Auditing CyberSecurity Of Wireless Networks

by CPE Interactive Claim Listing

Wireless technology has become a major enabler for an increasingly mobile workforce and dynamic work environments. This technology creates opportunities for a variety of exploits including unauthorized access and message interception.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

CPE Interactive Logo

img Duration

1 Day

Course Details

Wireless technology has become a major enabler for an increasingly mobile workforce and dynamic work environments. This technology creates opportunities for a variety of exploits including unauthorized access and message interception.

Its low cost and widespread availability also present the opportunity for employees and intruders to set up rogue access points that can undermine existing security safeguards in wired networks.

In this state-of-the-art CyberSecurity/CyberAudit workshop, you will sort out the often-confusing array of current and emerging wireless technology protocols and examine their operational and security implications.

You will get practical tips on how to best secure wireless applications and learn how to “wardrive” and audit wireless technology throughout your organization.

 

Learning Objectives:

  • Identify protocols, standards, and building blocks for 802.11 wireless technology

  • Assess significant risks, including but not limited to: rogue access points, “evil twins”, wireless password cracking, denial of service

  • Locate sources of industry best practices and regulatory requirements for the secure use of 802.11 CyberSecurity

  • Gain familiarity with device management and CyberSecurity configuration options, including wireless controller architectures and lightweight access points

  • Learn effective techniques for discovering, testing, and CyberAudit of 802.11 wireless networks

  • Boston Branch

    10 Fisher Street, #4404, Boston

Check out more Audit courses in USA

CPE Interactive Logo

Developing Results (Driven Audit Work Programs) (AS07)

This course will take the mystery and pain out of the process by introducing a methodology called “Closing the Loop Framework”. It provides a foundation for how to develop audit steps based on audit scope and the evidence required to achieve audit objectives.

by CPE Interactive [Claim Listing ]
CAACCI (Construction Audit & Cost Control Institute) Logo

Effective Auditing Of Construction Activity

This two-day course covers proven construction audit strategies and techniques to enhance your organization’s ability to effectively audit and control construction costs. Attendees will learn “how-to” effectively establish and implement audit coverage.

by CAACCI (Construction Audit & Cost Control Institute) [Claim Listing ]
Certified Health & Safety Logo

Audits

Certified HSS offers comprehensive jobsite audits and incident investigations course in Cinnaminson, New Jersey. Our team of experts can help you ensure that your business operates safely, efficiently, and in compliance with all relevant laws and regulations.

by Certified Health & Safety [Claim Listing ]
CPA Training Center Logo

Audit Report Writing

The art of audit report writing demands far more than simply listing the four elements of a finding - criteria, condition, cause, and effect. Even adding a fifth element, the recommendation, may be insufficient.

by CPA Training Center [Claim Listing ]
  • Price
  • Start Date
  • Duration
Mass CPA's Logo

Making Internal Audit An Asset For The CFO

Sarbanes Oxley (SOX) created a specific deliverable for Internal Audit causing many CFO’s to underutilize this important resource by not focusing on the other areas where Internal Audit can improve controls and productivity and reduce cost and risk.

by Mass CPA's [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy