To the data security professional wi-fi networking may be regarded as a 4 letter phrase to become avoided in any respect costs. Regardless of the protection implication wi-fi networking can provide Value performance, and since of that wi-fi systems are listed here to stay. Though lots of within the occupation believe that wireless networks may be very easily compromised, this course will present how the appropriate wireless architecture with the proper stability controls might make your wireless network as protected as almost every other distant 토토사이트 obtain place into your community.
In this particular three working day, wi-fi protection workshop, We're going to examine the leading edge of wireless technologies. The goal of the program is to provide you with an entire understanding of what wireless (802.11) networks are, how they do the job, how persons come across them and exploit them, And just how they can be secured. This palms-on track relies on real entire world illustrations, alternatives, and deployments. With this training course We'll actually set up and use wi-fi networks, figure out the equipment to uncover wi-fi networks, and likewise check out the way to defeat the makes an attempt to protected wi-fi networks.
Program Completion
On the completion of our CISM study course, pupils may have:
Made a wi-fi network architecture
Install and configure 802.1x authentication using Microsoft Windows IAS and Server 2000
Set up a wi-fi access issue
Distinguish among 802.11x requirements
Defeat Wired Equal Privateness
Essential Choose Aways:
An comprehension of wireless networks
A CD of widespread tools and documentation
An power to look for the web for updates and more information on wireless networks
Detail of Course Material The subsequent subjects are going to be coated:
Wi-fi Background
Radio Frequency (RF) Fundamentals
WLAN Infrastructure
802.11 Network Architecture
802.1X Authentication
Extensible Authentication Protocol (EAP)/(LEAP)/(PEAP)
Detection Platforms
WLAN Discovery Equipment
Kismet
Wireless Sniffers
Conventional Detection
Antennas
Exploiting WLANs
Securing WLANs
Other Wi-fi Choices
Lawful Concerns together with GLBA and ISO-17799
Long term

Sources
http://www.acquisitiondata.com/wireless_security.asp