New Skills

New Training: Configure and Verify Wireless Security Features

by Team Nuggets
New Training: Configure SharePoint Authentication picture: A
Published on February 23, 2021

In this 5-video skill, CBT Nuggets trainer Jacob Moran covers the various forms of secure authentication to a wireless network. Learn how to configure pre-shared keys, extensible authentication protocol, and web authentication by using your wireless LAN controller. Watch this new Cisco training.

Watch the full course: Cisco CCNP Enterprise Core

This training includes:

  • 5 videos

  • 20 minutes of training

You’ll learn these topics in this skill:

  • Introduction to Wireless Authentication

  • Wireless Security Authentication Options

  • Configuring Wireless Preshared Key Security

  • Configuring Wireless Extensible Authentication Protocol (EAP) Security

  • Configuring Wireless Web Authentication

3 Common Wireless Auth Protocols: WEP, EAP, Open Authentication

There are many different types of wireless authentication protocols used today, some providing enhanced authentication and security, whereas others pose some security risks. This brief overview will discuss three common wire authentication protocols known as Open Authentication, WEP, and EAP.

Open Authentication, a common protocol from one of the first authentication method standards 802.11, is a very straightforward protocol, although it lacks some security features. Open Authentication allows for direct communication between endpoints and autonomous systems without qualification by the autonomous system.

WEP or Wired Equivalent Privacy is another wireless authentication protocol option that differs from the previously mentioned Open Authentication in its security enhancements. This protocol is a security algorithm that leverages RC4 Cipher to encrypt data that is passed between nodes. The intention of WEP is to provide a security-enhanced alternative to the popular Open Authentication protocol. Both of these wireless authentication protocols provide a glimpse into the fascinating world of wireless authentication.

Recommended Articles