Best Managed Services For Summerlin, NV

To the details security professional wireless networking may be thought of as a 4 letter word to be avoided at all expenses. Despite the security implication cordless networking can offer expense effectiveness, and since of that wireless technologies are here to stay. While numerous in the profession believe that wireless networks can be easily compromised, this class will show how the proper wireless architecture with the proper security controls can make your cordless network as safe as any other remote access point into your network.
In this three day, cordless security workshop, we will analyze the cutting edge of cordless innovations. The function of the course is to offer you a full understanding of what wireless (802.11) networks are, how they work, how individuals find them and exploit them, and how they can be protected. This hands-on course is based upon real world examples, solutions, and deployments. In this course we will in fact set up and utilize cordless networks, determine the tools to uncover cordless networks, and likewise take a look at how to beat the efforts to secure cordless networks.
Course Completion
Upon the completion of our CISM course, trainees will have:
Constructed a cordless network architecture
Install and configure 802.1 x authentication using Microsoft Windows IAS and Server 2000
Install a wireless access point
Distinguish between 802.11 x requirements
Defeat Wired Equivalent Privacy
Secret Take Aways:
An understanding of wireless networks
A CD of common tools and documents
An ability to search the web for updates and more details on cordless networks
Detail naturally Material The following topics will be covered:
Wireless History
Radio Frequency (RF) Fundamentals
WLAN Infrastructure
802.11 Network Architecture
802.1 X Authentication
Extensible Authentication Protocol (EAP)/( LEAP)/( PEAP).
Detection managed it services Platforms.
WLAN Discovery Tools.
Kismet.
Wireless Sniffers.
Conventional Detection.
Antennas.
Exploiting WLANs.
Protecting WLANs.
Other Wireless Options.
Legal Issues including GLBA and ISO-17799.
Future.
Resources.
http://www.acquisitiondata.com/wireless_security.asp.