Internal Audit Training, IT Audit Training Courses, Information Security Training - CPE Interactive

Continuing Professional Education for Audit, Assurance, & Info Security

Course Description

Wireless technology has become a major enabler for an increasingly mobile workforce and dynamic workplace environments. This technology creates opportunities for a variety of exploits including unauthorized access and message interception. Its low cost and widespread availability also presents the opportunity for employees and intruders to set up rouge access points that can undermine existing security safeguards in wired networks. In this state-of-the-art CyberSecurity/CyberAudit workshop, you will sort out the often-confusing array of current and emerging wireless technology protocols and examine their operational and security implications. You will get practical tips on how to best secure wireless applications and learn how to “wardrive” and audit wireless technology throughout your organization.

Learning Objectives

  • Identify protocols, standards, and building blocks for 802.11 wireless technology
  • Assess significant risks, including but not limited to: rogue access points, “evil twins”, wireless password cracking, denial of service
  • Locate sources of industry best practices and regulatory requirements for the secure use of 802.11 CyberSecurity
  • Gain familiarity with device management and CyberSecurity configuration options, including wireless controller architectures and lightweight access points
  • Learn effective techniques for discovering, testing, and CyberAudit of 802.11 wireless networks

Course Outline

Additional Information

Session Duration

On Site:

CPE Credits:

Questions? Contact us

Phone: +1 (781) 784-4390
Fax: +1 (781) 253-2066
Email: fill out form below

[recaptcha size:compact class:captcha]