Windows 8

1. Windows 8 2. Module 1 - Installing and Deploying Windows 8. 3. Windows 8 editions. 4. Advantage of 64 bit Processor. 5. Minimum hardware requirement for Windows 8 6. Option for installing Windows 8 7. Installation of Windows 8 8. Upgrading and Migrating to Windows 8 9. What is Upgrading 10. What is Migration 11. Migrating User Data and Settings 12. Migrating using USMT ( User State Migration Tool ) 13. MBR - Master Boot Record 14. GUID - GPT Disk. 15. Disk Management tools. 16. Simple Volume 17. Spanned and Striped Volumes 18. Maintaining Disks, Partitions, and Volumes 19. Disk Quota 20. Device Driver in Windows 8 21. System Restore 22. LAST KNOWN GOOD CONFIGURATION 23. Configure and Trouble shoot Network Connections 24. What is an IPv4 Address 25. Default Gateway 26. Public and Private IPv4 Address 27. IPv6 Network Connectivity 28. IPv4 Address can be assigned by following types 29. Implementing Name Resolution 30. Trouble Shooting Network Connectivity 31. Implementing Wireless Security 32. Wireless network Technologies 33. What is Wireless Broadband? 34. IEEE 802.11 35. Wireless Network Configuration 36. Security Types 37. Implementing Network Security. 38. Configuring Windows Firewall 39. Ports and Application 40. Important Application, Protocol and Port Number 41. Configure Inbound and Outbound Rules 42. Securing Network traffic 43. Configuring Windows Defender 44. Managing File Access 45. NTFS Standard permission for FOLDER 46. Preventing Permission Inheritance 47. Different ways to Share Folder 48. RULE for setting NTFS + SHARE PERMISSION 49. Managing Printers 50. SkyDrive 51. Securing Windows 8 Desktop 52. User Account Types and Rights 53. Windows Authentication Methods 54. Important Security Features in Windows 8 55. Managing EFS Certificates 56. BitLocker 57. Configuring BitLocker To Go 58. UAC - User Account Control 59. Configuring Application. 60. Application Compatibility Issue 61. Resolve Common Application Compatibility Issues 62. Office 365 63. Windows Store 64. LOB (Line Of Business) and Sideloading 65. Configuring Internet Explorer Settings 66. AppLocker 67. Optimizing and Maintaining Windows 8 Client Computers 68. Performance Monitor 69. Commonly used Performance Counters 70. Resource Monitor 71. Managing Reliability of Windows 8 72. Managing Windows 8 Updates 73. Configuring Mobile Computing and Remote Access 74. Tools for Configuring Mobile Computers and Device Setting 75. Configure VPN Access 76. Data encryption 77. VPN Tunneling Protocols 78. Configure Remote Desktop and Remote Assistance 79. Remote Assistance 80. DirectAccess 81. Hyper-V 82. VHD 83. Managing Snapshot 84. Troubleshooting and Recovery Options for Windows 8 85. Enable and configure Windows 7 File Recovery 86. Advance Troubleshoot now option 87. Windows 8 System Restore 88. Using Windows PowerShell
Pr.Pg Next Pg

IEEE 802.11 tutorials

  • It is the original IEEE 802.11 standard for Shared key authentication and WEP (Wired Equivalent Privacy).

WEP is one of the least secure forms of security.

  • A network that is secured with WEP had been cracked in 3 minutes by FBI.

  • To establish WEP encryption you have to install same secret key in each of organization Wireless Access Point.

  • Then you must install that key in each Client.

  • WEP uses either 40 bits or 104 bits Encryption key.

  • Finally Wireless Access Point and Client go through a challenge response cycle which uses WEP encryption key as shared secret key.

  • Although WEP fails to meet security goals, it is still widely used.

 

IEEE 802.1X

  • IEEE 802.1X provide same standard that existed for Ethernet Switch.

  • It was adapted to Wireless LAN to provide much stronger authentication then original 802.11 WEP standard.

  • 802.1X authentication is designed for medium and large wireless LAN that consist of RADIUS (Remote Authentication Dial-In User Service) Server and AD DS (Active Directory Domain Service) Database.

  • IEEE 802.1X prevents a wireless node from joining a wireless network until the node performs a successful authentication.

  • When Wireless Access Point & Data-Link device, detects new clients, it passes authentication to authentication server. Server then checks the client’s credentials and report the authentication status to data-link or WAP device.

  • If authentication fails, Wireless Access Point, bridge or Switch will not forward packets to the network.

  • You must ensure that the Client and Wireless Devices all support 802.1X protocol.

 

WPA - Wi-Fi Protected Access

  • WPA is quick alternative to improve security over WEP.

  • WPA - Wi-Fi Protected Access was created by Wi-Fi Alliance an organization of Wireless Equipment vendors.

  • WPA is a trimmed down version of 802.11i Security standard developed by IEEE 802.11 to replace WEP.

  • WEP uses a much stronger encryption method known as TKIP (Temporal Key Integrity Protocol).

 

WPA2 - Wi-Fi Protected Access 2

  • WPA2 is a Wi-Fi Alliance branded version of 802.11i standard.

  • WPA2 support the additional mandatory security features of IEEE 802.11i standards that were not included in earlier WPA version.

  • WPA2 support both TKIP (Temporal Key Integrity Protocol) and AES encryption.

  • Both EPA and WPA2 support EAP authentication using RADIUS server and PSK Preshared Key.

 

Pr.Pg border                                              Next Pg