To the information security expert wireless networking might be considered a follow this link 4 letter word to be prevented at all expenses. Regardless of the security ramification wireless networking can supply expense effectiveness, and because of that wireless technologies are here to remain. While many in the profession believe that wireless networks can be quickly jeopardized, this class will show how the suitable cordless architecture with the correct security controls can make your cordless network as safe as any other remote access point into your network.
In this three day, wireless security workshop, we will take a look at the cutting edge of cordless innovations. In this course we will really set up and use cordless networks, identify the tools to reveal wireless networks, and likewise look at how to defeat the efforts to secure wireless networks.
Course Completion
Upon the conclusion of our CISM course, students will have:
Constructed a cordless network architecture
Install and configure 802.1 x authentication utilizing Microsoft Windows IAS and Server 2000
Set up a wireless gain access to point
Compare 802.11 x standards
Defeat Wired Equivalent Personal Privacy
Secret Take Aways:
An understanding of wireless networks
A CD of common tools and documentation
A capability to browse the web for updates and more info on cordless networks
Information of Course Content The following subjects will be covered:
Wireless History
Radio Frequency (RF) Basics
WLAN Infrastructure
802.11 Network Architecture
802.1 X Authentication
Extensible Authentication Procedure (EAP)/( LEAP)/( PEAP).
Detection Platforms.
WLAN Discovery Tools.
Kismet.
Wireless Sniffers.
Conventional Detection.
Antennas.
Exploiting WLANs.
Securing WLANs.
Other Wireless Options.
Legal Issues including GLBA and ISO-17799.
Future.
Resources.
http://www.acquisitiondata.com/wireless_security.asp.