Best Managed Services For Summerlin, NV
To the information security expert wireless networking may be considered a 4 letter word to be prevented at all expenses. No matter the security implication cordless networking can supply cost performance, and because of that wireless technologies are here to remain. While numerous in the occupation think that wireless networks can be quickly compromised, this class will show how the proper cordless architecture with the correct security controls can make your cordless network as safe as any other remote access managed it services point into your network.
In this 3 day, cordless security workshop, we will take a look at the cutting edge of wireless innovations. The function of the course is to provide you a complete understanding of what wireless (802.11) networks are, how they work, how people discover them and exploit them, and how they can be protected. This hands-on course is based on real life examples, solutions, and releases. In this course we will actually set up and use cordless networks, determine the tools to discover cordless networks, and likewise take a look at how to beat the attempts to secure wireless networks.
Course Conclusion
Upon the conclusion of our CISM course, students will have:
Constructed a cordless network architecture
Set up and set up 802.1 x authentication utilizing Microsoft Windows IAS and Server 2000
Set up a cordless access point
Compare 802.11 x standards
Defeat Wired Equivalent Privacy
Secret Take Aways:
An understanding of cordless networks
A CD of typical tools and paperwork
An ability to browse the internet for updates and more details on cordless networks
Information naturally Content The following subjects will be covered:
Wireless History
Radio Frequency (RF) Fundamentals
WLAN Infrastructure
802.11 Network Architecture
802.1 X Authentication
Extensible Authentication Procedure (EAP)/( LEAP)/( PEAP).
Detection Platforms.
WLAN Discovery Tools.
Kismet.
Wireless Sniffers.
Conventional Detection.
Antennas.
Making use of WLANs.
Protecting WLANs.
Other Wireless Options.
Legal Issues consisting of GLBA and ISO-17799.
Future.
Resources.
http://www.acquisitiondata.com/wireless_security.asp.