|
This course explains how to secure wireless network traffic including the technologies available and the challenges they present. This course also discusses common vulnerabilities in a wireless network and how to design a secure wireless LAN.
Objectives:
- Design security for data transmission
- Use segmented networks
- Design security for wireless networks
- Design public and private wireless LANs
- Design 802.11x authentication for wireless networks
- Design user authentication for Internet Information Services (IIS)
Topics:
- SSL/TLS,SMIME and SMB
- Configuring IIS to use SSL
- Securing switches and segments
- Wireless network types and threats
- Wireless history
- PKI and RADIUS/IAS overview
- WLAN network infrastructure
- Creating a wireless network policy
- Designing authentication for wireless networks
- Designing and testing wireless access infrastructure
|
P500+ Processor, 128MB of RAM; Windows 2000, 2003, XP, Minimum screen resolution 800x600, Internet Explorer 5.5 or higher; Windows Media Player 9.0 or higher; Flash 8.0 or higher; 56K minimum connection; broadband (256 kpbs or higher) connection recommended; Javascript, DHTML and cookies enabled; Sound card with speakers or headphones strongly recommended.
|
Product names mentioned in this catalog may be trademarks/servicemarks or registered trademarks/servicemarks of their respective companies and are hereby acknowledged. All product names that are known to be trademarks or service marks have been appropriately capitalized. Use of a name in this catalog is for identification purposes only, and should not be regarded as affecting the validity of any trademark or service mark, or as suggesting any affiliation between MindLeaders.com, Inc. and the trademark/servicemark proprietor.
Terms of Use:
|
Copyright � 2006 Webteks. All rights reserved.
|
|
|