To the data protection professional wireless networking could be thought of as a four letter term to become prevented in any way fees. Whatever the protection implication wireless networking can provide Value performance, and since of that wireless technologies are here to stay. Though quite a few within the occupation feel that wi-fi networks is often quickly compromised, this class will show how the appropriate wi-fi architecture with the proper security controls may make your wireless network as safe as any other remote access position into your network.
On this a few day, wireless stability workshop, We are going to look at the leading edge of wireless systems. The purpose of the program is to give you a full idea of what wi-fi (802.eleven) networks are, how they operate, how people today discover them and exploit them, And the way they are often secured. This arms-on target is based on real earth examples, alternatives, and deployments. On this course We'll truly setup and use wi-fi networks, establish the resources to uncover wi-fi networks, in addition to look at how to defeat the attempts to protected wireless networks.
Class Completion
On the completion of our CISM program, learners can 토토사이트 have:
Manufactured a wireless community architecture
Install and configure 802.1x authentication utilizing Microsoft Windows IAS and Server 2000
Put in a wi-fi entry issue
Distinguish involving 802.11x benchmarks
Defeat Wired Equivalent Privacy
Key Acquire Aways:
An idea of wi-fi networks
A CD of typical equipment and documentation
An capability to search the internet for updates and additional information on wi-fi networks
Detail of Course Information The subsequent subject areas will likely be included:
Wi-fi Heritage
Radio Frequency (RF) Fundamentals
WLAN Infrastructure
802.eleven Network Architecture
802.1X Authentication
Extensible Authentication Protocol (EAP)/(LEAP)/(PEAP)
Detection Platforms
WLAN Discovery Equipment
Kismet
Wi-fi Sniffers
Conventional Detection
Antennas
Exploiting WLANs
Securing WLANs
Other Wireless Selections
Authorized Challenges which include GLBA and ISO-17799
Long term
Sources
http://www.acquisitiondata.com/wireless_security.asp