The goal of the IAUWS v2.0 is to provide network professional with information to prepare them to secure the wireless network from security threats via appropriate security policies and best practices, as well as ensure the proper implementation of security standards and proper configuration of security components. The IAUWS reinforces the instruction by providing students with hand-on labs to ensure students thoroughly understand how to secure a wireless network.
Prerequisites
The knowledge and skills that a learner must have before attending this course are as follows:- Cisco Certified Networking Associate - CCNA
- Cisco Certified Networking Associate Wireless - CCNA Wireless
Who Should Attend This Course
Target candidate and roles for this course is: wireless network professionals with 3-5 years experience in the networking field who will be required to define the security requirements for various deployment models. The target audience for the course is: wireless network engineer, mid-level wireless support engineer, wireless test engineer, wireless network designer. The CUWSS class is also targeted at individuals wishing to attain the CCNP-Wireless certification. The Implementing Cisco Unified Wireless Voice Networks course is targeted to Network Engineers, Network Administrators, Network Managers, System Engineers, WLAN designers, Project Managers, and any individual wishing to attain the CCNP-Wireless certification.Course Objectives
- Upon completing this course, the learner will be able to meet these overall objectives:
- Describe organizational and regulatory Security Policies
- Describe how to segment enterprise and quest WLAN traffic
- Configure administration and security on a WLAN controller
- Configure administration and security on a WLAN controller using TACACS+
- Secure client devices using EAP authentication
- Configure Cisco Secure Services Client
- Design and implement guest services on a WLAN controller.
- Configure the WLAN controller for Cisco NAC
- Configure Local authentication on the WLAN controller
- Configure Management Frame Protection (MFP) on the WLAN controller
- Implement Access Control Lists (ACL) on a WLAN controller
- Describe WLAN controller based Intrusion Detection Signatures (IDS)
- Configure the WLAN controller to integrate with IPS and IDS appliances
Course Outline
Module 1 – Organizational and Regulatory Security Policies- Describing Regulatory Compliance
- Segmenting Traffic
- Configuring Administrative Security
- Managing WLAN Controller and Cisco WCS Alarms
- Identifying Security Audit Tools
- Configuring EAP Authentication
- Describing the Impact of Security on Application and Roaming
- Configuring Cisco Secure Services Client
- Troubleshooting Wireless Connectivity
- Describing Guest Access Architecture
- Configuring the WLAN to Support Guest Access
- Configuring Guest Access Accounts
- Troubleshooting Guest Access
- Introducing the Cisco NAC Appliance Solution
- Configuring the Controller for Cisco NAC Out-of- Band Operations
- Configuring Authentication for the WLAN Infrastructure
- Configuring Management Frame Protection
- Configuring Certificate Services
- Implementing Access Control Lists
- Configuring Identity Based Networking on the Controller
- Troubleshooting Secure Wireless Connectivity
- Module 6 – Internal and Integrated External Security Mitigations
- Mitigating Wireless Vulnerabilities
- Using Controller-Based IDS
- Understanding Cisco's End-to-End Security Solutions
- Integrating Cisco WCS with Wireless IPS
Lab Outline
- Lab 1-1: Segmenting Traffic Identifying
- Lab 1-2: Configuring Administrative Security
- Lab 2-1: Configuring EAP Authentication on the Clients
- Lab 2-2: Configuring Cisco Secure Services Client
- Lab 2-3: Troubleshooting Wireless Connectivity
- Lab 3-1: Configure the WLAN to Support Guest Access
- Lab 3-2: Configure a Controller to use the NAC Guest Server for Authentication
- Lab 3-3: Troubleshooting Guest Access Issues
- Lab 4-1: Configuring the Controller for Cisco NAC
- Lab 5-1: Configuring Local Authentication on the WLAN Controller
- Lab 5-2: Configuring H-REAP for WAN Failure
- Lab 5-3: Configuring Management Frame Protection
- Lab 5-4: Configuring Certificate Services
- Lab 5-6: Implementing IBN
- Lab 5-5: Implementing Access Control Lists
- Lab 5-7: Troubleshooting H-REAP Security Issues
- Lab 5-8: Troubleshooting Secure Wireless Connectivity
- Lab 6-1: Using Controller-Based IDS
No comments:
Post a Comment
Note: only a member of this blog may post a comment.