To the information security Expert wi-fi networking might be considered a 4 letter term for being avoided in the least expenditures. Whatever the safety implication wireless networking can offer Price performance, and because of that wi-fi technologies are in this article to stay. While numerous inside the job believe that wireless networks is often conveniently compromised, this class will clearly show how the suitable wi-fi architecture with the right security controls could make your wi-fi network as secure as any other remote accessibility level into your community.
In this particular a few day, wireless stability workshop, We'll look at the innovative of wireless technologies. The goal of the program is to give you an entire idea of what wi-fi (802.eleven) networks are, how they operate, how individuals discover them and exploit them, And exactly how they can be secured. This palms-on target is predicated on real globe examples, alternatives, and deployments. In this class We're going to in fact create and use wi-fi networks, determine the instruments to uncover wi-fi networks, in addition to examine how you can defeat the attempts to safe wi-fi networks.
Study course Completion
On the completion 토토 of our CISM study course, students may have:
Built a wireless network architecture
Install and configure 802.1x authentication using Microsoft Home windows IAS and Server 2000
Set up a wireless entry position
Distinguish involving 802.11x requirements
Defeat Wired Equivalent Privateness
Key Consider Aways:
An understanding of wi-fi networks
A CD of common applications and documentation
An power to search the web for updates and more info on wi-fi networks
Detail naturally Information The following topics are going to be coated:
Wireless Heritage
Radio Frequency (RF) Fundamentals
WLAN Infrastructure
802.11 Community Architecture
802.1X Authentication
Extensible Authentication Protocol (EAP)/(LEAP)/(PEAP)
Detection Platforms
WLAN Discovery Equipment
Kismet
Wi-fi Sniffers
Traditional Detection
Antennas
Exploiting WLANs
Securing WLANs
Other Wireless Alternatives
Lawful Issues together with GLBA and ISO-17799
Future
Resources
http://www.acquisitiondata.com/wireless_security.asp