NAC for wired and wireless
About The Course
This training will help the participant will get to know why just maintaining a strong wireless encryption forms only a small part in securing their wired or wireless networks. NAC solutions go a step further and can protect an organization against threats such as rogue access points, DoS attacks etc. Participants will get to know how an effective defense involves strong correlation between wired and wireless networks, which requires tight integration between WLAN management and intrusion detection systems.
NAC for wired and wireless)
Many network managers assume a strong wireless encryption is sufficient for building strong security for wireless LAN (WLAN) traffic. They are only partially correct. WPA2 encryption might offer better authentication and encryption options, but WLANs can still have vulnerabilities like:
- Rogue access points (APs);
- Denial-of-service attacks; and
- Attacks against WLAN infrastructure.
This can lead to sensitive data leakage from the organization.
An effective defense involves strong correlation between wired and wireless networks, which requires tight integration between WLAN management and intrusion detection systems. Thus, there exists a need for a comprehensive WLAN enterprise security solution to protect valuable corporate data and intellectual property from getting compromised.
Who should attend this training?
- Network Administrators
- Security Administrators
- Incident Management Team
- IT Managers
- Chief Information Officer (CIO)
- Senior Management
Why should you attend?
Enterprise WLAN Solutions provide the following benefits:
- Business continuity: Delivers the right business tools to employees on roaming.
- Advanced connectivity options: Offers wired, wireless, secure enterprise mesh, remote AP, indoors, and outdoors options
- Identity-based security: We can enforce unified security policy for all connected users
- Application-awareness: This enables us to provide optimized service delivery
- Reliability: Enables us to confidently use wireless as the primary network connection across the enterprise
Good to have fundamental knowledge of Wireless Technology to grasp the security concepts more quickly.
Table of Contents
Module 1: Introduction to Wireless LAN Security
Module 2: What is Wireless LAN Security?
Module 3: Need for WLAN security solution
Module 4: Various types of WLAN security solutions
Module 5: Selection criteria for WLAN security solution
Module 6: Implementation strategy for WLAN
Module 7: WLAN Security Technologies
Module 8: Key Features of WLAN Security
Module 9: OS & Versions Supported
Module 10: Persistent & Dissolvable Agent
Module 11: Posture Architecture & Flow
Module 12: Configuring Posture
Module 13: Adding and Modifying Policies
- Registry Keys
- Disk Encryption
- Peer to Peer
- Patch Management
- Windows Hotfixes
- USB Devices
- Virtual Machines
- Network Connections