<blockquote id="ad0y4" ></blockquote>

<blockquote id="ad0y4" ><meter id="ad0y4" ></meter></blockquote>

  • <source id="ad0y4" ></source>
  • <nobr id="ad0y4" ></nobr>

        <noscript id="ad0y4" ></noscript>
        <dl id="ad0y4" ><ins id="ad0y4" ><listing id="ad0y4" ></listing></ins></dl>

        <progress id="ad0y4" ><ol id="ad0y4" ></ol></progress>
      1. <dfn id="ad0y4" ></dfn>
          <optgroup id="ad0y4" ><dfn id="ad0y4" ><span id="ad0y4" ></span></dfn></optgroup>

          RKG Logo training-ITBiz
          RKG Logo
          幸运彩票手机版官网 Courses Fees Schedule REGISTER NOW Corporate Training Locations
          Microsoft Office Tools
          Adobe Acrobat Courses
          SharePoint Training
          Microsoft Dynamics
          Social Media Courses
          Project Management
          Application Devp Tools
          Oracle Developer Tools
          Data Warehouse & BI
          Data Base & System Admin
          Programming Languages
          Reporting Tools
          Networking & Security
          Web Technologies
          Medical Records
          Business Skills
          ERP Training
          Corporate Training On-Site
          Securing Wireless Networks
          Securing Wireless Networks
          Securing Wireless Networks
          Software Version Windows XP Professionals Wireless LAN v 1.0 or higher
          Course Duration 4 Days
          Course Type Class Room and Instructor-Led On-Line (E-Learning) Hands-On Training
          Course Overview As organizations provide greater mobility to their users, the risk of threats to security grows and the need for secure wireless networks becomes of paramount concern. In this course, you gain the skills to defend against attacks and maintain security within your wireless network. You learn to detect weakness in your existing network and design and configure a cost-effective security solution. You gain extensive hands-on experience securing a wireless network. Exercises include:
          • Discovering and sniffing WLANs
          • Decoding and analyzing 802.11 frames
          • Cracking WEP and WPA2 PSK keys
          • Configuring WPA2 on APs and clients
          • Setting up 802.1X authentication
          • Installing and presenting digital certificates to RADIUS server
          • Comparing and contrasting EAP-TLS and PEAP
          • Roaming in a secure environment
          • Configuring a wireless IDS
          Intended Audience for this course The target student for this course is any person who has basic end-user skills on Windows-based computers and who wishes to use network and Internet services (such as file sharing, printing, email and other communications, and searching for information), begin training for a career in the information technology field, or prepare for certification.
          Course Topics
          Wireless Security Technologies
            Security requirements
          • Availability
          • Confidentiality
          • Data integrity
          • Authenticity
          WLAN operation and standards
          • 802.11 (Wi-Fi) standards
          • Frequency allocation and modulation techniques
          Wi-Fi access points and stations
          • Sniffing 802.11 Association and Authentication
          • Infrastructure models and roaming
          Surveying other wireless technologies
          • Bluetooth WPANs (802.15)
          • WiMAX WWANs (802.16)
          Analyzing WPA2 and 802.11i Cryptography
          • Encrypting Wi-Fi traffic for privacy
          • Symmetric vs. asymmetric algorithms
          • Block Ciphers vs. Streaming Ciphers
          • The role of key hierarchies in encryption
          Guaranteeing message integrity
          • Hashing with MD5 and SHA
          • Protecting data with digital signatures
          Authenticating users with digital certificates
          • Verifying key ownership
          • Chains of authority
          Encrypting Wi-Fi Traffic with TKIP or AES
            Overcoming problems with legacy WEP
          • Key reuse
          • Shared Keys
          Deploying TKIP as an alternative to WEP
          • Upgrading legacy hardware
          • Rolling TKIP keys per frame
          • Integrity checking with Michael
          • Migrating to AES encryption
          • Using Counter and Cipher Block Chaining modes with AES
          • AES performance issues
          Authenticating Wi-Fi Users with PSK or EAP
            Deploying pre-shared key (PSK) authentication
          • Generating master keys from a passphrase
          • Addressing scalability issues
          • Leveraging the 802.1X standard
          • Incorporating EAP messaging techniques
          • Transporting EAP messages with RADIUS and EAPOL
          Choosing EAP implementations
          • EAP-TLS
          • EAP-TTLS
          • PEAP
          Authenticating against enterprise directories
          • LDAP
          • Active Directory
          • NT Domains
          Creating Secure WLAN Topologies
            Designing the wireless security landscape
          • Defining the trusted boundary
          • Centralized vs. distributed control
          • Enforcing access controls
          • Establishing user credentials
          • Configuring security for roaming
          • Maintaining security contexts
          • 802.11i pre-authentication
          • Roaming in a VPN environment
          Evaluating network types
          • Public hot spots
          • Visitor and guest networks
          • Integrated corporate WLAN
          • Maintaining auditing and accounting systems
          • RADIUS accounting
          • Access Point logging
          Detecting and Responding to Wi-Fi Attacks
            Denial of Service (DoS) attacks
          • Jamming and RF interference
          • Exploiting the Collision Avoidance (CA) mechanism
          • Forcing 802.11 de-authentication
          Authentication and privacy attacks
          • WEP key cracking
          • Brute force attacks against WPA PSK

          Enroll Online   

          Live Chat
          Enroll Online
          Enroll By Fax
          Fee & Schedule
          Send Message
          Follow us on .....
          For further information call 949-387-3772 or FAX 949-681-8247 or email to info@
          SONU Training is the training wing of RKG Technologies Inc
          Disclaimer: RKG Technologies is not linked with Microsoft, Oracle, Adobe, IBM or any other software company we provide training
          幸运彩票手机版官网 © 2004 RKG Technologies Inc. All rights reserved.