To the information security Discover more professional cordless networking may be thought of as a four letter word to be prevented at all costs. Regardless of the security implication wireless networking can offer expense performance, and because of that wireless innovations are here to remain. While many in the profession think that cordless networks can be easily jeopardized, this class will show how the appropriate cordless architecture with the correct security controls can make your wireless network as secure as any other remote access point into your network.
In this 3 day, wireless security workshop, we will take a look at the cutting edge of wireless technologies. In this course we will actually set up and utilize cordless networks, determine the tools to reveal cordless networks, and also look at how to defeat the efforts to protect wireless networks.
Course Conclusion
Upon the conclusion of our CISM course, students will have:
Built a cordless network architecture
Set up and configure 802.1 x authentication using Microsoft Windows IAS and Server 2000
Install a cordless access point
Compare 802.11 x requirements
Defeat Wired Equivalent Privacy
Key Take Aways:
An understanding of wireless networks
A CD of common tools and documentation
An ability to search the internet for updates and more details on wireless networks
Information of Course Content The following subjects will be covered:
Wireless History
Radio Frequency (RF) Fundamentals
WLAN Infrastructure
802.11 Network Architecture
802.1 X Authentication
Extensible Authentication Procedure (EAP)/( LEAP)/( PEAP).
Detection Platforms.
WLAN Discovery Tools.
Kismet.
Wireless Sniffers.
Standard Detection.
Antennas.
Making use of WLANs.
Securing WLANs.
Other Wireless Options.
Legal Issues including GLBA and ISO-17799.
Future.
Resources.
http://www.acquisitiondata.com/wireless_security.asp.