Best Managed Services For Summerlin, NV

To the information security professional wireless networking might be considered a managed it services 4 letter word to be avoided at all costs. No matter the security implication cordless networking can supply expense efficiency, and due to the fact that of that wireless technologies are here to stay. While many in the profession think that cordless networks can be easily compromised, this class will show how the appropriate wireless architecture with the appropriate security controls can make your cordless network as secure as any other remote access point into your network.
In this three day, wireless security workshop, we will take a look at the cutting edge of cordless innovations. In this course we will actually set up and use wireless networks, identify the tools to uncover wireless networks, and likewise look at how to beat the attempts to protect cordless networks.
Course Conclusion
Upon the completion of our CISM course, trainees will have:
Constructed a cordless network architecture
Install and configure 802.1 x authentication utilizing Microsoft Windows IAS and Server 2000
Set up a wireless access point
Compare 802.11 x standards
Defeat Wired Equivalent Personal Privacy
Key Take Aways:
An understanding of wireless networks
A CD of typical tools and documentation
A capability to search the internet for updates and more details on cordless networks
Detail naturally Material The following topics will be covered:
Wireless History
Radio Frequency (RF) Principles
WLAN Facilities
802.11 Network Architecture
802.1 X Authentication
Extensible Authentication Procedure (EAP)/( LEAP)/( PEAP).
Detection Platforms.
WLAN Discovery Tools.
Kismet.
Wireless Sniffers.
Traditional Detection.
Antennas.
Making use of WLANs.
Securing WLANs.
Other Wireless Options.
Legal Issues consisting of GLBA and ISO-17799.
Future.
Resources.
http://www.acquisitiondata.com/wireless_security.asp.