Detailed Course Outline
- Installing HP RF Manager
- Detecting threats such as vulnerabilities, backdoors, denial of service (DoS) attacks, and Wired Equivalent Privacy (WEP) attacks
- Locating and quarantining rogue AP devices
- Mitigating threats, including disassociating devices that exhibit suspicious devices
- Planning the deployment of sensors
- Configuring sensors
- Creating RF Manager policies
- Classifying APs and clients
- Monitoring VLANs on the wired network
- Auditing security, including monitoring events and analyzing reports