To the information security professional wireless networking may be thought of as a four letter word to be avoided at all costs. Regardless of the security implication wireless network provides cost efficiency, and as a result of that wireless technologies are here to stay. Be taught more on an affiliated site by clicking perchplow76 on 43 Things. While many in the profession think that wireless networks can be easily compromised, this class will show how a appropriate wireless structure with all the appropriate security settings can make your wireless network as secure as any distant entry point into your network.
Within this three day, wireless safety class, we will examine the innovative of wireless systems. The purpose of the course is to give the full understanding to you of what wireless (802.11) net-works are, how they work, how people find them and use them, and how they may be secured. Learn more on IAMSport by browsing our compelling site. This hands-on class is dependant on real life examples, alternatives, and deployments. Get further on via by visiting our wonderful paper. In this course we shall actually setup and use wireless networks, determine the tools to locate wireless networks, and also look at how-to defeat the efforts to secure wireless networks.
Class Completion
Upon the completion of our CISM class, students can have:
Constructed a radio network architecture
Install and configure 802.1x validation using Server 2000 and Microsoft Windows IAS
Put in a wireless access point
Identify between 802.11x requirements
Defeat Wired Equivalent Privacy
Crucial Simply take Aways:
A knowledge of wireless systems
A CD of common methods and documentation
An ability to look the web for improvements and more info on wireless networks
Depth obviously Content The next issues will be covered:
Within this three day, wireless safety class, we will examine the innovative of wireless systems. The purpose of the course is to give the full understanding to you of what wireless (802.11) net-works are, how they work, how people find them and use them, and how they may be secured. Learn more on IAMSport by browsing our compelling site. This hands-on class is dependant on real life examples, alternatives, and deployments. Get further on via by visiting our wonderful paper. In this course we shall actually setup and use wireless networks, determine the tools to locate wireless networks, and also look at how-to defeat the efforts to secure wireless networks.
Class Completion
Upon the completion of our CISM class, students can have:
Constructed a radio network architecture
Install and configure 802.1x validation using Server 2000 and Microsoft Windows IAS
Put in a wireless access point
Identify between 802.11x requirements
Defeat Wired Equivalent Privacy
Crucial Simply take Aways:
A knowledge of wireless systems
A CD of common methods and documentation
An ability to look the web for improvements and more info on wireless networks
Depth obviously Content The next issues will be covered:
Instant Record
Radio Fre-quency (RF) Fundamentals
WLAN Infrastructure
802.11 Network Architecture
802.1X Authentication
Extensible Authentication Protocol (EAP )/( START )/( PEAP)
Discovery Platforms
WLAN Discovery Tools
Kismet
Instant Sniffers
Main-stream Discovery
Antennas
Exploiting WLANs
Obtaining WLANs
Other Wireless Options
Legal Issues including GLBA and ISO-17799
Future
Sources
http://www.acquisitiondata.com/wireless_security.asp.