Best Managed Services For Summerlin, NV

To the information security Discover more professional cordless networking may be thought of as a four letter word to be prevented at all costs. Regardless of the security implication wireless networking can offer expense performance, and because of that wireless innovations are here to remain. While many in the profession think that cordless networks can be easily jeopardized, this class will show how the appropriate cordless architecture with the correct security controls can make your wireless network as secure as any other remote access point into your network.

In this 3 day, wireless security workshop, we will take a look at the cutting edge of wireless technologies. In this course we will actually set up and utilize cordless networks, determine the tools to reveal cordless networks, and also look at how to defeat the efforts to protect wireless networks.

Course Conclusion

Upon the conclusion of our CISM course, students will have:

Built a cordless network architecture

Set up and configure 802.1 x authentication using Microsoft Windows IAS and Server 2000

Install a cordless access point

Compare 802.11 x requirements

Defeat Wired Equivalent Privacy

Key Take Aways:

An understanding of wireless networks

A CD of common tools and documentation

An ability to search the internet for updates and more details on wireless networks

Information of Course Content The following subjects will be covered:

Wireless History

Radio Frequency (RF) Fundamentals

WLAN Infrastructure

802.11 Network Architecture

802.1 X Authentication

Extensible Authentication Procedure (EAP)/( LEAP)/( PEAP).

Detection Platforms.

WLAN Discovery Tools.

Kismet.

Wireless Sniffers.

Standard Detection.

Antennas.

Making use of WLANs.

Securing WLANs.

Other Wireless Options.

Legal Issues including GLBA and ISO-17799.

Future.

Resources.

http://www.acquisitiondata.com/wireless_security.asp.