Home :: Software :: Business & Office :: Training & Tutorials  

Business Accounting
Communication
Database
Document Management
e-Commerce
Networking
Office Suites
Personal Finance
Presentation
Project Management
Reports & Forms
Schedule & Contact Management
Spreadsheet
Tax Preparation
Training & Tutorials

Word Processing
IBM Implementing Wireless LANs Curriculum CBT Training CDs

IBM Implementing Wireless LANs Curriculum CBT Training CDs

List Price:
Your Price:
Product Info Reviews

<< 1 >>

Rating: 5 stars
Summary: IBM Implementing Wireless LANs Curriculum
Review: Course Overview
This curriculum gives an overview of the basic concepts of security. It covers authentication, encryption and the importance of security. It also covers network design, risk assessment and mitigation. This curriculum consists of two courses: 14909 - IBM Wireless LAN Security Part 1 - Specifications and Standards 14910 - IBM Wireless LAN Security Part 2 - Deployment and Auditing

Learn To
See individual course descriptions for specific course objectives and scope.

Audience
Experienced network professionals involved in the evaluation, design, planning, installation and management of WLAN.

Deployment Options
e-Learning

Accreditation
NASBA credits: 4 CPE Credits Per Course
CEU credits: 0.70 CEUs

Language Options
US English

Total Learning Time
12 to 16 hours

Objectives
Unit 12 - 16 hours


IBM Wireless LAN Security Part 1 - Specifications and Standards
Course Overview
This course begins by giving an overview on of the basic concepts of security. It then covers authentication and encryption. It also covers the importance of security and how to secure the enterprise network. Finally, it covers wireless LAN Standards and security specification standards.

Learn To
# To match wireless network security definitions with their features.
# To identify features of wireless technology that are beneficial to business.
# To match wireless technology categories with their descriptions.
# To identify reasons why security is important in a wireless network.
# To match attack types with their descriptions.
# To identify business risks associated with data transmission.
# To identify features of electromagnetism.
# To identify features of Radio Frequency (RF) bands.
# To identify characteristics of the Institute of Electrical and Electronics Engineers (IEEE) 802 Working Group.


Audience
Experienced network professionals involved in the evaluation, design, planning, installation and management of WLAN.

Deployment Options
e-Learning

Accreditation
NASBA credits: 4 CPE Credits
CEU credits: 0.70 CEUs

Language Options
US English

Total Learning Time
6 to 8 hours

Objectives
Unit 1: Security Overview 2 - 3 hours
# Match wireless network security definitions with their features.
# Identify features of wireless technology that are beneficial to business.
# Match wireless technology categories with their descriptions.
# Identify characteristics of security in business.
# Identify characteristics of the Security-Privacy-Trust concept.
# Identify features of Extensible Authentication Protocol (EAP).
# Identify features of Institute of Electrical and Electronics Engineers (IEEE) 802.1x.
# Identify characteristics of 802.1x at work with Extensible Authentication Protocol (EAP) and Remote Authentication Dial-In User Service (RADIUS).
# Identify key features of encryption.
# Identify key features of symmetrical encryption.
# Identify key features of asymmetrical encryption.
# Identify key features of hashing technology.
# Identify responsibilities of Public Key Infrastructure (PKI).
# Identify features of authentication.
# Match wireless network security definitions with their features.
# Match authentication server protocols with their descriptions.


Unit 2: Wireless Specifics 2 hours
# Identify reasons why security is important in a wireless network.
# Match attack types with their descriptions.
# Identify business risks associated with data transmission.
# Identify issues affecting wireless security management.
# Identify techniques for protecting a Wireless Local Area Network (WLAN) from intruders.
# Identify issues related to the security of an enterprise network.
# Identify benefits of deploying a Wireless Local Area Network (WLAN).


Unit 3: Standards 2 - 3 hours
# Identify features of electromagnetism.
# Identify features of Radio Frequency (RF) bands.
# Identify characteristics of the Institute of Electrical and Electronics Engineers (IEEE) 802 Working Group.
# Identify characteristics of physical standards.
# Identify features of the role of the Trusted Computing Platform Alliance (TCPA).
# Identify features of Common Criteria (CC) certification.
# Identify features of the IBM Embedded Security Subsystem (ESS) mobile solution.
# Identify characteristics of the Diffie-Hellman key exchange.
# Identify key characteristics of hashing algorithms.
# Identify characteristics of tunneling protocols.
# Identify steps in the process of establishing a tunnel.
# Identify features of Wired Equivalent Privacy (WEP).
# Identify characteristics of Internet Protocol Security (IPSec) in the network layer.
# Identify characteristics of the Institute of Electrical and Electronics Engineers (IEEE) 802.1x standard.
# Identify features of the Remote Authentication Dial-In User Service (RADIUS) authentication server.
# Sequence the stages involved in roaming with 802.1x.
# Identify features of the Wi-Fi Alliance.
# Identify reasons why interoperability problems may occur in a wireless environment.

IBM Wireless LAN Security Part 2 - Deployment and Auditing
Course Overview
This course begins by covering security and network design in particular vulnerabilities and threats. It also covers risk assessment and mitigation. Finally it covers auditing and testing network security.

Learn To
# To match the phases in the Wireless Local Area Network (WLAN) design with their features.
# To identify considerations for the planning phase of a Wireless Local Area Network (WLAN) solution.
# To identify features and functions of a Wireless Local Area Network (WLAN) preliminary design.
# To identify characteristics of the ISO 17799 standards.
# To identify guidelines for developing a business continuity plan.
# To identify characteristics of physical security.


Audience
Experienced network professionals involved in the evaluation, design, planning, installation and management of WLAN.

Deployment Options
e-Learning

Accreditation
NASBA credits: 4 CPE Credits
CEU credits: 0.70 CEUs

Language Options
US English

Total Learning Time
6 to 8 hours

Objectives
Unit 1: Network Design and Security Deployment 3 - 4 hours
# Identify project management guidelines for implementing a successful wireless solution.
# Identify advantages and disadvantages of wireless technology.
# Identify features of ad-hoc and infrastructure modes of operation for Institute of Electrical and Electronics Engineers (IEEE) 802.11.
# Identify considerations for choosing Wireless Local Area Network (WLAN) security framework elements.
# Match wireless network patterns with their market segments.
# Identify Wireless Local Area Network (WLAN) security objectives.
# Identify characteristics of credentials.
# Match Wireless Local Area Network (WLAN) protection categories with their descriptions.
# Identify characteristics of a risk assessment.
# Identify features and functions of a security deployment plan.
# Match the phases in the Wireless Local Area Network (WLAN) design with their features.
# Identify considerations for the planning phase of a Wireless Local Area Network (WLAN) solution.
# Identify features and functions of a Wireless Local Area Network (WLAN) preliminary design.
# Identify features and functions of a Wireless Local Area Network (WLAN) site survey.
# Identify types of equipment that are useful when performing a Wireless Local Area Network (WLAN) site survey.
# Identify vulnerabilities of Wireless Local Area Networks (WLANs).
# Match vulnerabilities of Wireless Local Area Networks (WLANs) with their specific threats.


Unit 2: Ongoing Management and Auditing 3 - 4 hours
# Identify characteristics of the ISO 17799 standards.
# Identify guidelines for developing a business continuity plan.
# Identify characteristics of physical security.
# Identify guidelines for auditing a Wireless Local Area Network (WLAN).
# Identify characteristics of the IBM Wireless Security Auditor (WSA).
# Identify features of network analysis.
# Identify characteristics of penetration testing.
# Identify features of automated audit programs.


<< 1 >>

© 2004, ReviewFocus or its affiliates