How to Explain snowboard to Your Grandparents

To the data protection Specialist wi-fi networking could possibly be thought of as a four letter word to generally be prevented in the least charges. Whatever the stability implication wireless networking can offer Value effectiveness, and because of that wi-fi technologies are listed here to stay. Though numerous from the profession believe that wireless networks can be very easily compromised, this course will display how the appropriate wireless architecture with the appropriate protection controls may make your wireless network as secure as any other remote obtain position into your network.

Within this a few day, wi-fi protection workshop, we will examine the innovative of wireless technologies. The objective of the system is to provide you with an entire understanding of what wireless (802.eleven) networks are, how they get the job done, how folks obtain them and exploit them, And the way they are often secured. This palms-on track is predicated on serious world illustrations, alternatives, and deployments. On this program we will truly build and use wireless networks, determine the tools to uncover wi-fi networks, as well as take a look at the way to defeat the makes an attempt to secure wi-fi networks.

Program Completion

Upon the completion of our CISM course, pupils may have:

Constructed a wireless community architecture

Set up and configure 802.1x authentication employing Microsoft Windows IAS and Server 2000

Put in a wireless obtain place

Distinguish involving 802.11x standards

Defeat Wired Equivalent Privateness

Critical Consider Aways:

An knowledge of wireless networks

A CD of prevalent equipment and documentation

An power to search the online market place for updates and more details on wireless networks

Depth certainly Material The subsequent topics might be included:

Wireless Heritage

Radio Frequency (RF) Fundamentals

WLAN Infrastructure

802.eleven Community Architecture

802.1X Authentication

Extensible Authentication Protocol (EAP)/(LEAP)/(PEAP)

Detection Platforms

WLAN Discovery Instruments


Wi-fi Sniffers

Common Detection


Exploiting WLANs

Securing WLANs

Other Wi-fi Possibilities

Lawful Problems together with GLBA and ISO-17799

Foreseeable future