To the information protection professional wi-fi networking might be considered a four letter phrase for being averted in any respect costs. Whatever the security implication wireless networking can offer Price efficiency, and since of that wi-fi technologies are listed here to remain. While numerous from the profession feel that wireless networks may be very easily compromised, this course will exhibit how the suitable wi-fi architecture with the correct safety controls could make your wi-fi network as protected as every other distant entry stage into your community.
With this 3 day, wi-fi safety workshop, We'll examine the innovative of wi-fi systems. The goal of the course is to provide you with a complete comprehension of what wireless (802.11) networks are, how they work, how individuals uncover them and exploit them, and how they can be secured. This palms-on target relies on serious earth examples, alternatives, and deployments. Within this class We'll basically build and use wi-fi networks, establish the instruments to uncover wi-fi networks, in addition to evaluate tips on how to defeat the makes an attempt to protected wi-fi networks.
System Completion
Upon the completion of our CISM study course, students will likely have:
Made a wireless network architecture
Install and configure 802.1x authentication employing Microsoft Windows IAS and Server 2000
Put in a wi-fi access stage
Distinguish among 802.11x criteria
Defeat Wired Equal Privateness
Essential Acquire Aways:
An knowledge of wireless networks
A CD of popular equipment and documentation
An ability to research the world wide web for updates and more details on wireless networks
Element 토토 not surprisingly Content material The subsequent subjects will probably be covered:
Wi-fi Heritage
Radio Frequency (RF) Fundamentals
WLAN Infrastructure
802.11 Network Architecture
802.1X Authentication
Extensible Authentication Protocol (EAP)/(LEAP)/(PEAP)
Detection Platforms
WLAN Discovery Equipment
Kismet
Wireless Sniffers
Standard Detection
Antennas
Exploiting WLANs
Securing WLANs
Other Wireless Choices
Lawful Troubles such as GLBA and ISO-17799
Potential
Resources
http://www.acquisitiondata.com/wireless_security.asp