NAC for wired and wireless
About The Course
This training will help the participant will get to know why just maintaining a strong wireless encryption forms only a small part in securing their wired or wireless networks. NAC solutions go a step further and can protect an organization against threats such as rogue access points, DoS attacks etc. Participants will get to know how an effective defense involves strong correlation between wired and wireless networks, which requires tight integration between WLAN management and intrusion detection systems.
NAC for wired and wireless)
Many network managers assume a strong wireless encryption is sufficient for building strong security for wireless LAN (WLAN) traffic. They are only partially correct. WPA2 encryption might offer better authentication and encryption options, but WLANs can still have vulnerabilities like:
- Rogue access points (APs);
- Denial-of-service attacks; and
- Attacks against WLAN infrastructure.
This can lead to sensitive data leakage from the organization.
An effective defense involves strong correlation between wired and wireless networks, which requires tight integration between WLAN management and intrusion detection systems. Thus, there exists a need for a comprehensive WLAN enterprise security solution to protect valuable corporate data and intellectual property from getting compromised.
Who should attend this training?
- Network Administrators
- Security Administrators
- Incident Management Team
- IT Managers
- Chief Information Officer (CIO)
- Senior Management
Why should you attend?
Enterprise WLAN Solutions provide the following benefits:
- Business continuity: Delivers the right business tools to employees on roaming.
- Advanced connectivity options: Offers wired, wireless, secure enterprise mesh, remote AP, indoors, and outdoors options
- Identity-based security: We can enforce unified security policy for all connected users
- Application-awareness: This enables us to provide optimized service delivery
- Reliability: Enables us to confidently use wireless as the primary network connection across the enterprise
Prerequisites
Good to have fundamental knowledge of Wireless Technology to grasp the security concepts more quickly.
Table of Contents
Mohammed Harbi,student
I liked the instructor way for more illustration and the class was very interesting.
Yazeed, Senior Analyst
One of the best instructor, I have ever met.
Ali Al-Qahtani,
Thank you faculty. He has really gave us an excellent course by covering the material well.
Moataz Allami
Faculty is very knowledgeable instructor, enthusiastic and helpful.