0
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
{"ad_unit_id":"App_Resource_Sidebar_Upper","resource":{"id":3465138,"author_id":1770037,"title":"SEGURIDAD EN REDES","created_at":"2015-09-14T23:07:31Z","updated_at":"2016-06-23T00:31:23Z","sample":false,"description":"Seguridad en redes WIFI","alerts_enabled":true,"cached_tag_list":"redes, redes publicas, seguridad","deleted_at":null,"hidden":false,"average_rating":null,"demote":false,"private":false,"copyable":true,"score":16,"artificial_base_score":0,"recalculate_score":true,"profane":false,"hide_summary":false,"tag_list":["redes","redes publicas","seguridad"],"admin_tag_list":[],"study_aid_type":"MindMap","show_path":"/mind_maps/3465138","folder_id":2610993,"public_author":{"id":1770037,"profile":{"name":"sebastiangg","about":null,"avatar_service":"gravatar","locale":"es-ES","google_author_link":null,"user_type_id":247,"escaped_name":"sebastiangg","full_name":"sebastiangg","badge_classes":""}}},"width":300,"height":250,"rtype":"MindMap","rmode":"canonical","sizes":"[[[0, 0], [[300, 250]]]]","custom":[{"key":"env","value":"production"},{"key":"rtype","value":"MindMap"},{"key":"rmode","value":"canonical"},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}
{"ad_unit_id":"App_Resource_Sidebar_Lower","resource":{"id":3465138,"author_id":1770037,"title":"SEGURIDAD EN REDES","created_at":"2015-09-14T23:07:31Z","updated_at":"2016-06-23T00:31:23Z","sample":false,"description":"Seguridad en redes WIFI","alerts_enabled":true,"cached_tag_list":"redes, redes publicas, seguridad","deleted_at":null,"hidden":false,"average_rating":null,"demote":false,"private":false,"copyable":true,"score":16,"artificial_base_score":0,"recalculate_score":true,"profane":false,"hide_summary":false,"tag_list":["redes","redes publicas","seguridad"],"admin_tag_list":[],"study_aid_type":"MindMap","show_path":"/mind_maps/3465138","folder_id":2610993,"public_author":{"id":1770037,"profile":{"name":"sebastiangg","about":null,"avatar_service":"gravatar","locale":"es-ES","google_author_link":null,"user_type_id":247,"escaped_name":"sebastiangg","full_name":"sebastiangg","badge_classes":""}}},"width":300,"height":250,"rtype":"MindMap","rmode":"canonical","sizes":"[[[0, 0], [[300, 250]]]]","custom":[{"key":"env","value":"production"},{"key":"rtype","value":"MindMap"},{"key":"rmode","value":"canonical"},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}
Next up
Copy and Edit
Register for free tools and resources
Build free Mind Maps, Flashcards, Quizzes and Notes
Create, discover and share resources
Print & Pin great learning resources
Register Now
3465138
SEGURIDAD EN REDES
Mind Map by
sebastiangg
, updated more than 1 year ago
More
Less
Created by
sebastiangg
over 5 years ago
51
0
0
Description
Seguridad en redes WIFI
No tags specified
redes
redes publicas
seguridad
{"ad_unit_id":"App_Resource_Leaderboard","width":728,"height":90,"rtype":"MindMap","rmode":"canonical","placement":1,"sizes":"[[[1200, 0], [[728, 90]]], [[0, 0], [[468, 60], [234, 60], [336, 280], [300, 250]]]]","custom":[{"key":"env","value":"production"},{"key":"rtype","value":"MindMap"},{"key":"rmode","value":"canonical"},{"key":"placement","value":1},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}
Resource summary
SEGURIDAD EN REDES
1 Conexiones a la red
1.1 Prevenciones al ingresar
1.2 Acesso a la red
1.3 Mayor alcance de conexion
1.4 No se debe configurar la red como oculta
1.5 Control de ingreso
2 Redes wili
2.1 Proteccion de redes wifi
2.1.1 Puntos de acceso
2.1.2 Clientes
2.1.2.1 Oredenadores de escritorio
2.1.2.2 portatiles
2.1.2.3 Tabletas
3 Tecnologias de configuracion de redes
3.1 WEP
3.2 WPA2
3.2.1 TKIP
3.2.2 AES
3.3 WPA
3.4 802.1X
3.5 CIFRADO DE LAS COMUNICACIONES
3.6 control de accedo a la red
4 Red wifi para empresas
4.1 Configuracion de wpa2
5 Red WIFI
5.1 Mayor efectividad
5.2 Gran beneficio de conexion
5.3 Tiene un beneficio muy grande al contar con una conexion hasta de 100 metros
Show full summary
Hide full summary
Similar
Salud y seguridad
Rafa Tintore
Seguridad alimenticia
Rafa Tintore
SEGURIDAD EN REDES INALÁMBRICAS - REDES WI-FI
Diana Marcela Caucai Beltrán
SEGURIDAD EN REDES INALÁMBRICAS - REDES WI-FI
Belen Cortes
REDES WIFI
behernandezg
WI-FI
Janila Córdova
seguridad Wi-Fi
Sary Vasquez
Redes III
SenaTest
Lección 4
Frida Rivera07
FUNDAMENTOS DE SEGURIDAD - TELEMATICA
jjasprillam
Seguridad en redes Wi-Fi
Yon Ivan Marquez Buitrago
Browse Library
{"ad_unit_id":"App_Resource_Leaderboard","width":728,"height":90,"rtype":"MindMap","rmode":"canonical","placement":2,"sizes":"[[[0, 0], [[970, 250], [970, 90], [728, 90]]]]","custom":[{"key":"env","value":"production"},{"key":"rtype","value":"MindMap"},{"key":"rmode","value":"canonical"},{"key":"placement","value":2},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}