Best Managed Services For Summerlin, NV

To the info security professional wireless networking may be considered a four letter word to be avoided at all expenses. Regardless of the security implication cordless networking can offer cost effectiveness, and since of that cordless innovations are here to remain. While lots of in the occupation think that wireless networks can be quickly jeopardized, this class will demonstrate how the proper wireless architecture with the proper security controls can make your wireless network as safe as any other remote access point into your network.
In this 3 day, cordless security workshop, we will examine the cutting edge of wireless innovations. The purpose of the course is to offer you a full understanding of what wireless (802.11) networks are, how they work, how people discover them and exploit them, and how they can be secured. This hands-on course is based on real life examples, services, and implementations. In this course we will actually managed it services establish and use cordless networks, determine the tools to uncover wireless networks, and likewise take a look at how to defeat the attempts to secure cordless networks.
Course Conclusion
Upon the completion of our CISM course, trainees will have:
Constructed a cordless network architecture
Install and set up 802.1 x authentication utilizing Microsoft Windows IAS and Server 2000
Install a cordless gain access to point
Compare 802.11 x standards
Defeat Wired Equivalent Privacy
Secret Take Aways:
An understanding of wireless networks
A CD of common tools and documentation
A capability to search the web for updates and more information on cordless networks
Detail naturally Material The following subjects will be covered:
Wireless History
Radio Frequency (RF) Basics
WLAN Facilities
802.11 Network Architecture
802.1 X Authentication
Extensible Authentication Procedure (EAP)/( LEAP)/( PEAP).
Detection Platforms.
WLAN Discovery Tools.
Kismet.
Wireless Sniffers.
Standard Detection.
Antennas.
Making use of WLANs.
Protecting WLANs.
Other Wireless Options.
Legal Issues including GLBA and ISO-17799.
Future.
Resources.
http://www.acquisitiondata.com/wireless_security.asp.