Best Managed Services For Summerlin, NV
To the information security expert wireless networking may be considered a four letter word to be prevented at all expenses. No matter the security ramification cordless networking can offer expense efficiency, and since of that wireless innovations are here to stay. While numerous in the occupation think that cordless networks can be quickly jeopardized, this class will demonstrate how the suitable cordless architecture with the proper security controls can make your cordless network as safe and secure as any other remote gain access to point into your network.
In this three day, cordless security workshop, we will take a look at the cutting edge of wireless innovations. In this course we will actually set up and use cordless networks, identify the tools to uncover wireless networks, and likewise look at how to beat the efforts to secure cordless networks.
Course Completion
Upon the conclusion of our CISM course, students will have:
Built a cordless network architecture
Set up and configure 802.1 x authentication utilizing Microsoft Windows IAS and Server 2000
Set up a cordless access point
Distinguish between 802.11 x standards
Defeat Wired Equivalent Personal Privacy
Key Take Aways:
An understanding of cordless networks
A CD of typical managed it services tools and documents
An ability to search the web for updates and more details on cordless networks
Information naturally Content The following subjects will be covered:
Wireless History
Radio Frequency (RF) Fundamentals
WLAN Infrastructure
802.11 Network Architecture
802.1 X Authentication
Extensible Authentication Protocol (EAP)/( LEAP)/( PEAP).
Detection Platforms.
WLAN Discovery Tools.
Kismet.
Wireless Sniffers.
Standard Detection.
Antennas.
Exploiting WLANs.
Securing WLANs.
Other Wireless Options.
Legal Issues consisting of GLBA and ISO-17799.
Future.
Resources.
http://www.acquisitiondata.com/wireless_security.asp.