Best Managed Services For Summerlin, NV

To the information security expert wireless networking might be thought of as Go to this website a 4 letter word to be avoided at all expenses. Despite the security implication cordless networking can provide cost efficiency, and because of that cordless technologies are here to remain. While lots of in the profession believe that cordless networks can be quickly jeopardized, this class will show how the appropriate cordless architecture with the proper security controls can make your wireless network as safe and secure as any other remote access point into your network.

In this three day, wireless security workshop, we will examine the cutting edge of cordless technologies. The purpose of the course is to give you a complete understanding of what wireless (802.11) networks are, how they work, how individuals discover them and exploit them, and how they can be protected. This hands-on course is based on real life examples, solutions, and deployments. In this course we will in fact set up and use wireless networks, identify the tools to discover wireless networks, and likewise look at how to defeat the efforts to secure cordless networks.

Course Completion

Upon the completion of our CISM course, trainees will have:

Built a wireless network architecture

Set up and set up 802.1 x authentication using Microsoft Windows IAS and Server 2000

Install a wireless access point

Compare 802.11 x requirements

Defeat Wired Equivalent Privacy

Key Take Aways:

An understanding of cordless networks

A CD of common tools and documents

A capability to browse the web for updates and more details on wireless networks

Information of Course Content The following topics will be covered:

Wireless History

Radio Frequency (RF) Fundamentals

WLAN Facilities

802.11 Network Architecture

802.1 X Authentication

Extensible Authentication Protocol (EAP)/( LEAP)/( PEAP).

Detection Platforms.

WLAN Discovery Tools.

Kismet.

Wireless Sniffers.

Standard Detection.

Antennas.

Making use of WLANs.

Protecting WLANs.

Other Wireless Options.

Legal Issues consisting of GLBA and ISO-17799.

Future.

Resources.

http://www.acquisitiondata.com/wireless_security.asp.