This instructor led, online training course will teach students how to identify the risks that wireless networks present and how to mitigate those risks.
Overview
COURSE DIFFICULTY
COURSE DURATION
2h
Skills Learned
After completing this online training course, students will be able to:
Designing of your security
Effective security mechanisms
Properly setting up your device to securely connect to your wireless network
Network Administrators, IT Security professionals, and IT Directors
None, but we recommend that students have basic networking, configuring, and security knowledge.
01.
- Distinguish the various attacks types that target wireless LANs, Bluetooth, mobile devices, and Internet of Things (IoT) devices
- Fundamentals of Wireless Security
- Anatomy of a Secure Connection
- This breaks down why a wireless connection is inherently less secure than a wired connection
- Also identifies where and how we can bolster security to create as secure of a connection as possible Security through design
- Establishes the importance of establishing appropriate access policies and incorporating security into our design instead of adding it after the fact
- Weak Security Mechanisms
- Weaker security mechanisms are easier to configure, but that comes at a cost.
- Effective Security Mechanisms
- Contrasts why these mechanisms are more secure than other solutions
SKILLS LEARNED
Skills Learned
After completing this online training course, students will be able to:
Designing of your security
Effective security mechanisms
Properly setting up your device to securely connect to your wireless network
WHO SHOULD ATTEND
Network Administrators, IT Security professionals, and IT Directors
PREREQUISITES
None, but we recommend that students have basic networking, configuring, and security knowledge.
COURSE OUTLINE
01.
- Distinguish the various attacks types that target wireless LANs, Bluetooth, mobile devices, and Internet of Things (IoT) devices
- Fundamentals of Wireless Security
- Anatomy of a Secure Connection
- This breaks down why a wireless connection is inherently less secure than a wired connection
- Also identifies where and how we can bolster security to create as secure of a connection as possible Security through design
- Establishes the importance of establishing appropriate access policies and incorporating security into our design instead of adding it after the fact
- Weak Security Mechanisms
- Weaker security mechanisms are easier to configure, but that comes at a cost.
- Effective Security Mechanisms
- Contrasts why these mechanisms are more secure than other solutions