Peltier Associates Breaking and Fixing Wireless Security

Word Count:
310

Summary:
To the information security professional wireless networking may be thought of as a four letter word to be avoided at all costs. Regardless of the security implication wireless networking can provide cost efficiency, and because of that wireless technologies are here to stay.


Keywords:
wireless, security, training, workshop, Peltier


Article Body:
To the information security professional wireless networking may be thought of as a four letter word to be avoided at all costs. Regardless of the security implication wireless networking can provide cost efficiency, and because of that wireless technologies are here to stay. While many in the profession believe that wireless networks can be easily compromised, this class will show how the appropriate wireless architecture with the proper security controls can make your wireless network as secure as any other remote access point into your network. 

In this three day, wireless security workshop, we will examine the cutting edge of wireless technologies. The purpose of the course is to give you a full understanding of what wireless (802.11) networks are, how they work, how people find them and exploit them, and how they can be secured. This hands-on course is based on real world examples, solutions, and deployments. In this course we will actually set up and use wireless networks, determine the tools to uncover wireless networks, and also look at how to defeat the attempts to secure wireless networks. 

Course Completion
Upon the completion of our CISM course, students will have: 

Constructed a wireless network architecture 
Install and configure 802.1x authentication using Microsoft Windows IAS and Server 2000 
Install a wireless access point 
Distinguish between 802.11x standards 
Defeat Wired Equivalent Privacy 
Key Take Aways: 

An understanding of wireless networks 
A CD of common tools and documentation 
An ability to search the internet for updates and more information on wireless networks 
Detail of Course Content The following topics will be covered: 

Wireless History 
Radio Frequency (RF) Fundamentals 
WLAN Infrastructure 
802.11 Network Architecture 
802.1X Authentication 
Extensible Authentication Protocol (EAP)/(LEAP)/(PEAP) 
Detection Platforms 
WLAN Discovery Tools 
Kismet 
Wireless Sniffers 
Conventional Detection 
Antennas 
Exploiting WLANs 
Securing WLANs 
Other Wireless Options 
Legal Issues including GLBA and ISO-17799 
Future 
Resources 

http://turkiyespot.com/www.acquisitiondata.com/wireless_security.asp</a>