To the knowledge security Specialist wireless networking might be considered a 4 letter term to get prevented at all prices. Whatever the security implication wireless networking can offer Value effectiveness, and since of that wi-fi technologies are right here to stay. While a lot of in the career believe that wireless networks is often simply compromised, this course will display how the suitable wi-fi architecture with the appropriate security controls might make your wireless community as secure as another remote entry position into your community.
In this particular a few day, wi-fi stability workshop, We'll study the innovative of wireless technologies. The goal of the training course is to provide you with a full understanding of what wireless (802.11) networks are, how they do the job, how individuals find them and exploit them, And exactly how they are often secured. This palms-on course relies on real globe illustrations, options, and deployments. On this class We are going to in fact put in place and use wireless networks, ascertain the applications to uncover wi-fi networks, in addition to examine how to defeat the tries to secure wireless networks.
Course Completion
On the completion of our CISM system, learners will likely 토토검증 have:
Constructed a wi-fi network architecture
Set up and configure 802.1x authentication making use of Microsoft Windows IAS and Server 2000
Install a wireless accessibility level
Distinguish amongst 802.11x benchmarks
Defeat Wired Equivalent Privacy
Vital Get Aways:
An understanding of wi-fi networks
A CD of typical instruments and documentation
An capability to lookup the online world for updates and more info on wi-fi networks
Detail of Course Content material The following subject areas might be lined:
Wireless History
Radio Frequency (RF) Fundamentals
WLAN Infrastructure
802.11 Community Architecture
802.1X Authentication
Extensible Authentication Protocol (EAP)/(LEAP)/(PEAP)
Detection Platforms
WLAN Discovery Instruments
Kismet
Wireless Sniffers
Standard Detection
Antennas
Exploiting WLANs
Securing WLANs
Other Wireless Choices
Authorized Concerns including GLBA and ISO-17799
Long term
Assets
http://www.acquisitiondata.com/wireless_security.asp