Best Managed Services For Summerlin, NV
To the details security expert cordless networking might be considered a four letter word to be avoided at all costs. Regardless of the security ramification wireless networking can provide cost efficiency, and since of that cordless technologies are here to stay. While many in the profession believe that cordless networks can be quickly compromised, this class will show how the suitable cordless architecture with the appropriate security controls can make your cordless network as managed it services protected as any other remote gain access to point into your network.
In this three day, wireless security workshop, we will analyze the cutting edge of wireless innovations. In this course we will actually set up and use wireless networks, identify the tools to reveal cordless networks, and likewise look at how to defeat the attempts to protect wireless networks.
Course Completion
Upon the conclusion of our CISM course, students will have:
Built a wireless network architecture
Set up and set up 802.1 x authentication utilizing Microsoft Windows IAS and Server 2000
Install a wireless gain access to point
Distinguish between 802.11 x requirements
Defeat Wired Equivalent Personal Privacy
Secret Take Aways:
An understanding of cordless networks
A CD of typical tools and documents
A capability to search the internet for updates and more info on cordless networks
Detail of Course Material The following topics will be covered:
Wireless History
Radio Frequency (RF) Basics
WLAN Infrastructure
802.11 Network Architecture
802.1 X Authentication
Extensible Authentication Procedure (EAP)/( LEAP)/( PEAP).
Detection Platforms.
WLAN Discovery Tools.
Kismet.
Wireless Sniffers.
Standard Detection.
Antennas.
Making use of WLANs.
Securing WLANs.
Other Wireless Options.
Legal Issues including GLBA and ISO-17799.
Future.
Resources.
http://www.acquisitiondata.com/wireless_security.asp.