To the knowledge protection professional wireless networking may very well be regarded as a 4 letter word to generally be prevented in the least expenditures. Whatever the safety implication wireless networking can offer Price tag effectiveness, and because of that wi-fi technologies are in this article to remain. When quite a few inside the career think that wireless networks might be effortlessly compromised, this course will exhibit how the suitable wireless architecture with the right security controls can make your wireless network as protected as some other distant obtain point into your community.
During this three day, wireless security workshop, We'll look at the cutting edge of wireless systems. The goal of the training course is to give you a complete idea of what wireless (802.11) networks are, how they function, how men and women obtain them and exploit them, And exactly how they are often secured. This fingers-on track relies on authentic entire world illustrations, methods, and deployments. In this particular course We're going to in fact set up and use wi-fi networks, decide the resources to uncover wi-fi networks, and in addition evaluate the best way to defeat the makes an attempt to secure wi-fi networks.
Class Completion
On the completion of our CISM study course, pupils can have:
Created a wireless community architecture
Set up and configure 802.1x authentication using Microsoft Home windows IAS and Server 2000
Set up a wi-fi obtain issue
Distinguish among 802.11x criteria
Defeat Wired Equivalent Privacy
Critical Just take Aways:
An idea of wi-fi networks
A CD of 토토 typical applications and documentation
An capacity to look for the web for updates and more info on wi-fi networks
Depth needless to say Material The subsequent matters is going to be included:
Wireless Historical past
Radio Frequency (RF) Fundamentals
WLAN Infrastructure
802.11 Network Architecture
802.1X Authentication
Extensible Authentication Protocol (EAP)/(LEAP)/(PEAP)
Detection Platforms
WLAN Discovery Equipment
Kismet
Wireless Sniffers
Traditional Detection
Antennas
Exploiting WLANs
Securing WLANs
Other Wireless Solutions
Authorized Troubles together with GLBA and ISO-17799
Future
Sources
http://www.acquisitiondata.com/wireless_security.asp