Peltier Associates Breaking And Fixing Wireless Security

Peltier Associates Breaking And Fixing Wireless Security



Peltier Associates Breaking and​ Fixing Wireless Security
To the​ information security professional wireless networking may be thought of​ as​ a​ four letter word to​ be avoided at​ all costs .​
Regardless of​ the​ security implication wireless networking can provide cost efficiency, and​ because of​ that wireless technologies are here to​ stay .​
While many in​ the​ profession believe that wireless networks can be easily compromised, this class will show how the​ appropriate wireless architecture with the​ proper security controls can make your wireless network as​ secure as​ any other remote access point into your network .​
In this three day, wireless security workshop, we will examine the​ cutting edge of​ wireless technologies .​
The purpose of​ the​ course is​ to​ give you a​ full understanding of​ what wireless (802.11) networks are, how they work, how people find them and​ exploit them, and​ how they can be secured .​
This hands-on course is​ based on real world examples, solutions, and​ deployments .​
In this course we will actually set up and​ use wireless networks, determine the​ tools to​ uncover wireless networks, and​ also look at​ how to​ defeat the​ attempts to​ secure wireless networks .​
Course Completion
Upon the​ completion of​ our CISM course, students will have:
Constructed a​ wireless network architecture
Install and​ configure 802.1x authentication using Microsoft Windows IAS and​ Server 2000
Install a​ wireless access point
Distinguish between 802.11x standards
Defeat Wired Equivalent Privacy
Key Take Aways:
An understanding of​ wireless networks
A CD of​ common tools and​ documentation
An ability to​ search the​ internet for​ updates and​ more information on wireless networks
Detail of​ Course Content the​ following topics will be covered:
Wireless History
Radio Frequency (RF) Fundamentals
WLAN Infrastructure
802.11 Network Architecture
802.1X Authentication
Extensible Authentication Protocol (EAP)/(LEAP)/(PEAP)
Detection Platforms
WLAN Discovery Tools
Kismet
Wireless Sniffers
Conventional Detection
Antennas
Exploiting WLANs
Securing WLANs
Other Wireless Options
Legal Issues including GLBA and​ ISO-17799
Future
Resources
www.acquisitiondata.com/wireless_security.asp




You Might Also Like:




No comments:

Blog Archive

Powered by Blogger.