To the data security professional wireless networking can be considered a 4 letter term to be prevented at all expenses. Whatever the protection implication wireless networking can provide Expense performance, and since of that wireless technologies are in this article to stay. Although several from the job think that wi-fi networks is usually simply compromised, this class will clearly show how the right wireless architecture with the correct security controls might make your wireless community as safe as every other distant obtain level into your community.
During this a few working day, wi-fi protection workshop, We are going to examine the leading edge of wi-fi systems. The goal of the system is to provide you with a full idea of what wireless (802.11) networks are, how they 토토검증 function, how people obtain them and exploit them, and how they can be secured. This hands-on the right track relies on serious environment illustrations, alternatives, and deployments. During this course We are going to actually put in place and use wi-fi networks, identify the applications to uncover wi-fi networks, and in addition evaluate how to defeat the attempts to secure wi-fi networks.
System Completion
Upon the completion of our CISM study course, learners should have:
Built a wi-fi community architecture
Put in and configure 802.1x authentication making use of Microsoft Home windows IAS and Server 2000
Put in a wi-fi obtain stage
Distinguish amongst 802.11x expectations
Defeat Wired Equivalent Privateness
Essential Choose Aways:
An understanding of wi-fi networks
A CD of common resources and documentation
An power to lookup the world wide web for updates and more info on wireless networks
Element certainly Information The next topics are going to be covered:
Wi-fi Record
Radio Frequency (RF) Fundamentals
WLAN Infrastructure
802.eleven Network Architecture
802.1X Authentication
Extensible Authentication Protocol (EAP)/(LEAP)/(PEAP)
Detection Platforms
WLAN Discovery Resources
Kismet
Wi-fi Sniffers
Typical Detection
Antennas
Exploiting WLANs
Securing WLANs
Other Wireless Solutions
Legal Issues like GLBA and ISO-17799
Long run
Sources
http://www.acquisitiondata.com/wireless_security.asp