Unverbindlich in kontakt treten
Zentraler Informatikdienst
¡Bien! Tu solicitud ha sido enviada correctamente
Möchten Sie Informationen über diese verwandten Kurse erhalten?
Nur noch eine sache ...
Einige Zentren fragen uns nach diesen Informationen. Bitte füllen Sie diese aus
Informationen über Kurs 14909 - IBM Wireless LAN Security Part 1 – Specifications and Standards - Online
Ziele
- To match wireless network security definitions with their features. - To identify features of wireless technology that are beneficial to business. - To match wireless technology categories with their descriptions. - To identify reasons why security is important in a wireless network. - To match attack types with their descriptions. - To identify business risks associated with data transmission. - To identify features of electromagnetism. - To identify features of Radio Frequency (RF) bands. - To identify characteristics of the Institute of Electrical and Electronics Engineers (IEEE) 802 Working Group.
Anforderungen
Experienced network professionals involved in the evaluation, design, planning, installation and management of WLAN.
Titel
Kurs 14909 - IBM Wireless LAN Security Part 1 – Specifications and Standards
Inhalt
Deployment Options
Self-Study
Objectives
Unit 1: Security Overview - 3 hours
- Match wireless network security definitions with their features.
- Identify features of wireless technology that are beneficial to business.
- Match wireless technology categories with their descriptions.
- Identify characteristics of security in business.
- Identify characteristics of the Security-Privacy-Trust concept.
- Identify features of Extensible Authentication Protocol (EAP).
- Identify features of Institute of Electrical and Electronics Engineers (IEEE) 802.1x.
- Identify characteristics of 802.1x at work with Extensible Authentication Protocol (EAP) and Remote Authentication Dial-In User Service (RADIUS).
- Identify key features of encryption.
- Identify key features of symmetrical encryption.
- Identify key features of asymmetrical encryption.
- Identify key features of hashing technology.
- Identify responsibilities of Public Key Infrastructure (PKI).
- Identify features of authentication.
- Match wireless network security definitions with their features.
- Match authentication server protocols with their descriptions.
Unit 2: Wireless Specifics - 2 hours
- Identify reasons why security is important in a wireless network.
- Match attack types with their descriptions.
- Identify business risks associated with data transmission.
- Identify issues affecting wireless security management.
- Identify techniques for protecting a Wireless Local Area Network (WLAN) from intruders.
- Identify issues related to the security of an enterprise network.
- Identify benefits of deploying a Wireless Local Area Network (WLAN).
Unit 3: Standards - 3 hours
- Identify features of electromagnetism.
- Identify features of Radio Frequency (RF) bands.
- Identify characteristics of the Institute of Electrical and Electronics Engineers (IEEE) 802 Working Group.
- Identify characteristics of physical standards.
- Identify features of the role of the Trusted Computing Platform Alliance (TCPA).
- Identify features of Common Criteria (CC) certification.
- Identify features of the IBM Embedded Security Subsystem (ESS) mobile solution.
- Identify characteristics of the Diffie-Hellman key exchange.
- Identify key characteristics of hashing algorithms.
- Identify characteristics of tunneling protocols.
- Identify steps in the process of establishing a tunnel.
- Identify features of Wired Equivalent Privacy (WEP).
- Identify characteristics of Internet Protocol Security (IPSec) in the network layer.
- Identify characteristics of the Institute of Electrical and Electronics Engineers (IEEE) 802.1x standard.
- Identify features of the Remote Authentication Dial-In User Service (RADIUS) authentication server.
- Sequence the stages involved in roaming with 802.1x.
- Identify features of the Wi-Fi Alliance.
- Identify reasons why interoperability problems may occur in a wireless environment.
Course Access
Each student has access to the course for a period of 6 months from the day of enrollment in the course.
Ähnliche angebote die in bezug zu ihrer anfrage "informations netzwerk" stehen