To the information security expert wireless networking might be thought of as Go to this website a 4 letter word to be avoided at all expenses. Despite the security implication cordless networking can provide cost efficiency, and because of that cordless technologies are here to remain. While lots of in the profession believe that cordless networks can be quickly jeopardized, this class will show how the appropriate cordless architecture with the proper security controls can make your wireless network as safe and secure as any other remote access point into your network.
In this three day, wireless security workshop, we will examine the cutting edge of cordless technologies. The purpose of the course is to give you a complete understanding of what wireless (802.11) networks are, how they work, how individuals discover them and exploit them, and how they can be protected. This hands-on course is based on real life examples, solutions, and deployments. In this course we will in fact set up and use wireless networks, identify the tools to discover wireless networks, and likewise look at how to defeat the efforts to secure cordless networks.
Course Completion
Upon the completion of our CISM course, trainees will have:
Built a wireless network architecture
Set up and set up 802.1 x authentication using Microsoft Windows IAS and Server 2000
Install a wireless access point
Compare 802.11 x requirements
Defeat Wired Equivalent Privacy
Key Take Aways:
An understanding of cordless networks
A CD of common tools and documents
A capability to browse the web for updates and more details on wireless networks
Information of Course Content The following topics will be covered:
Wireless History
Radio Frequency (RF) Fundamentals
WLAN Facilities
802.11 Network Architecture
802.1 X Authentication
Extensible Authentication Protocol (EAP)/( LEAP)/( PEAP).
Detection Platforms.
WLAN Discovery Tools.
Kismet.
Wireless Sniffers.
Standard Detection.
Antennas.
Making use of WLANs.
Protecting WLANs.
Other Wireless Options.
Legal Issues consisting of GLBA and ISO-17799.
Future.
Resources.
http://www.acquisitiondata.com/wireless_security.asp.