Kurs 14909 - IBM Wireless LAN Security Part 1 – Specifications and Standards - Online

Unverbindlich in kontakt treten Zentraler Informatikdienst

Um die Anfrage zu senden, müssen sie die Datenschutzpolitik akzeptieren

Informationen über Kurs 14909 - IBM Wireless LAN Security Part 1 – Specifications and Standards - Online

  • Ziele
    - To match wireless network security definitions with their features. - To identify features of wireless technology that are beneficial to business. - To match wireless technology categories with their descriptions. - To identify reasons why security is important in a wireless network. - To match attack types with their descriptions. - To identify business risks associated with data transmission. - To identify features of electromagnetism. - To identify features of Radio Frequency (RF) bands. - To identify characteristics of the Institute of Electrical and Electronics Engineers (IEEE) 802 Working Group.
  • Anforderungen
    Experienced network professionals involved in the evaluation, design, planning, installation and management of WLAN.
  • Titel
    Kurs 14909 - IBM Wireless LAN Security Part 1 – Specifications and Standards
  • Inhalt
    Deployment Options

    Self-Study

    Objectives

    Unit 1: Security Overview - 3 hours

    - Match wireless network security definitions with their features.
    - Identify features of wireless technology that are beneficial to business.
    - Match wireless technology categories with their descriptions.
    - Identify characteristics of security in business.
    - Identify characteristics of the Security-Privacy-Trust concept.
    - Identify features of Extensible Authentication Protocol (EAP).
    - Identify features of Institute of Electrical and Electronics Engineers (IEEE) 802.1x.
    - Identify characteristics of 802.1x at work with Extensible Authentication Protocol (EAP) and Remote Authentication Dial-In User Service (RADIUS).
    - Identify key features of encryption.
    - Identify key features of symmetrical encryption.
    - Identify key features of asymmetrical encryption.
    - Identify key features of hashing technology.
    - Identify responsibilities of Public Key Infrastructure (PKI).
    - Identify features of authentication.
    - Match wireless network security definitions with their features.
    - Match authentication server protocols with their descriptions.

    Unit 2: Wireless Specifics - 2 hours

    - Identify reasons why security is important in a wireless network.
    - Match attack types with their descriptions.
    - Identify business risks associated with data transmission.
    - Identify issues affecting wireless security management.
    - Identify techniques for protecting a Wireless Local Area Network (WLAN) from intruders.
    - Identify issues related to the security of an enterprise network.
    - Identify benefits of deploying a Wireless Local Area Network (WLAN).

    Unit 3: Standards - 3 hours

    - Identify features of electromagnetism.
    - Identify features of Radio Frequency (RF) bands.
    - Identify characteristics of the Institute of Electrical and Electronics Engineers (IEEE) 802 Working Group.
    - Identify characteristics of physical standards.
    - Identify features of the role of the Trusted Computing Platform Alliance (TCPA).
    - Identify features of Common Criteria (CC) certification.
    - Identify features of the IBM Embedded Security Subsystem (ESS) mobile solution.
    - Identify characteristics of the Diffie-Hellman key exchange.
    - Identify key characteristics of hashing algorithms.
    - Identify characteristics of tunneling protocols.
    - Identify steps in the process of establishing a tunnel.
    - Identify features of Wired Equivalent Privacy (WEP).
    - Identify characteristics of Internet Protocol Security (IPSec) in the network layer.
    - Identify characteristics of the Institute of Electrical and Electronics Engineers (IEEE) 802.1x standard.
    - Identify features of the Remote Authentication Dial-In User Service (RADIUS) authentication server.
    - Sequence the stages involved in roaming with 802.1x.
    - Identify features of the Wi-Fi Alliance.
    - Identify reasons why interoperability problems may occur in a wireless environment.

    Course Access

    Each student has access to the course for a period of 6 months from the day of enrollment in the course.

Ähnliche angebote die in bezug zu ihrer anfrage "informations netzwerk" stehen

Diese webseite verwendet cookies.
Wenn sie weiterhin auf der webseite navigieren stimmen sie der nutzung dieser zu.
Vehr sehen  |