To the knowledge security professional wi-fi networking may very well be considered a 4 letter term to be averted in the slightest degree prices. Whatever the protection implication wi-fi networking can offer Price performance, and because of that wi-fi systems are here to remain. While several inside the profession feel that wi-fi networks can be effortlessly compromised, this course will present how the suitable wireless architecture with the right protection controls can make your wi-fi community as safe as almost every other remote accessibility level into your network.
Within this a few working day, wireless stability workshop, We are going to examine the leading edge of wireless technologies. The purpose of the class is to give you a complete idea of what wi-fi (802.eleven) networks are, how they work, how people discover them and exploit them, And the way they can be secured. This hands-on course is based on genuine environment illustrations, solutions, and deployments. In this class We are going to essentially set up and use wireless networks, figure out the applications to uncover wireless networks, and also check out tips on how to defeat the makes an attempt to secure wireless networks.
System Completion
On the completion of our CISM study course, students will likely have:
Produced a wi-fi network architecture
Install and configure 802.1x authentication utilizing Microsoft Home windows IAS and Server 2000
Install a wi-fi entry point
Distinguish involving 802.11x criteria
Defeat Wired Equivalent Privateness
Important Get Aways:
An comprehension of wireless networks
A CD of frequent equipment and documentation
An capability to search the net 토토 for updates and more info on wireless networks
Depth certainly Content The following matters is going to be lined:
Wi-fi Record
Radio Frequency (RF) Fundamentals
WLAN Infrastructure
802.11 Network Architecture

802.1X Authentication
Extensible Authentication Protocol (EAP)/(LEAP)/(PEAP)
Detection Platforms
WLAN Discovery Instruments
Kismet
Wireless Sniffers
Traditional Detection
Antennas
Exploiting WLANs
Securing WLANs
Other Wireless Options
Lawful Issues which includes GLBA and ISO-17799
Potential
Resources
http://www.acquisitiondata.com/wireless_security.asp