Wireless Security Workshop
To the information security professional wireless networking
may be thought of as a four letter word to be avoided at all
costs. Regardless of the security implication wireless
networking can provide cost efficiency, and because of that
wireless technologies are here to stay. While many in the
profession believe that wireless networks can be easily
compromised, this class will show how the appropriate wireless
architecture with the proper security controls can make your
wireless network as secure as any other remote access point into
your network.
In this three day, wireless security workshop, we will examine
the cutting edge of wireless technologies. The purpose of the
course is to give you a full understanding of what wireless
(802.11) networks are, how they work, how people find them and
exploit them, and how they can be secured. This hands-on course
is based on real world examples, solutions, and deployments. In
this course we will actually set up and use wireless networks,
determine the tools to uncover wireless networks, and also look
at how to defeat the attempts to secure wireless networks.
Course Completion Upon the completion of our CISM course,
students will have:
Constructed a wireless network architecture Install and
configure 802.1x authentication using Microsoft Windows IAS and
Server 2000 Install a wireless access point Distinguish between
802.11x standards Defeat Wired Equivalent Privacy Key Take
Aways:
An understanding of wireless networks A CD of common tools and
documentation An ability to search the internet for updates and
more information on wireless networks Detail of Course Content
The following topics will be covered:
Wireless History Radio Frequency (RF) Fundamentals WLAN
Infrastructure 802.11 Network Architecture 802.1X Authentication
Extensible Authentication Protocol (EAP)/(LEAP)/(PEAP) Detection
Platforms WLAN Discovery Tools Kismet Wireless Sniffers
Conventional Detection Antennas Exploiting WLANs Securing WLANs
Other Wireless Options Legal Issues including GLBA and ISO-17799
Future Resources
For more info:
http://www.acquisitiondata.com/wireless_security.asp