Cisco Systems

 

Modules:  1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  12  |  A1  |  All  |

Module 8: Security

Module Overview
8.1 Security Fundamentals
 
8.1.1 What is security?
8.1.2 WLAN vulnerabilities
8.1.3 WLAN threats
8.1.4 Reconnaissance
8.1.5 Access
8.1.6 Denial of service
8.2 Basic WLAN Security Technologies
8.2.1 The WLAN security wheel
8.2.2 First generation wireless security
8.2.3 Wired equivalent privacy (WEP)
8.2.4 Authentication and association
8.3 Configuring Basic WLAN Security
 
8.3.1 Basic WLAN security
8.3.2 Enabling protocol and MAC filters on APs
8.3.3 Securing clients and APs
8.3.4 Monitoring WLAN equipment
8.3.5 Disable unneeded services
8.4 Enterprise WLAN Authentication
 
8.4.1 Second generation authentication
8.4.2 Authenticating wireless users
8.4.3 802.1x basics
8.4.4 How 802.1x works
8.4.5 802.1x authentication types
8.4.6 Choosing an 802.1x type
8.5 Enterprise Wireless Encryption
 
8.5.1 Strengthening WEP
8.5.2 Message integrity check
8.5.3 Broadcast key rotation (BKR)
8.5.4 Second generation encryption
8.5.5 Using VPNs
8.6 Other Enterprise Security Services
 
8.6.1 VLANs
8.6.2 Spanning tree
Module Summary

Module Quiz

Close Window
All contents copyright © 2002 Cisco Systems, Inc. All rights reserved.