Best Managed Services For Summerlin, NV

To the details security professional cordless networking might be considered a four letter word to be prevented at all expenses. Regardless of the security implication managed it services cordless networking can supply cost performance, and due to the fact that of that wireless technologies are here to remain. While numerous in the profession believe that cordless networks can be quickly jeopardized, this class will show how the suitable cordless architecture with the appropriate security controls can make your wireless network as protected as any other remote gain access to point into your network.
In this three day, cordless security workshop, we will examine the cutting edge of cordless technologies. The function of the course is to offer you a full understanding of what wireless (802.11) networks are, how they work, how people discover them and exploit them, and how they can be secured. This hands-on course is based on real world examples, services, and implementations. In this course we will really establish and use wireless networks, determine the tools to reveal wireless networks, and also take a look at how to defeat the efforts to secure wireless networks.
Course Conclusion
Upon the conclusion of our CISM course, students will have:
Built a cordless network architecture
Install and configure 802.1 x authentication utilizing Microsoft Windows IAS and Server 2000
Install a cordless gain access to point
Distinguish between 802.11 x standards
Defeat Wired Equivalent Personal Privacy
Secret Take Aways:
An understanding of wireless networks
A CD of common tools and documentation
A capability to browse the internet for updates and more info on wireless networks
Detail of Course Content The following topics will be covered:
Wireless History
Radio Frequency (RF) Principles
WLAN Facilities
802.11 Network Architecture
802.1 X Authentication
Extensible Authentication Procedure (EAP)/( LEAP)/( PEAP).
Detection Platforms.
WLAN Discovery Tools.
Kismet.
Wireless Sniffers.
Standard Detection.
Antennas.
Exploiting WLANs.
Protecting WLANs.
Other Wireless Options.
Legal Issues consisting of GLBA and ISO-17799.
Future.
Resources.
http://www.acquisitiondata.com/wireless_security.asp.