Kurs 14907 - IBM Implementing Wireless LANs Part 3 - Security - Online

Unverbindlich in kontakt treten Zentraler Informatikdienst

Um die Anfrage zu senden, müssen sie die Datenschutzpolitik akzeptieren

Informationen über Kurs 14907 - IBM Implementing Wireless LANs Part 3 - Security - Online

  • Ziele
    - To identify characteristics of Wired Equivalent Privacy (WEP). - To sequence the steps in the Wired Equivalent Privacy (WEP) encryption process. - To sequence the steps in the 802.11 Open Authentication process. - To identify features of the Institute of Electrical and Electronics Engineers (IEEE) 802.1x standard. - To identify Extensible Authentication Protocol (EAP) roles. - To sequence the steps in the Extensible Authentication Protocol (EAP) authentication process using a Remote Authentication Dial-in User Server (RADIUS).
  • Anforderungen
    Experienced networking professionals, especially network administrators and engineers, who evaluate, design, plan, install, and manage wired or wireless LANs (WLANs). This course is primarily designed for network administrators and engineers who have practical networking experience in all phases of design, installation, maintenance, and troubleshooting of wired networks.
  • Titel
    Kurs 14907 - IBM Implementing Wireless LANs Part 3 - Security
  • Inhalt
    Deployment Options

    Self-Study

    Objectives

    Unit 1: WLAN WEP Security - 4 hours
     
    - Identify characteristics of Wired Equivalent Privacy (WEP).
    - Sequence the steps in the Wired Equivalent Privacy (WEP) encryption process.
    - Sequence the steps in the 802.11 Open Authentication process.
    - Sequence the steps in the Shared Key Authentication process.
    - Identify limitations and issues associated with Wired Equivalent Privacy (WEP).
    - Identify vulnerabilities of Wired Equivalent Privacy (WEP) encryption keys.
    - Identify alternative solutions to Wired Equivalent Privacy (WEP) for wireless LAN (WLAN) security.
    - Identify Cisco Aironet access point (AP) security settings.
    - Add a user account in the Cisco access point (AP) User Manager.
    - Identify options for enabling access point (AP) console security for administrator access.
    - Identify the reason for disabling Service Set Identifier (SSID) broadcast.
    - Configure access point (AP) Wired Equivalent Privacy (WEP) encryption.
    - Configure client adapter Wired Equivalent Privacy (WEP) keys.
    - Identify characteristics of Wired Equivalent Privacy (WEP) key hashing.
    - Identify characteristics of the Wired Equivalent Privacy (WEP) Message Integrity Check (MIC).

    Unit 2: WLAN EAP Security - 4 hours

    - Identify features of the Institute of Electrical and Electronics Engineers (IEEE) 802.1x standard.
    - Identify Extensible Authentication Protocol (EAP) roles.
    - Sequence the steps in the Extensible Authentication Protocol (EAP) authentication process using a Remote Authentication Dial-in User Server (RADIUS).
    - Identify characteristics of Wired Equivalent Privacy (WEP) session keys.
    - Identify characteristics of the Lightweight Extensible Authentication Protocol (LEAP).
    - Identify items that can be configured on the Server Manager page when configuring an AP to use the Lightweight Extensible Authentication Protocol (LEAP).
    - Identify items that can be configured on the Lightweight Extensible Authentication Protocol (LEAP) Settings page when configuring LEAP on a client.
    - Identify the steps to configure a non-root access point (AP) for Lightweight Extensible Authentication Protocol (LEAP) authentication.
    - Identify features of Cisco Secure Access Control Server (ACS).
    - Configure a Cisco Access Control Server (ACS) to work with Cisco Aironet access points (APs) as a Network Access Server (NAS).
    -  Add a user account to a Cisco Access Control Server (ACS).
    - Identify considerations for setting the session timeout value during configuration of a group session policy.
    - Configure a Cisco Access Control Server (ACS) for Media Access Control (MAC) address authentication.
    - Configure an Access Control Server (ACS) to use a Windows NT or Windows 2000 external user database.
    - Set Windows 2000 dial-in permission.

    Course Access

    Each student has access to the course for a period of 6 months from the day of enrollment in the course.

Ähnliche angebote die in bezug zu ihrer anfrage "informations netzwerk" stehen

Diese webseite verwendet cookies.
Wenn sie weiterhin auf der webseite navigieren stimmen sie der nutzung dieser zu.
Vehr sehen  |