Module
Overview |
|
8.1 |
Security Fundamentals
|
|
8.2 |
Basic WLAN Security Technologies
8.2.1 |
The WLAN security wheel |
8.2.2 |
First generation wireless security |
8.2.3 |
Wired equivalent privacy (WEP) |
8.2.4 |
Authentication and association |
|
|
8.3 |
Configuring Basic WLAN Security
8.3.1 |
Basic WLAN security |
8.3.2 |
Enabling
protocol and MAC
filters on APs |
8.3.3 |
Securing clients and APs |
8.3.4 |
Monitoring WLAN equipment |
8.3.5 |
Disable unneeded services |
|
|
8.4 |
Enterprise WLAN Authentication
8.4.1 |
Second generation authentication |
8.4.2 |
Authenticating wireless users |
8.4.3 |
802.1x basics |
8.4.4 |
How 802.1x works |
8.4.5 |
802.1x authentication types |
8.4.6 |
Choosing an 802.1x type |
|
|
8.5 |
Enterprise Wireless Encryption
8.5.1 |
Strengthening WEP |
8.5.2 |
Message integrity check |
8.5.3 |
Broadcast key rotation (BKR) |
8.5.4 |
Second generation encryption |
8.5.5 |
Using VPNs |
|
|
8.6 |
Other Enterprise Security Services
|
|
Module Summary
|
|
Module
Quiz |
|