To the information protection professional wireless networking may very well be considered a four letter phrase to generally be averted in any way prices. Regardless of the stability implication wi-fi networking can offer Price tag performance, and because of that wireless technologies are right here to remain. While lots of while in the career think that wi-fi networks might be conveniently compromised, this course will exhibit how the appropriate wireless architecture with the appropriate security controls can make 토토사이트 your wi-fi network as secure as some other remote obtain point into your network.
On this a few working day, wireless security workshop, We're going to look at the cutting edge of wireless systems. The goal of the class is to provide you with a complete understanding of what wi-fi (802.eleven) networks are, how they perform, how persons obtain them and exploit them, and how they may be secured. This arms-on target relies on authentic globe examples, methods, and deployments. During this course We're going to actually put in place and use wireless networks, identify the instruments to uncover wi-fi networks, as well as evaluate how you can defeat the makes an attempt to safe wireless networks.
Course Completion
Upon the completion of our CISM system, college students should have:
Built a wi-fi community architecture
Install and configure 802.1x authentication using Microsoft Windows IAS and Server 2000
Set up a wi-fi obtain level
Distinguish among 802.11x criteria
Defeat Wired Equivalent Privacy
Crucial Just take Aways:
An idea of wi-fi networks
A CD of popular resources and documentation
An ability to lookup the web for updates and more info on wi-fi networks
Depth naturally Content material The next matters is going to be covered:
Wi-fi History
Radio Frequency (RF) Fundamentals
WLAN Infrastructure
802.eleven Network Architecture
802.1X Authentication
Extensible Authentication Protocol (EAP)/(LEAP)/(PEAP)
Detection Platforms
WLAN Discovery Tools
Kismet
Wi-fi Sniffers
Common Detection
Antennas
Exploiting WLANs
Securing WLANs
Other Wi-fi Selections
Lawful Difficulties including GLBA and ISO-17799
Upcoming
Sources
http://www.acquisitiondata.com/wireless_security.asp