Best Managed Services For Summerlin, NV

To the details security expert cordless networking may be thought of as a four letter word to be avoided at all costs. No matter the security ramification wireless networking can provide cost effectiveness, and since of that wireless innovations are here to stay. While lots of in the occupation believe that cordless networks can be easily compromised, this class will demonstrate how the proper wireless architecture with the correct security controls can make your cordless network as secure as any other remote access point into your network.
In this three day, wireless security workshop, we will analyze the cutting edge of cordless innovations. In this course we will really set up and utilize wireless networks, determine the tools to uncover cordless networks, and also look at how to defeat the efforts to protect cordless networks.
Course Completion
Upon the conclusion of our CISM course, students will have:
Constructed a cordless network architecture
Install and configure 802.1 x authentication using Microsoft Windows IAS and Server 2000
Install a wireless gain access to point
Distinguish between 802.11 x standards
Defeat Wired Equivalent Privacy
Key Take Aways:
An understanding of wireless networks
A CD of common tools and documentation
A capability to search the web for updates and more details on wireless networks
Information of Course Content The following subjects will be covered:
Wireless History
Radio Frequency (RF) Principles
WLAN Facilities
802.11 Network Architecture
802.1 X Authentication
Extensible Authentication Protocol (EAP)/( LEAP)/( PEAP).
Detection Platforms.
WLAN Discovery Tools.
Kismet.
Wireless Sniffers.
Standard Detection.
Antennas.
Making use of WLANs.
Protecting WLANs.
Other Wireless Options.
Legal Issues including GLBA and ISO-17799.
Future.
Resources.
http://www.acquisitiondata.com/wireless_security.asp.
managed it services