Home > Kurse - Seminare > Informations Netzwerk > Online > Kurs 16459 - CWNA Course 4: Wireless LAN Security - Online

Kurs 16459 - CWNA Course 4: Wireless LAN Security - Online

Unverbindlich in kontakt treten Zentraler Informatikdienst

Um die Anfrage zu senden, müssen sie die Datenschutzpolitik akzeptieren

Informationen über Kurs 16459 - CWNA Course 4: Wireless LAN Security - Online

  • Ziele
    - Identify the strengths, weaknesses, uses, and implementation of Wired Equivalent Privacy (WEP). - Identify the strengths, weaknesses, uses, and implementation of Temporal Key Integrity Protocol (TKIP). - Identify the strengths, weaknesses, uses, and implementation of the process of authentication using 802.1X/EAP. - Identify the key concepts related to some of the commonly deployed EAP authentication types. - Identify the key concepts related to Wi-Fi Protected Access (WPA) certification. - Identify the key concepts related to WPA2 certification. - Identify the strengths, weaknesses, and uses of MAC filter functionality and proprietary layer 2 encryption. - Identify the strengths, weaknesses, and uses of Wireless VPNs. - Identify the strengths, weaknesses, and uses of Application-Layer technology. - Identify the key concepts related to captive portals and profile-based firewalls. - Identify and prevent eavesdropping. - Identify and prevent encryption cracking. - Identify and prevent RF Jamming. - Identify and prevent wireless hijacking. - Identify man-in-the-middle attacks. - Identify and remove rogue access points. - Identify and prevent penetration attacks. - Learn about the features of wireless analysis systems. - Identify the elements of corporate security policy. - dentify the elements of general security policy. - Identify the elements of functional security policy.
  • Anforderungen
    This CWNA curriculum is designed for the students, who want to take and pass the CWNA certification exam (PW0-100) and any technology professional entering into or advancing in the wireless networking industry.
  • Titel
    Kurs 16459 - CWNA Course 4: Wireless LAN Security
  • Inhalt
    Course Overview

    In this course, you will learn the challenges of securing wireless networks. The course further discusses how the networks can be made secure with the application of the appropriate technology. The course also discusses corporate security policy related to wireless LANs.

    Accreditation

    CEU credits: 0.30 CEUs

    Total Learning Time

    3 hours

    Objectives

    Unit 1: 802.11 Network Security Architecture 3 hours

    - Identify the strengths, weaknesses, uses, and implementation of Wired Equivalent Privacy (WEP).
    - Identify the strengths, weaknesses, uses, and implementation of Temporal Key Integrity Protocol (TKIP).
    - Identify the strengths, weaknesses, uses, and implementation of the process of authentication using 802.1X/EAP.
    - Identify the key concepts related to some of the commonly deployed EAP authentication types.
    - Identify the key concepts related to Wi-Fi Protected Access (WPA) certification.
    - Identify the key concepts related to WPA2 certification.
    - Identify the strengths, weaknesses, and uses of MAC filter functionality and proprietary layer 2 encryption.
    - Identify the strengths, weaknesses, and uses of Wireless VPNs.
    - Identify the strengths, weaknesses, and uses of Application-Layer technology.
    - Identify the key concepts related to captive portals and profile-based firewalls.

    Unit 2: Wireless LAN Security Attacks 3 hours

    - Identify and prevent eavesdropping.
    - Identify and prevent encryption cracking.
    - Identify and prevent RF Jamming.
    - Identify and prevent wireless hijacking.
    - Identify man-in-the-middle attacks.
    - Identify and remove rogue access points.
    - Identify and prevent penetration attacks.
    - Learn about the features of wireless analysis systems.

    Unit 3: Network Security Policy Basics 3 hours

    - Identify the elements of corporate security policy.
    - Identify the elements of general security policy.
    - Identify the elements of functional security policy.

    Course Access


    Each student has access to the course for a period of 6 months from the day of enrollment in the course.

Ähnliche Angebote die in Bezug zu Ihrer Anfrage "Informations Netzwerk" stehen

Diese Webseite verwendet Cookies. Wenn Sie weiterhin navigieren, verstehen wir das Sie der Nutzung einverstanden sind. Vehr sehen  |   X