To the knowledge security professional wi-fi networking may very well be thought of as a four letter word to get prevented at all charges. Whatever the stability implication wireless networking can offer Price performance, and because of that wireless systems are here to remain. While a lot of within the occupation feel that wi-fi networks is usually conveniently compromised, this course will exhibit how the right wireless architecture with the right safety controls could make your wireless network as protected as another remote access level into your community.
In this particular a few working day, wi-fi security workshop, We're going to examine the leading edge of wireless technologies. The objective of the class is to give you a complete idea of what wireless (802.eleven) networks are, how they operate, how people today locate them and exploit them, And exactly how they may be secured. This fingers-on target relies on serious earth illustrations, remedies, and deployments. With this system We'll essentially put in place and use wi-fi networks, establish the tools to uncover wireless networks, in addition to look at the way to defeat the tries to safe wireless networks.
Course Completion
Upon the completion of our CISM program, college students may have:
Created a wireless community architecture
Set up and configure 802.1x authentication applying Microsoft Windows IAS and Server 2000
Set up a wireless obtain point
Distinguish between 802.11x requirements
Defeat Wired Equivalent Privacy
Essential Acquire Aways:
An understanding of wireless networks
A CD of frequent applications and documentation
An ability to search the world wide web for updates and additional information on wi-fi networks
Element certainly Material The following matters will probably be protected:
Wireless Heritage
Radio 토토검증 Frequency (RF) Fundamentals
WLAN Infrastructure
802.11 Network Architecture
802.1X Authentication
Extensible Authentication Protocol (EAP)/(LEAP)/(PEAP)
Detection Platforms
WLAN Discovery Instruments
Kismet
Wireless Sniffers
Common Detection
Antennas
Exploiting WLANs
Securing WLANs
Other Wireless Options
Legal Issues together with GLBA and ISO-17799
Long run
Means
http://www.acquisitiondata.com/wireless_security.asp