Seminar Overview:
• Wireless Networks - The New Attack Frontier for Hackers
- Next-Generation Vulnerabilities & Risks - Edition 2007
- Municipal Wi-Fi networks threats
- Hotspot Security - Mobile Worker Security Threats & Protections
• Are Encryption, Authentication & VPNs Enough
- Learn more about 802.11i, WPA2, TKIP
- Legacy Encryption Protection: Avoid Hardware Obsolescence & Expensive Upgrades
• Integrated Approach to Wireless Security
- Wireless VoIP Risks, Security & Performance Issues
- Five Approaches To Detecting Rogue WLAN Devices
- Defining & Enforcing WLAN Security Standards
• Ensuring Regulatory Compliance Across Industries
- Retail (PCI), Healthcare (HIPAA), Federal (8100.2), Financial (GLBA), Corporate (Sarbanes- Oxley)
Live Hack & Attack Demonstrations
Station MAC Address Spoofing, WEP Cracking Demo, Denial Of Service Attacks, Evil Twin Attacks, New Zero Day Attacks, Stealing Company Passwords At Hotspots, Sniffing Encrypted Traffic, Breaking 802.1x Protocols, Breaking VPNs Over Wireless Networks, Ease Of Compromise Of Wireless Devices, Bridging From Wireless To Wired, Driver Level Exploits, Layer 2 & Layer 3 Attacks.
Question & Answer Session
View the detailed agenda here.Please feel free to contact me if you have any questions, need more information or want to invite a guest.
Look forward to seeing you at the seminar.
Regards,
Chad Tallent
AirDefense
(v) 770.663.8115 xt.169
(e) ctallent@airdefense.net
(w) www.airdefense.net
To register, visit this link:
---o0o---
Anh chị nào có điều kiện và quan tâm có thể Reg để tham dự các khóa Seminar này !
• Wireless Networks - The New Attack Frontier for Hackers
- Next-Generation Vulnerabilities & Risks - Edition 2007
- Municipal Wi-Fi networks threats
- Hotspot Security - Mobile Worker Security Threats & Protections
• Are Encryption, Authentication & VPNs Enough
- Learn more about 802.11i, WPA2, TKIP
- Legacy Encryption Protection: Avoid Hardware Obsolescence & Expensive Upgrades
• Integrated Approach to Wireless Security
- Wireless VoIP Risks, Security & Performance Issues
- Five Approaches To Detecting Rogue WLAN Devices
- Defining & Enforcing WLAN Security Standards
• Ensuring Regulatory Compliance Across Industries
- Retail (PCI), Healthcare (HIPAA), Federal (8100.2), Financial (GLBA), Corporate (Sarbanes- Oxley)
Live Hack & Attack Demonstrations
Station MAC Address Spoofing, WEP Cracking Demo, Denial Of Service Attacks, Evil Twin Attacks, New Zero Day Attacks, Stealing Company Passwords At Hotspots, Sniffing Encrypted Traffic, Breaking 802.1x Protocols, Breaking VPNs Over Wireless Networks, Ease Of Compromise Of Wireless Devices, Bridging From Wireless To Wired, Driver Level Exploits, Layer 2 & Layer 3 Attacks.
Question & Answer Session
View the detailed agenda here.Please feel free to contact me if you have any questions, need more information or want to invite a guest.
Look forward to seeing you at the seminar.
Regards,
Chad Tallent
AirDefense
(v) 770.663.8115 xt.169
(e) ctallent@airdefense.net
(w) www.airdefense.net
To register, visit this link:
---o0o---
Anh chị nào có điều kiện và quan tâm có thể Reg để tham dự các khóa Seminar này !