Best Managed Services For Summerlin, NV

To the details security expert wireless networking might be considered a four letter word to be prevented at all costs. Despite the security implication wireless networking can supply expense performance, and since of that cordless innovations are here to remain. While lots of in the profession believe that wireless networks can be quickly jeopardized, this class will show how the appropriate cordless architecture with the appropriate security controls can make your wireless network as protected as any other remote gain access to point into your network.
In this three day, cordless security workshop, we will examine the cutting edge of wireless technologies. In this course we will really set up and utilize wireless networks, identify the tools to uncover cordless networks, and likewise look at how to defeat the efforts to protect cordless networks.
Course Completion
Upon the conclusion of our CISM course, trainees will have:
Constructed a wireless network architecture
Set up and configure 802.1 x authentication utilizing Microsoft Windows IAS and Server 2000
Set up a cordless gain access to point
Distinguish between 802.11 x standards
Defeat Wired Equivalent Personal Privacy
Key Take Aways:
An understanding of cordless networks
A CD of typical tools managed it services and documents
An ability to browse the internet for updates and more details on wireless networks
Detail obviously Content The following subjects will be covered:
Wireless History
Radio Frequency (RF) Basics
WLAN Facilities
802.11 Network Architecture
802.1 X Authentication
Extensible Authentication Protocol (EAP)/( LEAP)/( PEAP).
Detection Platforms.
WLAN Discovery Tools.
Kismet.
Wireless Sniffers.
Standard Detection.
Antennas.
Exploiting WLANs.
Securing WLANs.
Other Wireless Options.
Legal Issues consisting of GLBA and ISO-17799.
Future.
Resources.
http://www.acquisitiondata.com/wireless_security.asp.