Best Managed Services For Summerlin, NVPosted by Benner on December 23rd, 2020 To the information security professional cordless networking might be thought of as a four letter word to be avoided at all expenses. Regardless of the security implication wireless networking can offer expense effectiveness, and because of that wireless technologies are here to remain. While numerous in the occupation believe that wireless networks can be quickly jeopardized, this class will show how the proper cordless architecture with the correct security controls can make your wireless network as safe and secure as any other remote access point into your network. In this 3 day, cordless security workshop, we will analyze the cutting edge of cordless technologies. The function of the course is to provide you a complete understanding of what wireless (802.11) networks are, how they work, how people find them and exploit them, and how they can be secured. This hands-on course is based upon real life examples, services, and releases. In this course we will really set up and utilize cordless networks, determine the Click here for info tools to uncover cordless networks, and also take a look at how to beat the attempts to protect cordless networks. Course Completion Upon the completion of our CISM course, students will have: Constructed a wireless network architecture Set up and set up 802.1 x authentication utilizing Microsoft Windows IAS and Server 2000 Set up a cordless gain access to point Compare 802.11 x requirements Defeat Wired Equivalent Privacy Secret Take Aways: An understanding of wireless networks A CD of typical tools and documentation An ability to search the internet for updates and more info on cordless networks Information naturally Content The following subjects will be covered: Wireless History Radio Frequency (RF) Fundamentals WLAN Infrastructure 802.11 Network Architecture 802.1 X Authentication Extensible Authentication Procedure (EAP)/( LEAP)/( PEAP). Detection Platforms. WLAN Discovery Tools. Kismet. Wireless Sniffers. Conventional Detection. Antennas. Making use of WLANs. Protecting WLANs. Other Wireless Options. Legal Issues including GLBA and ISO-17799. Future. Resources. http://www.acquisitiondata.com/wireless_security.asp. Like it? Share it!More by this author |