1 / 2

우리카지노: Expectations vs. Reality

wireless<br>uc6b0ub9acuce74uc9c0ub178<br>computer<br>uba54ub9acud2b8uce74uc9c0ub178

s4dmqzk483
Download Presentation

우리카지노: Expectations vs. Reality

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ™ To the information security professional wireless networking may be thought of as a four letter word to be avoided at all costs. Regardless of the security implication wireless networking can provide cost efficiency, and because of that wireless technologies are here to stay. While many in the profession believe that wireless networks can be easily compromised, this class will show how the appropriate wireless architecture with the proper security controls can make your wireless network as secure as any other remote access point into your network. In this three day, wireless security workshop, we will examine the cutting edge of wireless technologies. The purpose of the course is to give you a full understanding of what wireless (802.11) networks are, how they work, how people find them and exploit them, and how they can be secured. This hands-on course is based on real world examples, solutions, and deployments. 노노노노노 In this course we will actually set up and use wireless networks, determine the tools to uncover wireless networks, and also look at how to defeat the attempts to secure wireless networks. Course Completion Upon the completion of our CISM course, students will have: Constructed a wireless network architecture Install and configure 802.1x authentication using Microsoft Windows IAS and Server 2000 Install a wireless access point Distinguish between 802.11x standards Defeat Wired Equivalent Privacy Key Take Aways: An understanding of wireless networks A CD of common tools and documentation An ability to search the internet for updates and more information on wireless networks Detail of Course Content The following topics will be covered: Wireless History

  2. Radio Frequency (RF) Fundamentals WLAN Infrastructure 802.11 Network Architecture 802.1X Authentication Extensible Authentication Protocol (EAP)/(LEAP)/(PEAP) Detection Platforms WLAN Discovery Tools Kismet Wireless Sniffers Conventional Detection Antennas Exploiting WLANs Securing WLANs Other Wireless Options Legal Issues including GLBA and ISO-17799 Future Resources http://www.acquisitiondata.com/wireless_security.asp

More Related