It is targeted at network professionals who are new to or not familiar with wireless technologies. The audience will include network designers, system engineers, administrators, application developers, and individuals needing instant skills for projects using wireless networking solutions. Basic network engineering knowledge is a pre-requisite for this course.
Titel:
Kurs 14402 - IBM Understanding Wireless Solutions Part 3: WWANs and Wireless Security
Inhalt:
Course Overview

The third course in the curriculum focuses on the third of the three wireless networks - WWANS. It firstly covers the types of WWAN solutions available and guidelines on making a selection. It then covers the history of this technology in detail, looking at First Generation through to Third Generation Wireless. It also looks at technologies that are evolving in this area and covers the principal technologies that exist in the fixed wireless area. The second half of the course focuses on the issue of wireless security, looking at the types of security risks that exist, elements of cryptography and the principal wireless security protocols.

Deployment Options

Self-Study

Accreditation

NASBA credits: 4 CPE Credits
CEU credits: 0.70 CEUs

Total Learning Time

6 to 8 hours

Objectives

Unit 1: WWANs 3 - 4 hours

- Identify key features of Wireless Wide Area Networks (WWANs)
- Identify issues that affect selection of a Wireless Wide Area Network (WWAN) solution
- Identify the elements required to build a successful Wireless Wide Area Network (WWAN) solution
- Match mobile device categories with their features
- Identify features of First Generation (1G) technology
- Identify ways in which Global System for Mobile Communications (GSM) technology contributed to the worldwide deployment of Second Generation (2G) networks
- Identify features of Second Generation (2G) technology
- Identify features of Web phones
- Identify features of 2.5 Generation (2.5G) technology
- Identify features of Third Generation (3G) technology
- Identify benefits of roaming between wireless technologies
- Identify benefits of location-based services (LBS)
- Identify features of Multichannel Multipoint Distribution Service (MMDS) technology
- Identify features of Local Multipoint Distribution Service (LMDS) technology
- Identify features of terrestrial-based microwave wireless
- Identify features of satellite-based microwave wireless

Unit 2: Wireless Security 3 - 4 hours

- Identify considerations for maintaining a secure wireless network
- Identify types of security attacks to which wireless networks are vulnerable
- Distinguish between authentication and privacy
- Identify guidelines for developing a network security policy
- Identify key features of encryption
- Identify key features of symmetrical encryption
- Identify key features of asymmetrical encryption
- Identify key features of hashing technology
- Identify responsibilities of Public Key Infrastructures (PKIs)
- Identify features of IEEE 802.1X
- Identify features of EAP
- Identify features of Media Access Control (MAC) filters
- Identify features of Wired Equivalent Privacy (WEP)
- Identify features of AES

Course Access

Each student has access to the course for a period of 6 months from the day of enrollment in the course.
Ähnliche Angebote die in Bezug zu Ihrer Anfrage stehen: