Home>Kurse - Seminare>Informations Netzwerk>Online>Innere Stadt>Kurs 14909 - IBM Wireless LAN Security Part 1 – Specifications and Standards - Online
 

Kurs 14909 - IBM Wireless LAN Security Part 1 – Specifications and Standards - Online

Bildungszentren: Zentraler Informatikdienst
()
Methode: Online
Bildungsart: Kurse - Seminare
Loading...

Unverbindlich in Kontakt treten
Zentraler Informatikdienst

Kurs 14909 - IBM Wireless LAN Security Part 1 – Specifications and Standards - Online

Vorname
Nachname
Email
Telefon
Bundesland
Stadt
Um die Anfrage zu senden, müssen Sie die Datenschutzpolitik akzeptieren
* Pflichtfelder

In Kürze wird sich die zuständige Kontaktperson des Anbieters Zentraler Informatikdienst mit Ihnen in Kontakt setzen um Sie bestmöglichst zu informieren.
Bitte füllen Sie alle Felder korrekt aus
Kurs 14909 - IBM Wireless LAN Security Part 1 – Specifications and Standards - Online Informationen über Kurs 14909 - IBM Wireless LAN Security Part 1 – Specifications and Standards - Online
Ziele:
- To match wireless network security definitions with their features. - To identify features of wireless technology that are beneficial to business. - To match wireless technology categories with their descriptions. - To identify reasons why security is important in a wireless network. - To match attack types with their descriptions. - To identify business risks associated with data transmission. - To identify features of electromagnetism. - To identify features of Radio Frequency (RF) bands. - To identify characteristics of the Institute of Electrical and Electronics Engineers (IEEE) 802 Working Group.
Anforderungen:
Experienced network professionals involved in the evaluation, design, planning, installation and management of WLAN.
Titel:
Kurs 14909 - IBM Wireless LAN Security Part 1 – Specifications and Standards
Inhalt:
Deployment Options

Self-Study

Objectives

Unit 1: Security Overview - 3 hours

- Match wireless network security definitions with their features.
- Identify features of wireless technology that are beneficial to business.
- Match wireless technology categories with their descriptions.
- Identify characteristics of security in business.
- Identify characteristics of the Security-Privacy-Trust concept.
- Identify features of Extensible Authentication Protocol (EAP).
- Identify features of Institute of Electrical and Electronics Engineers (IEEE) 802.1x.
- Identify characteristics of 802.1x at work with Extensible Authentication Protocol (EAP) and Remote Authentication Dial-In User Service (RADIUS).
- Identify key features of encryption.
- Identify key features of symmetrical encryption.
- Identify key features of asymmetrical encryption.
- Identify key features of hashing technology.
- Identify responsibilities of Public Key Infrastructure (PKI).
- Identify features of authentication.
- Match wireless network security definitions with their features.
- Match authentication server protocols with their descriptions.

Unit 2: Wireless Specifics - 2 hours

- Identify reasons why security is important in a wireless network.
- Match attack types with their descriptions.
- Identify business risks associated with data transmission.
- Identify issues affecting wireless security management.
- Identify techniques for protecting a Wireless Local Area Network (WLAN) from intruders.
- Identify issues related to the security of an enterprise network.
- Identify benefits of deploying a Wireless Local Area Network (WLAN).

Unit 3: Standards - 3 hours

- Identify features of electromagnetism.
- Identify features of Radio Frequency (RF) bands.
- Identify characteristics of the Institute of Electrical and Electronics Engineers (IEEE) 802 Working Group.
- Identify characteristics of physical standards.
- Identify features of the role of the Trusted Computing Platform Alliance (TCPA).
- Identify features of Common Criteria (CC) certification.
- Identify features of the IBM Embedded Security Subsystem (ESS) mobile solution.
- Identify characteristics of the Diffie-Hellman key exchange.
- Identify key characteristics of hashing algorithms.
- Identify characteristics of tunneling protocols.
- Identify steps in the process of establishing a tunnel.
- Identify features of Wired Equivalent Privacy (WEP).
- Identify characteristics of Internet Protocol Security (IPSec) in the network layer.
- Identify characteristics of the Institute of Electrical and Electronics Engineers (IEEE) 802.1x standard.
- Identify features of the Remote Authentication Dial-In User Service (RADIUS) authentication server.
- Sequence the stages involved in roaming with 802.1x.
- Identify features of the Wi-Fi Alliance.
- Identify reasons why interoperability problems may occur in a wireless environment.

Course Access

Each student has access to the course for a period of 6 months from the day of enrollment in the course.
Ähnliche Angebote die in Bezug zu Ihrer Anfrage stehen: