-
Ziele
- Identify the strengths, weaknesses, uses, and implementation of Wired Equivalent Privacy (WEP). - Identify the strengths, weaknesses, uses, and implementation of Temporal Key Integrity Protocol (TKIP). - Identify the strengths, weaknesses, uses, and implementation of the process of authentication using 802.1X/EAP. - Identify the key concepts related to some of the commonly deployed EAP authentication types. - Identify the key concepts related to Wi-Fi Protected Access (WPA) certification. - Identify the key concepts related to WPA2 certification. - Identify the strengths, weaknesses, and uses of MAC filter functionality and proprietary layer 2 encryption. - Identify the strengths, weaknesses, and uses of Wireless VPNs. - Identify the strengths, weaknesses, and uses of Application-Layer technology. - Identify the key concepts related to captive portals and profile-based firewalls. - Identify and prevent eavesdropping. - Identify and prevent encryption cracking. - Identify and prevent RF Jamming. - Identify and prevent wireless hijacking. - Identify man-in-the-middle attacks. - Identify and remove rogue access points. - Identify and prevent penetration attacks. - Learn about the features of wireless analysis systems. - Identify the elements of corporate security policy. - dentify the elements of general security policy. - Identify the elements of functional security policy.
-
Anforderungen
This CWNA curriculum is designed for the students, who want to take and pass the CWNA certification exam (PW0-100) and any technology professional entering into or advancing in the wireless networking industry.
-
Titel
Kurs 16459 - CWNA Course 4: Wireless LAN Security
-
Inhalt
Course Overview
In this course, you will learn the challenges of securing wireless networks. The course further discusses how the networks can be made secure with the application of the appropriate technology. The course also discusses corporate security policy related to wireless LANs.
Accreditation
CEU credits: 0.30 CEUs
Total Learning Time
3 hours
Objectives
Unit 1: 802.11 Network Security Architecture 3 hours
- Identify the strengths, weaknesses, uses, and implementation of Wired Equivalent Privacy (WEP).
- Identify the strengths, weaknesses, uses, and implementation of Temporal Key Integrity Protocol (TKIP).
- Identify the strengths, weaknesses, uses, and implementation of the process of authentication using 802.1X/EAP.
- Identify the key concepts related to some of the commonly deployed EAP authentication types.
- Identify the key concepts related to Wi-Fi Protected Access (WPA) certification.
- Identify the key concepts related to WPA2 certification.
- Identify the strengths, weaknesses, and uses of MAC filter functionality and proprietary layer 2 encryption.
- Identify the strengths, weaknesses, and uses of Wireless VPNs.
- Identify the strengths, weaknesses, and uses of Application-Layer technology.
- Identify the key concepts related to captive portals and profile-based firewalls.
Unit 2: Wireless LAN Security Attacks 3 hours
- Identify and prevent eavesdropping.
- Identify and prevent encryption cracking.
- Identify and prevent RF Jamming.
- Identify and prevent wireless hijacking.
- Identify man-in-the-middle attacks.
- Identify and remove rogue access points.
- Identify and prevent penetration attacks.
- Learn about the features of wireless analysis systems.
Unit 3: Network Security Policy Basics 3 hours
- Identify the elements of corporate security policy.
- Identify the elements of general security policy.
- Identify the elements of functional security policy.
Course Access
Each student has access to the course for a period of 6 months from the day of enrollment in the course.