To the information security professional wi-fi networking can be considered a 4 letter phrase for being avoided 먹튀검증업체 in the least costs. Whatever the security implication wi-fi networking can provide Price tag efficiency, and since of that wireless technologies are listed here to stay. While several in the profession feel that wi-fi networks may be quickly compromised, this course will present how the right wi-fi architecture with the proper safety controls will make your wireless network as secure as some other remote obtain issue into your network.
In this 3 day, wireless security workshop, we will look at the leading edge of wi-fi systems. The goal of the course is to give you an entire idea of what wi-fi (802.eleven) networks are, how they work, how folks find them and exploit them, And just how they can be secured. This fingers-on track is predicated on real environment illustrations, options, and deployments. During this course we will actually set up and use wireless networks, establish the instruments to uncover wi-fi networks, in addition to have a look at how you can defeat the tries to protected wireless networks.
Program Completion
Upon the completion of our CISM system, pupils will have:
Built a wi-fi network architecture
Set up and configure 802.1x authentication working with Microsoft Home windows IAS and Server 2000
Put in a wireless entry level
Distinguish between 802.11x requirements
Defeat Wired Equal Privacy
Vital Acquire Aways:
An comprehension of wi-fi networks
A CD of common instruments and documentation
An capability to search the online world for updates and more information on wi-fi networks
Element of Course Material The following topics will probably be lined:
Wireless Historical past
Radio Frequency (RF) Fundamentals
WLAN Infrastructure
802.11 Network Architecture
802.1X Authentication
Extensible Authentication Protocol (EAP)/(LEAP)/(PEAP)
Detection Platforms
WLAN Discovery Applications
Kismet
Wi-fi Sniffers
Traditional Detection
Antennas
Exploiting WLANs
Securing WLANs
Other Wi-fi Choices
Authorized Problems like GLBA and ISO-17799
Upcoming
Sources
http://www.acquisitiondata.com/wireless_security.asp