To the info security professional wireless networking may be considered a 4 letter word to be avoided at all costs. Despite the security ramification wireless networking can provide cost effectiveness, and since of that cordless technologies are here to stay. While lots of in the occupation believe that cordless networks can be easily compromised, this class will demonstrate how the appropriate cordless architecture with the correct security controls can make your wireless network as secure as any other remote access point into your network.
In this three day, wireless security workshop, we will analyze the cutting edge of cordless innovations. The purpose of the course is to give you a complete understanding of what wireless (802.11) networks are, how they work, how individuals discover them and exploit them, and how they can be protected. This hands-on course is based upon real life examples, options, and deployments. In this course we will in fact set up and utilize cordless networks, determine the tools to reveal wireless networks, and likewise look at how to beat the efforts to secure cordless networks.
Course Conclusion
Upon the completion of our CISM course, trainees will have:
Constructed a wireless network architecture
Set up and configure 802.1 x authentication using Microsoft Windows IAS and Server 2000
Set up a wireless gain access to point
Distinguish between Additional reading 802.11 x standards
Defeat Wired Equivalent Personal Privacy
Secret Take Aways:
An understanding of wireless networks
A CD of common tools and documentation
A capability to browse the internet for updates and more details on wireless networks
Detail of Course Material The following topics will be covered:
Wireless History
Radio Frequency (RF) Basics
WLAN Infrastructure
802.11 Network Architecture
802.1 X Authentication
Extensible Authentication Procedure (EAP)/( LEAP)/( PEAP).
Detection Platforms.
WLAN Discovery Tools.
Kismet.
Wireless Sniffers.
Traditional Detection.
Antennas.
Exploiting WLANs.
Protecting WLANs.
Other Wireless Options.
Legal Issues consisting of GLBA and ISO-17799.
Future.
Resources.
http://www.acquisitiondata.com/wireless_security.asp.