Best Managed Services For Summerlin, NV

To the info security professional wireless networking may be considered a 4 letter word to be avoided at all costs. Despite the security ramification wireless networking can provide cost effectiveness, and since of that cordless technologies are here to stay. While lots of in the occupation believe that cordless networks can be easily compromised, this class will demonstrate how the appropriate cordless architecture with the correct security controls can make your wireless network as secure as any other remote access point into your network.

In this three day, wireless security workshop, we will analyze the cutting edge of cordless innovations. The purpose of the course is to give you a complete understanding of what wireless (802.11) networks are, how they work, how individuals discover them and exploit them, and how they can be protected. This hands-on course is based upon real life examples, options, and deployments. In this course we will in fact set up and utilize cordless networks, determine the tools to reveal wireless networks, and likewise look at how to beat the efforts to secure cordless networks.

Course Conclusion

Upon the completion of our CISM course, trainees will have:

Constructed a wireless network architecture

Set up and configure 802.1 x authentication using Microsoft Windows IAS and Server 2000

Set up a wireless gain access to point

Distinguish between Additional reading 802.11 x standards

Defeat Wired Equivalent Personal Privacy

Secret Take Aways:

An understanding of wireless networks

A CD of common tools and documentation

A capability to browse the internet for updates and more details on wireless networks

Detail of Course Material The following topics will be covered:

Wireless History

Radio Frequency (RF) Basics

WLAN Infrastructure

802.11 Network Architecture

802.1 X Authentication

Extensible Authentication Procedure (EAP)/( LEAP)/( PEAP).

Detection Platforms.

WLAN Discovery Tools.

Kismet.

Wireless Sniffers.

Traditional Detection.

Antennas.

Exploiting WLANs.

Protecting WLANs.

Other Wireless Options.

Legal Issues consisting of GLBA and ISO-17799.

Future.

Resources.

http://www.acquisitiondata.com/wireless_security.asp.