To the info security professional wireless network may be regarded as a letter word to be avoided without exceptions. Cost home security systems efficiency can be provided by regardless of the security implication wireless networking, and because that wireless systems are here to keep of. This type will show how a appropriate wireless structure with the proper security settings can make your wireless network as secure as every other remote access point into your network, while many in the profession think that wireless networks can be easily affected.
In this three day, wireless safety course, we will examine the innovative of wireless technologies. The objective of the program is always to give a full understanding to you of what wireless (802.11) systems are, how they work, how people see them and manipulate them, and how they could be attached. This hands-on course is dependant on real life cases, options, and deployments. In this course we shall use wireless networks and actually create, determine wireless networks to be uncovered by the tools, and also look at just how to defeat wireless networks to be secured by the attempts.
Program End
Upon the completion of our CISM course, students may have:
Made a wireless network architecture
Install and configure 802.1x authentication employing Microsoft Windows IAS and Server 2000
Use a wireless access point
Distinguish between 802.11x requirements
Beat Wired Equivalent Privacy
Key Get Aways:
An understanding of wireless networks
A CD of documentation and common tools
An power to search the internet for more details and revisions on wireless networks
Detail of Course Content These subjects will soon be covered:
In this three day, wireless safety course, we will examine the innovative of wireless technologies. The objective of the program is always to give a full understanding to you of what wireless (802.11) systems are, how they work, how people see them and manipulate them, and how they could be attached. This hands-on course is dependant on real life cases, options, and deployments. In this course we shall use wireless networks and actually create, determine wireless networks to be uncovered by the tools, and also look at just how to defeat wireless networks to be secured by the attempts.
Program End
Upon the completion of our CISM course, students may have:
Made a wireless network architecture
Install and configure 802.1x authentication employing Microsoft Windows IAS and Server 2000
Use a wireless access point
Distinguish between 802.11x requirements
Beat Wired Equivalent Privacy
Key Get Aways:
An understanding of wireless networks
A CD of documentation and common tools
An power to search the internet for more details and revisions on wireless networks
Detail of Course Content These subjects will soon be covered:
Instant Record
Radio Frequency (RF) Basics
WLAN Structure
802.11 Network Architecture
802.1X Authentication
Extensible Authentication Protocol (EAP )/( STEP )/( PEAP)
Discovery Platforms
WLAN Discovery Tools
Kismet
Wireless Sniffers
Old-fashioned Detection
Antennas
Exploiting WLANs
Obtaining WLANs
Other Instant Options
Legal Issues including GLBA and ISO-17799
Potential
Resources