Best Managed Services For Summerlin, NV
To the info security professional wireless networking might be thought of as a managed it services 4 letter word to be avoided at all expenses. Despite the security implication cordless networking can offer expense efficiency, and since of that cordless technologies are here to stay. While numerous in the profession believe that wireless networks can be quickly compromised, this class will demonstrate how the appropriate cordless architecture with the appropriate security controls can make your wireless network as protected as any other remote access point into your network.
In this 3 day, wireless security workshop, we will take a look at the cutting edge of wireless innovations. In this course we will in fact set up and use wireless networks, figure out the tools to discover wireless networks, and also look at how to beat the attempts to secure cordless networks.
Course Completion
Upon the completion of our CISM course, trainees will have:
Constructed a wireless network architecture
Set up and set up 802.1 x authentication utilizing Microsoft Windows IAS and Server 2000
Set up a wireless access point
Compare 802.11 x standards
Defeat Wired Equivalent Personal Privacy
Secret Take Aways:
An understanding of wireless networks
A CD of common tools and documentation
An ability to browse the web for updates and more information on cordless networks
Detail obviously Content The following subjects will be covered:
Wireless History
Radio Frequency (RF) Basics
WLAN Infrastructure
802.11 Network Architecture
802.1 X Authentication
Extensible Authentication Protocol (EAP)/( LEAP)/( PEAP).
Detection Platforms.
WLAN Discovery Tools.
Kismet.
Wireless Sniffers.
Standard Detection.
Antennas.
Making use of WLANs.
Protecting WLANs.
Other Wireless Options.
Legal Issues including GLBA and ISO-17799.
Future.
Resources.
http://www.acquisitiondata.com/wireless_security.asp.