Kurs 14909 - IBM Wireless LAN Security Part 1 – Specifications and Standards
Ziele- To match wireless network security definitions with their features. - To identify features of wireless technology that are beneficial to business. - To match wireless technology categories with their descriptions. - To identify reasons why security is important in a wireless network. - To match attack types with their descriptions. - To identify business risks associated with data transmission. - To identify features of electromagnetism. - To identify features of Radio Frequency (RF) bands. - To identify characteristics of the Institute of Electrical and Electronics Engineers (IEEE) 802 Working Group.
AnforderungenExperienced network professionals involved in the evaluation, design, planning, installation and management of WLAN.
TitelKurs 14909 - IBM Wireless LAN Security Part 1 – Specifications and Standards
InhaltDeployment Options
Self-Study
Objectives
Unit 1: Security Overview - 3 hours
- Match wireless network security definitions with their features.
- Identify features of wireless technology that are beneficial to business.
- Match wireless technology categories with their descriptions.
- Identify characteristics of security in business.
- Identify characteristics of the Security-Privacy-Trust concept.
- Identify features of Extensible Authentication Protocol (EAP).
- Identify features of Institute of Electrical and Electronics Engineers (IEEE) 802.1x.
- Identify characteristics of 802.1x at work with Extensible Authentication Protocol (EAP) and Remote Authentication Dial-In User Service (RADIUS).
- Identify key features of encryption.
- Identify key features of symmetrical encryption.
- Identify key features of asymmetrical encryption.
- Identify key features of hashing technology.
- Identify responsibilities of Public Key Infrastructure (PKI).
- Identify features of authentication.
- Match wireless network security definitions with their features.
- Match authentication server protocols with their descriptions.
Unit 2: Wireless Specifics - 2 hours
- Identify reasons why security is important in a wireless network.
- Match attack types with their descriptions.
- Identify business risks associated with data transmission.
- Identify issues affecting wireless security management.
- Identify techniques for protecting a Wireless Local Area Network (WLAN) from intruders.
- Identify issues related to the security of an enterprise network.
- Identify benefits of deploying a Wireless Local Area Network (WLAN).
Unit 3: Standards - 3 hours
- Identify features of electromagnetism.
- Identify features of Radio Frequency (RF) bands.
- Identify characteristics of the Institute of Electrical and Electronics Engineers (IEEE) 802 Working Group.
- Identify characteristics of physical standards.
- Identify features of the role of the Trusted Computing Platform Alliance (TCPA).
- Identify features of Common Criteria (CC) certification.
- Identify features of the IBM Embedded Security Subsystem (ESS) mobile solution.
- Identify characteristics of the Diffie-Hellman key exchange.
- Identify key characteristics of hashing algorithms.
- Identify characteristics of tunneling protocols.
- Identify steps in the process of establishing a tunnel.
- Identify features of Wired Equivalent Privacy (WEP).
- Identify characteristics of Internet Protocol Security (IPSec) in the network layer.
- Identify characteristics of the Institute of Electrical and Electronics Engineers (IEEE) 802.1x standard.
- Identify features of the Remote Authentication Dial-In User Service (RADIUS) authentication server.
- Sequence the stages involved in roaming with 802.1x.
- Identify features of the Wi-Fi Alliance.
- Identify reasons why interoperability problems may occur in a wireless environment.
Course Access
Each student has access to the course for a period of 6 months from the day of enrollment in the course.
Ähnliche angebote die in bezug zu ihrer anfrage "informations netzwerk" stehen