 | |
| Security Fundamentals |
|
 | |
| What is security? |
 |
| WLAN vulnerabilities |
 |
| WLAN threats |
 |
| Reconnaissance |
 |
| Access |
 |
| Denial of service |
|
 |
| Basic WLAN Security Technologies |
|
 | |
| The WLAN security wheel |
 |
| First generation wireless security |
 |
| Wired equivalent privacy (WEP) |
 |
| Authentication and association |
|
 |
| Configuring Basic WLAN Security |
|
 | |
| Basic WLAN security |
 |
| Enabling protocol and MAC filters on APs |
 |
| Securing clients and APs |
 |
| Monitoring WLAN equipment |
 |
| Disable unneeded services |
|
 |
| Enterprise WLAN Authentication |
|
 | |
| Second generation authentication |
 |
| Authenticating wireless users |
 |
| 802.1x basics |
 |
| How 802.1x works |
 |
| 802.1x authentication types |
 |
| Choosing an 802.1x type |
|
 |
| Enterprise Wireless Encryption |
|
 | |
| Strengthening WEP |
 |
| Message integrity check |
 |
| Broadcast key rotation (BKR) |
 |
| Second generation encryption |
 |
| Using VPNs |
|
 |
| Other Enterprise Security Services |
|
 | |
| VLANs |
 |
| Spanning tree |
|
 |