NAC for wired and wireless

Network Security

About The Course

This training will help the participant will get to know why just maintaining a strong wireless encryption forms only a small part in securing their wired or wireless networks. NAC solutions go a step further and can protect an organization against threats such as rogue access points, DoS attacks etc. Participants will get to know how an effective defense involves strong correlation between wired and wireless networks, which requires tight integration between WLAN management and intrusion detection systems.

NAC for wired and wireless)

Many network managers assume a strong wireless encryption is sufficient for building strong security for wireless LAN (WLAN) traffic. They are only partially correct. WPA2 encryption might offer better authentication and encryption options, but WLANs can still have vulnerabilities like:

  • Rogue access points (APs);
  • Denial-of-service attacks; and
  • Attacks against WLAN infrastructure.

This can lead to sensitive data leakage from the organization.

An effective defense involves strong correlation between wired and wireless networks, which requires tight integration between WLAN management and intrusion detection systems. Thus, there exists a need for a comprehensive WLAN enterprise security solution to protect valuable corporate data and intellectual property from getting compromised.

Who should attend this training?

  • Network Administrators
  • Security Administrators
  • Incident Management Team
  • IT Managers
  • Chief Information Officer (CIO)
  • Senior Management

Why should you attend?

Enterprise WLAN Solutions provide the following benefits:

  • Business continuity: Delivers the right business tools to employees on roaming.
  • Advanced connectivity options: Offers wired, wireless, secure enterprise mesh, remote AP, indoors, and outdoors options
  • Identity-based security: We can enforce unified security policy for all connected users
  • Application-awareness: This enables us to provide optimized service delivery
  • Reliability: Enables us to confidently use wireless as the primary network connection across the enterprise

Prerequisites

Good to have fundamental knowledge of Wireless Technology to grasp the security concepts more quickly.

Table of Contents

Module 1: Introduction to Wireless LAN Security
Module 2: What is Wireless LAN Security?
Module 3: Need for WLAN security solution
Module 4: Various types of WLAN security solutions
Module 5: Selection criteria for WLAN security solution
Module 6: Implementation strategy for WLAN
Module 7: WLAN Security Technologies
Module 8: Key Features of WLAN Security
Module 9: OS & Versions Supported
Module 10: Persistent & Dissolvable Agent
Module 11: Posture Architecture & Flow
Module 12: Configuring Posture
Module 13: Adding and Modifying Policies
Module 14: Agent Technology for Windows, Linux & MAC OS X
Module 15: Complete Endpoint Visibility

Register for a training

Previous TrainingCISC - 3 Months
Next TrainingPrivileged Identity Management
Mohammed Harbi,student

I liked the instructor way for more illustration and the class was very interesting.

Yazeed, Senior Analyst

One of the best instructor, I have ever met.

Ali Al-Qahtani,

Thank you faculty. He has really gave us an excellent course by covering the material well.

Moataz Allami

Faculty is very knowledgeable instructor, enthusiastic and helpful.