From the course: ISACA Certified Information System Manager (CISM) Cert Prep
Unlock this course with a free trial
Join today to access over 24,900 courses taught by industry experts.
Wireless networks
From the course: ISACA Certified Information System Manager (CISM) Cert Prep
Wireless networks
- [Host] All right, we're moving on for our network protection and talking about protecting our wireless networks. So we're thinking about wireless LANs where you come into the office, you connect to your wifi network through, you know, your selection, and then you participate on the work network through your wireless device. Or you might be redirected to a separate wifi network where you can access the internet or other resources. Now, what we have to consider when we're talking about wireless networks, we have a couple of concerns. First of all, we're concerned about wireless sniffing, which basically means having a protocol analyzer capture wireless traffic. And it's much easier with wireless traffic because it's not confined to a cable, right? We're using the airwaves as medium. So with the wireless sniffer, I would be able to capture that traffic and analyze. Now the best defense there is going to be to use encryption. And so when we talk about encryption, we have multiple…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
Information security program concepts7m 38s
-
(Locked)
Elements of an information security program9m 59s
-
(Locked)
Business case and budget12m 18s
-
(Locked)
Asset identification and classification12m 39s
-
(Locked)
Management controls19m 11s
-
(Locked)
Operational controls, part 115m 28s
-
(Locked)
Operational controls, part 219m 11s
-
(Locked)
Technical controls1m 42s
-
(Locked)
Symmetric cryptography6m 29s
-
(Locked)
Asymmetric cryptography7m 33s
-
(Locked)
Integrity and non-repudiation13m 15s
-
(Locked)
Data security and endpoint protection6m 50s
-
(Locked)
Network protection: segmentation12m 46s
-
(Locked)
Network address translation5m 30s
-
(Locked)
Wireless networks7m 13s
-
(Locked)
Network services10m 37s
-
(Locked)
Cloud integration13m 44s
-
-
-