Best Managed Services For Summerlin, NV

To the info security professional cordless networking may be considered a 4 letter word to be avoided at all costs. Despite the security ramification wireless networking can supply cost effectiveness, and since of that wireless technologies are here to remain. While lots of in the occupation believe that wireless networks can be quickly jeopardized, this class will demonstrate how the suitable cordless architecture with the proper security controls can make your cordless network as safe and secure as any other remote gain access to point into your network.

In this three day, wireless security workshop, we will examine the cutting edge of cordless innovations. The purpose of the course is to give you a complete understanding of what wireless (802.11) networks are, how they work, how individuals find them and exploit them, and how they can be protected. This hands-on course is based upon real life examples, options, and implementations. In this course we will in fact set up and utilize cordless networks, identify the tools to reveal Check out this site wireless networks, and likewise take a look at how to defeat the efforts to protect cordless networks.

Course Conclusion

Upon the completion of our CISM course, students will have:

Constructed a cordless network architecture

Install and configure 802.1 x authentication using Microsoft Windows IAS and Server 2000

Install a wireless access point

Distinguish between 802.11 x requirements

Defeat Wired Equivalent Personal Privacy

Key Take Aways:

An understanding of cordless networks

A CD of common tools and paperwork

A capability to browse the internet for updates and more information on wireless networks

Information naturally Material The following topics will be covered:

Wireless History

Radio Frequency (RF) Basics

WLAN Facilities

802.11 Network Architecture

802.1 X Authentication

Extensible Authentication Protocol (EAP)/( LEAP)/( PEAP).

Detection Platforms.

WLAN Discovery Tools.

Kismet.

Wireless Sniffers.

Standard Detection.

Antennas.

Exploiting WLANs.

Securing WLANs.

Other Wireless Options.

Legal Issues including GLBA and ISO-17799.

Future.

Resources.

http://www.acquisitiondata.com/wireless_security.asp.