To the information security Expert wi-fi networking may very well be thought of as a 4 letter phrase to get prevented in any way costs. Whatever snowboard the protection implication wireless networking can offer Charge effectiveness, and because of that wi-fi systems are in this article to stay. Whilst several inside the career feel that wireless networks can be effortlessly compromised, this class will clearly show how the http://query.nytimes.com/search/sitesearch/?action=click&contentCollection®ion=TopBar&WT.nav=searchWidget&module=SearchSubmit&pgtype=Homepage#/snowboard suitable wireless architecture with the proper protection controls might make your wi-fi community as protected as every other distant obtain point into your network.
In this particular a few working day, wireless protection workshop, we will look at the leading edge of wireless technologies. The purpose of the class is to give you a complete knowledge of what wi-fi (802.11) networks are, how they operate, how men and women locate them and exploit them, and how they can be secured. This palms-heading in the right direction is based on genuine world examples, alternatives, and deployments. Within this course We'll really create and use wi-fi networks, establish the resources to uncover wi-fi networks, and in addition take a look at ways to defeat the tries to secure wi-fi networks.
Class Completion
On the completion of our CISM training course, students may have:
Manufactured a wireless network architecture
Install and configure 802.1x authentication working with Microsoft Home windows IAS and Server 2000
Set up a wireless accessibility issue
Distinguish among 802.11x standards
Defeat Wired Equal Privacy
Vital Consider Aways:
An comprehension of wi-fi networks
A CD of prevalent instruments and documentation
An power to research the net for updates and more information on wireless networks
Depth obviously Information The subsequent subjects is going to be included:
Wireless Background
Radio Frequency (RF) Fundamentals
WLAN Infrastructure
802.eleven Network Architecture
802.1X Authentication
Extensible Authentication Protocol (EAP)/(LEAP)/(PEAP)
Detection Platforms
WLAN Discovery Applications
Kismet
Wireless Sniffers
Typical Detection
Antennas
Exploiting WLANs
Securing WLANs
Other Wireless Options
Legal Issues including GLBA and ISO-17799
Future
Resources
http://www.acquisitiondata.com/wireless_security.asp