wan security wireless technology

WAN Security Wireless Technology Training in Delhi

This Wan Security wireless technology will teach you the much-needed skills and knowledge to install, operate, and troubleshoot a small-to-medium sized branch office enterprise network, including configuring several switches and routers, configuring wireless devices, configuring VLANS, connecting to a WAN, and implementing network security.

WAN Security Wireless Technology Training

TELCOM 2700 Wireless Networks (Cross listed with INFSCI 1072)

Wan Security wireless technology course covers cellular and wireless networks and their components. The topics include: first generation analog cellular phone systems; traffic engineering; mobility management; intersystem operation; second generation digital cellular standards: GSM, IS-95 (cellular CDMA); short message service (SMS);  2.5G data services (e.g., GPRS);  third generation cellular standards (cdma 2000 and WCDMA/UMTS);  location technology, wireless local area networks (802.11), wireless personal area networks (e.g., Bluetooth, Zigbee), wireless metropolitan networks  (WiMax), and satellite systems. (Prerequisite: TELCOM 2000/2100)

TELCOM 2710 Foundations of Wireless Communications

Radio propagation and multipath fading, antennas, digital modulation with emphasis on techniques being used in current wireless systems including Pi/4 DQPSK, GMSK, error control coding in wireless systems, spread spectrum and CDMA, OFDM, MIMO, and spectrum issues. Mathematical and qualitative treatment of existing systems as examples rather than as abstractions.  (Prerequisite: TELCOM 2210)

TELCOM 2720 Cellular and Wireless Networks

Cellular and mobile communication networks and their components including first generation analog cellular phone systems; traffic engineering; mobility management; intersystem operation; second generation digital cellular standards: GSM, IS-95 (cellular CDMA); short message service (SMS);  2.5 G data services (e.g., GPRS) and  third generation cellular standards CDMA 2000 and WCDMA/UMTS.   Location technology and advanced services, personal area networks and wireless local area network technology. (Prerequisite: TELCOM 2210)

TELCOM 2721 Mobile Data, Ad Hoc and Sensor Networks

Review of mobile data networks. Personal area and mobile ad hoc networks. Self organization, topology control, and routing in ad hoc networks. Sensor/actuator applications, systems and networks. Protocols to support sensor and mobile ad hoc networks. (Prerequisite: TELCOM 2210)

TELCOM 2725 Code Division Multiple Access

Theory and application of code division multiple access (CDMA) techniques for digital wireless communications. Emphasis on CDMA in mobile cellular communications. (Prerequisite: TELCOM 2710)

TELCOM 2727 Application Development for Mobile Devices (Cross listed with INFSCI 1073)

Focus on information system applications that run on top of wireless infrastructure such as multimedia messaging, mobile inventory control, location aware services including wireless technologies (GSM, CDMA2000, UMTS, 802.11, Bluetooth), mobile information systems and applications (M-Business, location-based services, wireless CRN), wireless information system challenges and architectures (security, reliability, mobility, power conservation, gateways, proxies), mobile application protocols (SMS, EMS, MMS, WAP), thin and thick client mobile application development (WML, VXML, Java, J2ME, J2EE, .NETCF, C#), and business case studies of mobile applications. (Prerequisite: TELCOM 2700, Java or other structured programming language)

TELCOM 2730 Capstone in Wireless Networks

Selected applications; rationale behind and methodologies for applying wireless network technologies to business applications. Course project. (Prerequisites: TELCOM 2210, 2310, 2120, 2720/2721)

TELCOM 2810 Information Security and Privacy (cross-listed with INFSCI 2150)

Fundamental issues and first principles of security and information assurance (confidentiality/privacy, integrity, authentication, identification, authorization, availability, access control).  Business issues of risk analysis and management of resources.  Issues in information systems security; analysis, design, and coding of information systems/ networks for security; techniques for building secure organizational systems; e-commerce related security issues; policy, legal and ethical issues in security. (Prerequisites: Operating systems, data structures, databases, mathematical logic)

TELCOM 2813 Security Management and Computer Forensics

(Title change effective Fall 2016) (cross-listed with INFSCI 2621)
Security management in information systems and networks. Intrusion detection systems, anomaly detection, network forensics,  application logging, auditing and data management, contingency planning, digital immune systems; alarm and responses; security standards; ethical and legal issues in information; cyber-evidence. (Prerequisites: TELCOM 2810/2821, Programming Language)

TELCOM 2820 Cryptography (cross-listed with INFSCI 2170)

Principles of number theory, cryptographic algorithms and cryptanalysis.  Steganography, block and stream ciphers, secret key encryption (DES, RES, RE-N), primes, random numbers, factoring, and discrete logarithms. Public key encryption (RSA, Diffie-Helman, elliptical curve cryptography, N’TRU); key management, hash functions (MD5, SHA-1, RIPEMD-160, HMAC). (Prerequisites: Algebra, College Mathematics, Digital logic, Programming Language, TELCOM 2000/2100)

TELCOM 2821 Network Security

Principles of network security and management.  Review of network vulnerabilities, security at the link, network and transport layers; dial-up security (PAP, CHAP, Radius, Diameter), IPSEC, SSL, and VPNS. Email security (PGP, S/MIME); Kerberos; X.509 certificates; AAA and mobile IP; SNMP security; firewalls; filters and gateways; policies and implementation of firewall policies; stateful firewalls; firewall appliances. (Prerequisites: TELCOM 2810/2820, TELCOM 2000/2100)

TELCOM 2825 Information Systems and Network Infrastructure Protection

Techniques for the protection and survivability of information systems and networks. Critical infrastructure definition, risk management, vulnerability and risk analysis, fault and attack trees, availability analysis, traffic restoration schemes and survivable network design and management techniques; critical infrastructure simulation, CIP policy and legal issues, SCADA systems. (Prerequisites: TELCOM 2000/2100/2810)

TELCOM 2829 Advanced Cryptography
Algorithm complexity, advanced number theory (Galois fields, quadratic residues, zero knowledge schemes, one-time signatures), efficient implementation of encryption schemes in hardware and software and other advanced topics in cryptography. (Prerequisites: TELCOM 2820)

TELCOM 2829 Advanced Cryptography

Algorithm complexity, advanced number theory (Galois fields, quadratic residues, zero knowledge schemes, one-time signatures), efficient implementation of encryption schemes in hardware and software and other advanced topics in cryptography. (Prerequisites: TELCOM 2820)

TELCOM 2830 Capstone in Security

Integrative class for masters students in their final semester of the SAIS track.  Combination of business and technical case studies and group projects.  Case studies focus on business/economics aspects of providing information assurance and how this service impacts technology.  Group projects involve design and development of a prototype secure and survivable information system including application development, system deployment, system optimization and system economics. (Prerequisites: TELCOM  2810/INFSCI 2150, TELCOM 2821)