Auditing CyberSecurity Of Wireless Networks

by CPE Interactive Claim Listing

Wireless technology has become a major enabler for an increasingly mobile workforce and dynamic work environments. This technology creates opportunities for a variety of exploits including unauthorized access and message interception.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

CPE Interactive Logo

img Duration

1 Day

Course Details

Wireless technology has become a major enabler for an increasingly mobile workforce and dynamic work environments. This technology creates opportunities for a variety of exploits including unauthorized access and message interception.

Its low cost and widespread availability also present the opportunity for employees and intruders to set up rogue access points that can undermine existing security safeguards in wired networks.

In this state-of-the-art CyberSecurity/CyberAudit workshop, you will sort out the often-confusing array of current and emerging wireless technology protocols and examine their operational and security implications.

You will get practical tips on how to best secure wireless applications and learn how to “wardrive” and audit wireless technology throughout your organization.

 

Learning Objectives:

  • Identify protocols, standards, and building blocks for 802.11 wireless technology

  • Assess significant risks, including but not limited to: rogue access points, “evil twins”, wireless password cracking, denial of service

  • Locate sources of industry best practices and regulatory requirements for the secure use of 802.11 CyberSecurity

  • Gain familiarity with device management and CyberSecurity configuration options, including wireless controller architectures and lightweight access points

  • Learn effective techniques for discovering, testing, and CyberAudit of 802.11 wireless networks

  • Boston Branch

    10 Fisher Street, #4404, Boston

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy