To the data security Expert wi-fi networking may very well be considered a 4 letter term to be prevented at all expenses. Regardless of the stability implication wi-fi networking can provide Price efficiency, and since of that wi-fi technologies are below to remain. While quite a few within the occupation think that wi-fi networks can be simply compromised, this class will clearly show how the suitable wireless architecture with the proper security controls might make your wireless community as secure as any other distant entry stage into your network.
During this 3 day, wi-fi safety workshop, We are going to study the innovative of wi-fi technologies. The purpose of the program is to provide you with a complete understanding of what wireless (802.11) networks are, how they do the job, how individuals come across them and exploit them, And the way they are often secured. This palms-on the right track is predicated on authentic globe illustrations, remedies, and deployments. During this program we will basically create and use wireless networks, determine the tools to uncover wi-fi networks, and likewise look at the best way to defeat the makes an attempt to safe wireless networks.
Class Completion
On the completion of our CISM study course, pupils can have:
Manufactured a wi-fi community architecture
Set up and configure 802.1x authentication making use of Microsoft Home windows IAS and Server 2000
Install a wi-fi entry http://query.nytimes.com/search/sitesearch/?action=click&contentCollection®ion=TopBar&WT.nav=searchWidget&module=SearchSubmit&pgtype=Homepage#/snowboard point
Distinguish involving 802.11x requirements
Defeat Wired Equivalent Privateness
Key Choose Aways:
An understanding of wireless networks
A CD of frequent resources and documentation
An ability to search the world wide web for updates and more details on snowboard wireless networks
Depth of Course Content material The following subject areas are going to be covered:
Wi-fi Historical past
Radio Frequency (RF) Fundamentals
WLAN Infrastructure
802.eleven Community Architecture
802.1X Authentication
Extensible Authentication Protocol (EAP)/(LEAP)/(PEAP)
Detection Platforms
WLAN Discovery Instruments
Kismet
Wi-fi Sniffers
Traditional Detection
Antennas
Exploiting WLANs
Securing WLANs
Other Wi-fi Options
Legal Troubles which includes GLBA and ISO-17799
Upcoming
Methods
http://www.acquisitiondata.com/wireless_security.asp