To the information stability Experienced wi-fi networking could possibly be regarded as a four letter phrase to be prevented at all expenses. Whatever the security implication wi-fi networking can offer Price performance, and since of that wi-fi systems are in this article to remain. Though numerous within the occupation believe that wi-fi networks can be conveniently compromised, this course will show how the right wi-fi architecture with the correct protection controls could make your wireless network as secure snowboard as almost every other distant entry issue into your community.
In this three working day, wi-fi safety workshop, We are going to look at the cutting edge of wi-fi technologies. The purpose of the class is to give you a full understanding of what wireless (802.eleven) networks are, how they work, how people today locate them and exploit them, and how they are often secured. This palms-on track is predicated on serious planet illustrations, remedies, and deployments. During this program we will actually setup and use wireless networks, determine the tools to uncover wireless networks, and likewise take a look at how you can defeat the attempts to secure wi-fi networks.
Class Completion
On the completion of our CISM study course, students will have:
Manufactured a wi-fi community architecture
Put in and configure 802.1x authentication making use of Microsoft Home windows IAS and Server 2000
Set up a wi-fi accessibility place
Distinguish among 802.11x requirements
Defeat Wired Equal Privacy
Critical Acquire Aways:
An knowledge of wi-fi networks
A CD of typical tools and documentation
An ability to look for the world wide web for updates and more details on wi-fi networks
Detail of Course Content material The subsequent matters will be covered:
Wireless Historical past
Radio Frequency (RF) Fundamentals
WLAN Infrastructure
802.eleven Community http://www.bbc.co.uk/search?q=snowboard Architecture
802.1X Authentication
Extensible Authentication Protocol (EAP)/(LEAP)/(PEAP)
Detection Platforms
WLAN Discovery Instruments
Kismet
Wireless Sniffers
Regular Detection
Antennas
Exploiting WLANs
Securing WLANs
Other Wireless Possibilities
Legal Difficulties which includes GLBA and ISO-17799
Potential
Resources
http://www.acquisitiondata.com/wireless_security.asp